Abstract is missing.
- Message from the Doctoral Symposium ChairsZheng Zheng, Hadi Hemmati. [doi]
- Keynote 1: How Safe Is Safe Enough for Autonomous Vehicles?Philip Koopman. [doi]
- Moving Target Defense (MTD): Recent Advances and Future Research ChallengesDan Kim. [doi]
- Message from the ISSRE 2022 Fast Abstract Co-ChairsJunwei Zhou, Antonio Ken Iannillo. [doi]
- Message from the WoSAR 2022 ChairsAlberto Avritzer, Michael Grottke, Ricardo M. Czekster, Raffaele Romagnoli. [doi]
- Message from the ISSRE 2022 General Co-ChairsKaterina GosevaPopstojanova, Bojan Cukic. [doi]
- Message from the SSSML 2022 Workshop Organization CommitteeJunwei Zhou. [doi]
- Message from the WoSoCer 2022 ChairsLuigi De Simone, Nuno Laranjeiro. [doi]
- Message from the RAIS 2022 ChairsYan-fu Li, Yinxing Xue, Lei Ma 0003, Shengjian Guo, Guozhu Meng. [doi]
- Message from the ISSRE 2022 Industry Track Committee ChairsUttam Thakore, Muntasir Rahman, Xin Xia, Keun Soo Yim. [doi]
- Message from the RSDA 2022 Workshop ChairsRaffaele Della Corte, Marta Catillo, João F. Ferreira, Guanpeng Li. [doi]
- Message from the WAAM 2022 ChairsPhil Laplante, Ben Amaba, Rick Kuhn. 1 [doi]
- An unsupervised approach to discover filtering rules from diagnostic logsMarcello Cinque, Raffaele Della Corte, Giorgio Farina, Stefano Rosiello. 1-6 [doi]
- Cache Antagonists Identification: A Practice from Alibaba Colocation DatacenterKangjin Wang, Chuanjia Hou, Ying Li, Yaoyong Dou, Cheng Wang, Yang Wen, Jie Yao, Liping Zhang. 7-12 [doi]
- A Page-mapping Consistency Protecting Method for Soft Error Damage in Flash-based StorageJung-Hoon Kim 0004, Young-Sik Lee. 13-18 [doi]
- An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware DependenciesAustin Ketterer, Asha Shekar, Edgardo Barsallo Yi, Saurabh Bagchi, Abraham A. Clements. 19-24 [doi]
- Autonomic ZTA-based Network Management Engine (AZNME)Cihan Tunc, James Durflinger, Charif Mahmoudi, Valerio Formicola. 25-30 [doi]
- When malloc() Never Returns NULL - Reliability as an IllusionGunnar Kudrjavets, Jeff Thomas, Aditya Kumar, Nachiappan Nagappan, Ayushi Rastogi. 31-36 [doi]
- Using Complexity Metrics with Hotspot Analysis to Support Software SustainabilityJames M. Willenbring, Gursimran Singh Walia. 37-42 [doi]
- Early Software Defect Prediction: Right-Shifting Software Effort Data into a Defect CurveKazuhira Okumoto. 43-48 [doi]
- Fast Analysis of Evolving Software SystemsAnushri Jana, Bharti Chimdyalwar, Shrawan Kumar, R. Venkatesh 0001. 49-54 [doi]
- Automated Validation of Insurance Applications against Calculation SpecificationsAdvaita Datar, Amey Zare, Asia A, R. Venkatesh, Shrawan Kumar, Ulka Shrotri. 55-60 [doi]
- Prevalence of continuous integration failures in industrial systems with hardware-in-the-loop testingHan Fu, Sigrid Eldh, Kristian Wiklund, Andreas Ermedahl, Cyrille Artho. 61-66 [doi]
- Managing Service Dependency for Cloud Reliability: The Industrial PracticeTianyi Yang, Baitong Li, Jiacheng Shen, Yuxin Su 0001, Yongqiang Yang, Michael R. Lyu. 67-68 [doi]
- VulDeBERT: A Vulnerability Detection System Using BERTSoolin Kim, Jusop Choi, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim. 69-74 [doi]
- Detecting and Defending CSRF at API-LevelShun Wang, Chao Ni, Jianbo Wang, Changhai Nie. 75-80 [doi]
- Characterizing Python Method Evolution with PyMevol: An Essential Step Towards Enabling Reliable Software SystemsHaowei Quan, Jiawei Wang, Bo Li, Xiaoning Du 0001, Kui Liu, Li Li. 81-86 [doi]
- A Method for Component Evaluation for Live Testing of Cloud SystemsOussama Jebbar, Ferhat Khendek, Maria Toeroe. 87-92 [doi]
