Abstract is missing.
- Evaluating the usefulness of IR-based fault localization techniquesQianqian Wang, Chris Parnin, Alessandro Orso. 1-11 [doi]
- Proactive detection of inadequate diagnostic messages for software configuration errorsSai Zhang, Michael D. Ernst. 12-23 [doi]
- An analysis of patch plausibility and correctness for generate-and-validate patch generation systemsZichao Qi, Fan Long, Sara Achour, Martin C. Rinard. 24-36 [doi]
- BrowserAudit: automated testing of browser security featuresCharlie Hothersall-Thomas, Sergio Maffeis, Chris Novakovic. 37-47 [doi]
- Detection and classification of malicious JavaScript via attack behavior modellingYinxing Xue, Junjie Wang, Yang Liu, Hao Xiao, Jun Sun 0001, Mahinthan Chandramohan. 48-59 [doi]
- Experience report: an empirical study of PHP security mechanism usageJohannes Dahse, Thorsten Holz. 60-70 [doi]
- WuKong: a scalable and accurate two-phase approach to Android app clone detectionHaoyu Wang, Yao Guo, Ziang Ma, Xiangqun Chen. 71-82 [doi]
- Systematic execution of Android test suites in adverse conditionsChristoffer Quist Adamsen, Gianluca Mezzetti, Anders Møller. 83-93 [doi]
- DLint: dynamically checking bad coding practices in JavaScriptLiang Gong, Michael Pradel, Manu Sridharan, Koushik Sen. 94-105 [doi]
- Scalable and precise taint analysis for AndroidWei Huang, Yao Dong, Ana Milanova, Julian Dolby. 106-117 [doi]
- Dynamic detection of inter-application communication vulnerabilities in AndroidRoee Hay, Omer Tripp, Marco Pistoia. 118-128 [doi]
- Modelgen: mining explicit information flow specifications from concrete executionsLazaro Clapp, Saswat Anand, Alex Aiken. 129-140 [doi]
- When truth is efficient: analysing concurrencyGanesh Narayanaswamy. 141-152 [doi]
- Pegasus: automatic barrier inference for stable multithreaded systemsMonika Dhok, Rashmi Mudduluru, Murali Krishna Ramanathan. 153-164 [doi]
- ConcBugAssist: constraint solving for diagnosis and repair of concurrency bugsSepideh Khoshnood, Markus Kusano, Chao Wang. 165-176 [doi]
- Enhancing reuse of constraint solutions to improve symbolic executionXiangyang Jia, Carlo Ghezzi, Shi Ying. 177-187 [doi]
- S-looper: automatic summarization for multipath string loopsXiaofei Xie, Yang Liu, Wei Le, Xiaohong Li, Hongxu Chen. 188-198 [doi]
- Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEEXiaoyin Wang, Lingming Zhang, Philip Tanofsky. 199-210 [doi]
- Practical regression test selection with dynamic file dependenciesMilos Gligoric, Lamyaa Eloussi, Darko Marinov. 211-222 [doi]
- Reliable testing: detecting state-polluting tests to prevent test dependencyAlex Gyori, August Shi, Farah Hariri, Darko Marinov. 223-233 [doi]
- Empirical evaluation of pareto efficient multi-objective regression test case prioritisationMichael G. Epitropakis, Shin Yoo, Mark Harman, Edmund K. Burke. 234-245 [doi]
- Optimizing selection of competing features via feedback-directed evolutionary algorithmsTian Huat Tan, Yinxing Xue, Manman Chen, Jun Sun 0001, Yang Liu, Jin Song Dong. 246-256 [doi]
- Automated software transplantationEarl T. Barr, Mark Harman, Yue Jia, Alexandru Marginean, Justyna Petke. 257-269 [doi]
- Automating performance bottleneck detection using search-based application profilingDu Shen, Qi Luo, Denys Poshyvanyk, Mark Grechanik. 270-281 [doi]
- Test-case generation for runtime analysis and vice versa: verification of aircraft separation assuranceMarko Dimjasevic, Dimitra Giannakopoulou. 282-292 [doi]
- Reliability assessment for distributed systems via communication abstraction and refinementLin Gui 0002, Jun Sun 0001, Yang Liu, Jin Song Dong. 293-304 [doi]
- Reusing constraint proofs in program analysisAndrea Aquino, Francesco A. Bianchi, Meixian Chen, Giovanni Denaro, Mauro Pezzè. 305-315 [doi]
- Feedback-controlled random test generationKohsuke Yatoh, Kazunori Sakamoto, Fuyuki Ishikawa, Shinichi Honiden. 316-326 [doi]
- Randomized stress-testing of link-time optimizersVu Le, Chengnian Sun, Zhendong Su. 327-337 [doi]
- Automated unit test generation during software development: a controlled experiment and think-aloud observationsJosé Miguel Rojas, Gordon Fraser, Andrea Arcuri. 338-349 [doi]
- Calculation coverage testing in scientific applicationsYoshiki Sato, Shumpei Hozumi, Shigeru Chiba. 350-360 [doi]
- Automatic fault injection for driver robustness testingKai Cong, Li Lei, Zhenkun Yang, Fei Xie. 361-372 [doi]
- Preventing data errors with continuous testingKivanç Muslu, Yuriy Brun, Alexandra Meliou. 373-384 [doi]
- Automatic generation of system test cases from use case specificationsChunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand, Muhammad Zohaib Z. Iqbal. 385-396 [doi]
- RTCM: a natural language based, automated, and practical test case generation frameworkTao Yue, Shaukat Ali, Man Zhang. 397-408 [doi]
- Dynamic taint tracking for Java with phosphor (demo)Jonathan Bell, Gail E. Kaiser. 409-413 [doi]
- TSTL: a language and tool for testing (demo)Alex Groce, Jervis Pinto, Pooria Azimi, Pranjal Mittal. 414-417 [doi]
- CanaryAdvisor: a statistical-based tool for canary testing (demo)Alexander Tarvo, Peter F. Sweeney, Nick Mitchell, V. T. Rajan, Matthew Arnold, Ioana Baldini. 418-422 [doi]
- SAMC: a fast model checker for finding heisenbugs in distributed systems (demo)Tanakorn Leesatapornwongsa, Haryadi S. Gunawi. 423-427 [doi]
- Making your crashes work for you (doctoral symposium)Peter Ohmann. 428-431 [doi]
- Scalable program analysis through proof caching (doctoral symposium)Andrea Aquino. 432-435 [doi]
- Collaborative testing across shared software components (doctoral symposium)Teng Long. 436-439 [doi]
- Cost-aware combinatorial interaction testing (doctoral symposium)Gülsen Demiröz. 440-443 [doi]
- Mining change history for test-plan generation (doctoral symposium)Thomas Rolfsnes. 444-447 [doi]