Abstract is missing.
- ObjSim: efficient testing of cyber-physical systemsJun Sun 0001, Zijiang Yang. 1-2 [doi]
- WEIZZ: automatic grey-box fuzzing for structured binary formatsAndrea Fioraldi, Daniele Cono D'Elia, Emilio Coppa. 1-13 [doi]
- Formal verification of discrete event modelZhihao Lu, Rui Wang, Yong Guan. 3-4 [doi]
- Active fuzzing for testing and securing cyber-physical systemsYuqi Chen 0001, Bohan Xuan, Christopher M. Poskitt, Jun Sun 0001, Fan Zhang 0010. 14-26 [doi]
- Learning input tokens for effective fuzzingBjörn Mathis, Rahul Gopinath, Andreas Zeller. 27-37 [doi]
- Fast bit-vector satisfiabilityPeisen Yao, Qingkai Shi, Heqing Huang, Charles Zhang. 38-50 [doi]
- Relocatable addressing model for symbolic executionDavid Trabish, Noam Rinetzky. 51-62 [doi]
- Running symbolic execution foreverFrank Busse, Martin Nowack, Cristian Cadar. 63-74 [doi]
- Can automated program repair refine fault localization? a unified debugging approachYiling Lou, Ali-Ghanbari, Xia Li, Lingming Zhang, Haotian Zhang, Dan Hao, Lu Zhang. 75-87 [doi]
- Automated repair of feature interaction failures in automated driving systemsRaja Ben Abdessalem, Annibale Panichella, Shiva Nejati, Lionel C. Briand, Thomas Stifter. 88-100 [doi]
- CoCoNuT: combining context-aware neural translation models using ensemble for program repairThibaud Lutellier, Hung Viet Pham, Lawrence Pang, Yitong Li, Moshi Wei, Lin Tan 0001. 101-114 [doi]
- Detecting and diagnosing energy issues for mobile applicationsXueliang Li 0002, Yuming Yang, Yepang Liu 0001, John P. Gallagher, Kaishun Wu. 115-127 [doi]
- Automated classification of actions in bug reports of mobile appsHui Liu, Mingzhu Shen, Jiahao Jin, Yanjie Jiang. 128-140 [doi]
- Data loss detector: automatically revealing data loss bugs in Android appsOliviero Riganelli, Simone Paolo Mottadelli, Claudio Rota, Daniela Micucci, Leonardo Mariani. 141-152 [doi]
- Reinforcement learning based curiosity-driven testing of Android applicationsMinxue Pan, an Huang, Guoxin Wang, Tian Zhang, Xuandong Li. 153-164 [doi]
- Effective white-box testing of deep neural networks with adaptive neuron-selection strategySeokhyun Lee, Sooyoung Cha, Dain Lee, Hakjoo Oh. 165-176 [doi]
- DeepGini: prioritizing massive tests to enhance the robustness of deep neural networksYang Feng, Qingkai Shi, Xinyu Gao, Jun Wan, Chunrong Fang, Zhenyu Chen 0001. 177-188 [doi]
- Detecting and understanding real-world differential performance bugs in machine learning librariesSaeid Tizpaz Niari, Pavol Cerný, Ashutosh Trivedi 0001. 189-199 [doi]
- Higher income, larger loan? monotonicity testing of machine learning modelsArnab Sharma, Heike Wehrheim. 200-210 [doi]
- Detecting flaky tests in probabilistic and machine learning applicationsSaikat Dutta 0001, August Shi, Rutvik Choudhary, Zhekun Zhang, Aryaman Jain, Sasa Misailovic. 211-224 [doi]
- Scaffle: bug localization on millions of filesMichael Pradel, Vijayaraghavan Murali, Rebecca Qian, Mateusz Machalica, Erik Meijer, Satish Chandra 0001. 225-236 [doi]
- Abstracting failure-inducing inputsRahul Gopinath, Alexander Kampmann, Nikolas Havrikov, Ezekiel O. Soremekun, Andreas Zeller. 237-248 [doi]
- Debugging the performance of Maven's test isolation: experience reportPengyu Nie, Ahmet Çelik, Matthew Coley, Aleksandar Milicevic, Jonathan Bell, Milos Gligoric. 249-259 [doi]
- Feedback-driven side-channel analysis for networked applicationsIsmet Burak Kadron, Nicolás Rosner, Tevfik Bultan. 260-271 [doi]
- Scalable analysis of interaction threats in IoT systemsMohannad Alhanahnah, Clay Stevens, Hamid Bagheri. 272-285 [doi]
- DeepSQLi: deep semantic learning for testing SQL injectionMuyang Liu, Ke Li 0001, Tao Chen 0001. 286-297 [doi]
- Dependent-test-aware regression testing techniquesWing Lam, August Shi, Reed Oei, Sai Zhang, Michael D. Ernst, Tao Xie 0001. 298-311 [doi]
- Differential regression testing for REST APIsPatrice Godefroid, Daniel Lehmann, Marina Polishchuk. 312-323 [doi]
- Empirically revisiting and enhancing IR-based test-case prioritizationQianyang Peng, August Shi, Lingming Zhang. 324-336 [doi]