- Automated Dependability Assessment in DevOps EnvironmentsJames Cusick, Alberto Avritzer, Allen Tse, Andrea Janes. 93-98 [doi]
- Code Quality Prediction Under Super Extreme Class ImbalanceNoah Lee, Rui Abreu 0001, Nachiappan Nagappan. 99-104 [doi]
- Green Resilience of Cyber-Physical SystemsDiaeddin Rimawi. 105-109 [doi]
- AgentFuzz: Fuzzing for Deep Reinforcement Learning SystemsTiancheng Li, Xiaohui Wan, Muhammed Murat Özbek. 110-113 [doi]
- A Stochastic Petri net Model of Continuous Integration and Continuous DeliverySushovan Bhadra. 114-117 [doi]
- Towards automatic validation of composite heterogeneous systems in edge situationsLukás Cerný. 118-121 [doi]
- LegoAI: Towards Building Reliable AI Software for Real-world ApplicationsMengyuan Hou, Hui Xu. 122-123 [doi]
- LogVm: Variable Semantics Miner for Log MessagesYintong Huo, Yuxin Su 0001, Michael R. Lyu. 124-125 [doi]
- DNA-based Secret Sharing and Hiding in Dispersed ComputingMarek R. Ogiela, Urszula Ogiela. 126-127 [doi]
- Towards Effective Performance FuzzingYiqun Chen, Matthew Bradbury, Neeraj Suri. 128-129 [doi]
- A Disjoint-Partitioning Approach to Enhancing Metamorphic Testing of DBMSMatthew Siu-Hin Tang, T. H. Tse, Zhi Quan Zhou. 130-131 [doi]
- Improving Fuzzing Coverage with Execution Path Length SelectionWenxi Zhang, Kazunori Sakamoto, Hironori Washizaki, Yoshiaki Fukazawa. 132-133 [doi]
- RunPHI: Enabling Mixed-criticality Containers via Partitioning Hypervisors in Industry 4.0Marco Barletta, Marcello Cinque, Luigi De Simone, Raffaele Della Corte, Giorgio Farina, Daniele Ottaviano. 134-135 [doi]
- Towards Continuous and Data-driven Specification and Verification of Resilience ScenariosSebastian Frank 0001, M. Alireza Hakamian, Lion Wagner, Jóakim von Kistowski, André van Hoorn. 136-137 [doi]
- A Markov Regenerative Model of Software Rejuvenation Beyond the Enabling RestrictionLaura Carnevali, Marco Paolieri, Riccardo Reali, Leonardo Scommegna, Enrico Vicario. 138-145 [doi]
- Sequential Performance Analysis of Systems that Age and RejuvenateLeonardo Miranda, Cabral Lima, Daniel Sadoc Menasché, Guilherme de Melo Baptista Domingues. 146-153 [doi]
- Towards Making Unikernels RejuvenatableTakeru Wada, Hiroshi Yamada. 154-161 [doi]
- Software rejuvenation and runtime reliability monitoringAlessandro Fantechi, Gloria Gori, Marco Papini. 162-169 [doi]
- Analysis of Software Aging in a Blockchain PlatformDouglas Dias, Fumio Machida, Ermeson Carneiro de Andrade. 170-177 [doi]
- Crash Injection to Persistent Memory for Recovery Code ValidationSoichiro Sakamoto, Keita Suzuki, Kenji Kono. 178-184 [doi]
- A Software Aging-Related Bug Prediction Framework Based on Deep Learning and Weakly Supervised OversamplingYancai Zhou, Chen Zhang, Kai Jia, Dongdong Zhao 0001, Jianwen Xiang. 185-192 [doi]
- Towards Assessing Isolation Properties in Partitioning HypervisorsCarmine Cesarano, Domenico Cotroneo, Luigi De Simone. 193-200 [doi]
- Continuous Verification of Open Source Components in a World of Weak LinksThomas Hastings, Kristen R. Walcott. 201-207 [doi]
- Towards the Quantitative Verification of Deep Learning for Safe PerceptionPhilipp Schleiss, Yuki Hagiwara, Iwo Kurzidem, Francesco Carella. 208-215 [doi]
- Performance Bottleneck Analysis of Drone Computation Offloading to a Shared Fog NodeQingyang Zhang, Fumio Machida, Ermeson Carneiro de Andrade. 216-221 [doi]
- Improving Documentation Agility in Safety-Critical Software Systems Development For AerospaceJoaquim Manuel Silva Cardoso Rodrigues, J. Eduardo Ferreira Ribeiro, Ademar Aguiar. 222-229 [doi]
- Programming Language Evaluation Criteria for Safety-Critical Software in the Air DomainRob Ashmore, Andrew Howe, Rhiannon Chilton, Shamal Faily. 230-237 [doi]
- A Domain Specific Language for the ARINC 653 SpecificationIkram Darif, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo. 238-245 [doi]
- TensorFI+: A Scalable Fault Injection Framework for Modern Deep Learning Neural NetworksSabuj Laskar, Md Hasanur Rahman, Guanpeng Li. 246-251 [doi]
- Sentinel: A Multi-institution Enterprise Scale Platform for Data-driven Cybersecurity ResearchAlastair Nottingham, Molly Buchanan, Mark Gardner, Jason Hiser, Jack W. Davidson. 252-257 [doi]
- Automated Test Case Generation from Input Specification in Natural LanguageTianyu Li, Xiuwen Lu, Hui Xu. 258-261 [doi]
- D2MoN: Detecting and Mitigating Real-Time Safety Violations in Autonomous Driving SystemsBohan Zhang, Yafan Huang, Rachael Chen, Guanpeng Li. 262-267 [doi]
- Improving Counterexample Quality from Failed Program VerificationLi Huang, Bertrand Meyer 0001, Manuel Oriol. 268-273 [doi]
- Correlating Test Events With Monitoring Logs For Test Log Reduction And Anomaly PredictionBahareh Afshinpour, Roland Groz, Massih-Reza Amini. 274-280 [doi]
- Improving Flexibility in Embedded System Runtime Verification with PythonWanjin Zhou, Feifei Hu, Junyan Ma. 281-282 [doi]
- Investigating Novel Approaches to Defend Software Supply Chain AttacksMd Jobair Hossain Faruk, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu 0013. 283-288 [doi]
- Homomorphic multi-label classification of virus strainsJunwei Zhou, Botian Lei, Huile Lang. 289-294 [doi]
- Safety Assessment: From Black-Box to White-BoxIwo Kurzidem, Adam Misik, Philipp Schleiss, Simon Burton 0001. 295-300 [doi]
- A Survey on Autonomous Driving System SimulatorsJixiang Zhou, Yi Zhang, Shengjian Guo, Yan Guo. 301-306 [doi]
- Arguing safety of an improved autonomous vehicle from safe operation before the change: new resultsRobab Aghazadeh Chakherlou, Kizito Salako, Lorenzo Strigini. 307-312 [doi]
- Colour Space Defence: Simple, Intuitive, but EffectivePei Yang, Jing Wang, Huan Wang. 313-317 [doi]
- A systematic approach to develop an autopilot sensor monitoring system for autonomous delivery vehicles based on the STPA methodGuangshuang Ge, Liangliang Sun, Yan-fu Li. 318-325 [doi]
- Assuring Safety-Critical Machine Learning Enabled Systems: Challenges and PromiseAlwyn E. Goodloe. 326-332 [doi]
- Machine-Learned Specifications for the Verification and Validation of Autonomous Cyberphysical SystemsDoron Drusinsky, James Bret Michael, Matthew Litton. 333-341 [doi]
- A Taxonomy of Critical AI System Characteristics for Use in Proxy System TestingJoanna F. DeFranco, Mohamad Kassab, Phil Laplante. 342-346 [doi]
- AI and Stochastic Terrorism - Should it be done?Bart Kemper. 347-356 [doi]
- Combinatorial Coverage for Assured AutonomyRick Kuhn, Mohammad S. Raunak, Raghu Kacker. 357-358 [doi]
- XAI for Communication NetworksSayandev Mukherjee, Jason W. Rupe, Jingjie Zhu. 359-364 [doi]
- Investigating Bugs in AI-Infused Systems: Analysis and Proposed TaxonomyMohamad Kassab, Joanna F. DeFranco, Phillip A. Laplante. 365-370 [doi]
- Safety-Critical Adaptation in Self-Adaptive SystemsSimon Diemert, Jens H. Weber. 371-380 [doi]
- Evaluating Human Locomotion Safety in Mobile Robots Populated EnvironmentsBoyi Hu, Yue Luo, Yuhao Chen. 381-386 [doi]
- Classification Analysis of Bearing Contrived Dataset under Different Levels of ContaminationShamanth Manjunath, Ethan Wescoat, Vinita Gangaram Jansari, Matthew Krugh, Laine Mears. 387-393 [doi]
- Assurance Guidance for Machine Learning in a Safety-Critical SystemMartin S. Feather, Philip C. Slingerland, Steven Guerrini, Max Spolaor. 394-401 [doi]