- Intermittently failing tests in the embedded systems domainPer Erik Strandberg, Thomas J. Ostrand, Elaine J. Weyuker, Wasif Afzal, Daniel Sundmark. 337-348 [doi]
- Feasible and stressful trajectory generation for mobile robotsCarl Hildebrandt, Sebastian G. Elbaum, Nicola Bezzo, Matthew B. Dwyer. 349-362 [doi]
- Detecting cache-related bugs in Spark applicationsHui Li, Dong Wang, Tianze Huang, Yu Gao, Wensheng Dou, Lijie Xu, Wei Wang, Jun Wei, Hua Zhong. 363-375 [doi]
- Patch based vulnerability matching for binary programsYifei Xu, Zhengzi Xu, Bihuan Chen 0001, Fu Song, Yang Liu, Ting Liu. 376-387 [doi]
- Identifying Java calls in native code via binary scanningGeorge Fourtounis, Leonidas Triantafyllou, Yannis Smaragdakis. 388-400 [doi]
- An empirical study on ARM disassembly toolsMuhui Jiang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren 0001. 401-414 [doi]
- How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injectionAsem Ghaleb, Karthik Pattabiraman. 415-427 [doi]
- A programming model for semi-implicit parallelization of static analysesDominik Helm, Florian Kübler, Jan Thomas Kölzer, Philipp Haller, Michael Eichberg, Guido Salvaneschi, Mira Mezini. 428-439 [doi]
- Recovering fitness gradients for interprocedural Boolean flags in search-based testingYun Lin 0001, Jun Sun 0001, Gordon Fraser, Ziheng Xiu, Ting Liu, Jin Song Dong. 440-451 [doi]
- Scalable build service system with smart scheduling serviceKaiyuan Wang, Greg Tener, Vijay Gullapalli, Xin Huang, Ahmed Gad, Daniel Rall. 452-462 [doi]
- Escaping dependency hell: finding build dependency errors with the unified dependency graphGang Fan, Chengpeng Wang, Rongxin Wu, Xiao Xiao 0003, Qingkai Shi, Charles Zhang. 463-474 [doi]
- How far we have come: testing decompilation correctness of C decompilersZhibo Liu, Shuai Wang. 475-487 [doi]
- Discovering discrepancies in numerical librariesJackson Vanover, Xuan Deng, Cindy Rubio-González. 488-501 [doi]
- Testing high performance numerical simulation programs: experience, lessons learned, and open issuesXiao He, Xingwei Wang, Jia Shi, Yi Liu. 502-515 [doi]
- Functional code clone detection with syntax and semantics fusion learningChunrong Fang, Zixi Liu, Yangyang Shi, Jeff Huang 0001, Qingkai Shi. 516-527 [doi]
- Learning to detect table clones in spreadsheetsYakun Zhang, Wensheng Dou, Jiaxin Zhu, Liang Xu, Zhiyong Zhou, Jun Wei, Dan Ye, Bo Yang. 528-540 [doi]
- ObjSim: lightweight automatic patch prioritization via object similarityAli-Ghanbari. 541-544 [doi]
- Crowdsourced requirements generation for automatic testing via knowledge graphChao Guo, Tieke He, Wei Yuan, Yue Guo, Rui Hao. 545-548 [doi]
- TauJud: test augmentation of machine learning in judicial documentsZichen Guo, Jiawei Liu, Tieke He, Zhuoyang Li, Peitian Zhangzhu. 549-552 [doi]
- EShield: protect smart contracts against reverse engineeringWentian Yan, Jianbo Gao, Zhenhao Wu, Yue Li, Zhi Guan, Qingshan Li, Zhong Chen. 553-556 [doi]
- Echidna: effective, usable, and fast fuzzing for smart contractsGustavo Grieco, Will Song, Artur Cygan, Josselin Feist, Alex Groce. 557-560 [doi]
- ProFL: a fault localization framework for PrologGeorge Thompson, Allison K. Sullivan. 561-564 [doi]
- FineLock: automatically refactoring coarse-grained locks into fine-grained locksYang Zhang, Shuai Shao, Juan Zhai, ShiQing Ma. 565-568 [doi]
- CPSDebug: a tool for explanation of failures in cyber-physical systemsEzio Bartocci, Niveditha Manjunath, Leonardo Mariani, Cristinel Mateis, Dejan Nickovic, Fabrizio Pastore. 569-572 [doi]
- Test recommendation system based on slicing coverage filteringRuixiang Qian, Yuan Zhao, Duo Men, Yang Feng, Qingkai Shi, Yong Huang, Zhenyu Chen 0001. 573-576 [doi]
- Automated mobile apps testing from visual perspectiveFeng Xue. 577-581 [doi]
- Program-aware fuzzing for MQTT applicationsLuis Gustavo Araujo Rodriguez, Daniel Macêdo Batista. 582-586 [doi]
- Automatic support for the identification of infeasible testing requirementsJoão Choma Neto. 587-591 [doi]