Abstract is missing.
- Automated debugging: past, present, and future (ISSTA impact paper award)Chris Parnin, Alessandro Orso. 1 [doi]
- Identifying privacy weaknesses from multi-party trigger-action integration platformsKulani Mahadewa, Yanjun Zhang, Guangdong Bai, Lei Bu, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong. 2-15 [doi]
- WebEvo: taming web application evolution via detecting semantic structure changesFei Shao, Rui Xu, Wasif Haque, Jingwei Xu 0004, Ying Zhang, Wei Yang, Yanfang Ye, Xusheng Xiao. 16-28 [doi]
- Modular call graph construction for security scanning of Node.js applicationsBenjamin Barslev Nielsen, Martin Toldam Torp, Anders Møller. 29-41 [doi]
- Attack as defense: characterizing adversarial examples using robustnessZhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun 0005. 42-55 [doi]
- Exposing previously undetectable faults in deep neural networksIsaac Dunn, Hadrien Pouget, Daniel Kroening, Tom Melham. 56-66 [doi]
- DeepCrime: mutation testing of deep learning systems based on real faultsNargiz Humbatova, Gunel Jahangirova, Paolo Tonella. 67-78 [doi]
- DeepHyperion: exploring the feature space of deep learning-based systems through illumination searchTahereh Zohdinasab, Vincenzo Riccio, Alessio Gambi, Paolo Tonella. 79-90 [doi]
- Automatic test suite generation for key-points detection DNNs using many-objective search (experience paper)Fitash Ul Haq, Donghwan Shin 0001, Lionel C. Briand, Thomas Stifter, Jun Wang. 91-102 [doi]
- Efficient white-box fairness testing through gradient searchLingFeng Zhang, Yueling Zhang, Min Zhang. 103-114 [doi]
- DialTest: automated testing for recurrent-neural-network-driven dialogue systemsZixi Liu, Yang Feng, Zhenyu Chen 0001. 115-126 [doi]
- AdvDoor: adversarial backdoor attack of deep learning systemQuan Zhang, Yifeng Ding, Yongqiang Tian, Jianmin Guo, Min Yuan, Yu Jiang. 127-138 [doi]
- ModelDiff: testing-based DNN similarity comparison for model reuse detectionYuanchun Li, Ziqi Zhang, Bingyan Liu, Ziyue Yang, Yunxin Liu. 139-151 [doi]
- Parema: an unpacking framework for demystifying VM-based Android packersLei Xue 0001, Yuxiao Yan, Luyi Yan, Muhui Jiang, Xiapu Luo, Dinghao Wu, Yajin Zhou. 152-164 [doi]
- An infrastructure approach to improving effectiveness of Android UI testing toolsWenyu Wang, Wing Lam, Tao Xie 0001. 165-176 [doi]
- Semantic matching of GUI events for test reuse: are we there yet?Leonardo Mariani, Ali Mohebbi, Mauro Pezzè, Valerio Terragni. 177-190 [doi]
- GUIDER: GUI structure and vision co-guided test script repair for Android appsTongtong Xu, Minxue Pan, Yu Pei 0001, Guiyin Li, Xia Zeng, Tian Zhang, Yuetang Deng, Xuandong Li. 191-203 [doi]
- Understanding and finding system setting-related defects in Android appsJingling Sun, Ting Su, Junxin Li, Zhen Dong, Geguang Pu, Tao Xie, Zhendong Su. 204-215 [doi]
- HomDroid: detecting Android covert malware by social-network homophily analysisYueming Wu, Deqing Zou, Wei Yang, Xiang Li, Hai Jin 0001. 216-229 [doi]
- Seed selection for successful fuzzingAdrian Herrera, Hendra Gunadi, Shane Magrath, Michael Norrish, Mathias Payer, Antony L. Hosking. 230-243 [doi]
- Gramatron: effective grammar-aware fuzzingPrashast Srivastava, Mathias Payer. 244-256 [doi]
- QFuzz: quantitative fuzzing for side channelsYannic Noller, Saeid Tizpaz Niari. 257-269 [doi]
- SAND: a static analysis approach for detecting SQL antipatternsYingjun Lyu, Sasha Volokh, William G. J. Halfond, Omer Tripp. 270-282 [doi]
- Semantic table structure identification in spreadsheetsYakun Zhang, Xiao Lv, Haoyu Dong, Wensheng Dou, Shi Han, Dongmei Zhang, Jun Wei 0001, Dan Ye. 283-295 [doi]
- Runtime detection of memory errors with smart statusZhe Chen, Chong Wang, Junqi Yan, Yulei Sui, Jingling Xue. 296-308 [doi]
- UAFSan: an object-identifier-based dynamic approach for detecting use-after-free vulnerabilitiesBinfa Gui, Wei Song, Jeff Huang 0001. 309-321 [doi]
- Fuzzing SMT solvers via two-dimensional input space explorationPeisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang. 322-335 [doi]
- Boosting symbolic execution via constraint solving time prediction (experience paper)Sicheng Luo, Hui Xu, Yanxiang Bi, Xin Wang, Yangfan Zhou. 336-347 [doi]
- Synthesize solving strategy for symbolic executionZhenbang Chen, Zehua Chen, Ziqi Shuai, Guofeng Zhang, Weiyu Pan, Yufeng Zhang 0001, Ji Wang 0001. 348-360 [doi]
- Type and interval aware array constraint solving for symbolic executionZiqi Shuai, Zhenbang Chen, Yufeng Zhang 0001, Jun Sun, Ji Wang 0001. 361-373 [doi]
- Grammar-agnostic symbolic execution by token symbolizationWeiyu Pan, Zhenbang Chen, Guofeng Zhang, Yunlai Luo, Yufeng Zhang 0001, Ji Wang 0001. 374-387 [doi]
- Interval constraint-based mutation testing of numerical specificationsClothilde Jeangoudoux, Eva Darulova, Christoph Quirin Lauter. 388-399 [doi]
- Predoo: precision testing of deep learning operatorsXufan Zhang, Ning Sun, Chunrong Fang, Jiawei Liu, Jia Liu, Dong Chai, Jiang Wang, Zhenyu Chen. 400-412 [doi]
- TERA: optimizing stochastic regression tests in machine learning projectsSaikat Dutta 0001, Jeeva Selvam, Aryaman Jain, Sasa Misailovic. 413-426 [doi]
- Deep just-in-time defect prediction: how far are we?Zhengran Zeng, Yuqun Zhang, Haotian Zhang, Lingming Zhang. 427-438 [doi]
- Fixing dependency errors for Python build reproducibilitySuchita Mukherjee, Abigail Almanza, Cindy Rubio-González. 439-451 [doi]
- Test-case prioritization for configuration testingRunxiang Cheng, Lingming Zhang, Darko Marinov, Tianyin Xu. 452-465 [doi]
- The impact of tool configuration spaces on the evaluation of configurable taint analysis for AndroidAustin Mordahl, Shiyi Wei. 466-477 [doi]
- Challenges and opportunities: an in-depth empirical study on configuration error injection testingWang Li, Zhouyang Jia, Shanshan Li, Yuanliang Zhang, Teng Wang 0004, Erci Xu, Ji Wang, Xiangke Liao. 478-490 [doi]
- Empirically evaluating readily available information for regression test optimization in continuous integrationDaniel Elsner, Florian Hauer, Alexander Pretschner, Silke Reimer. 491-504 [doi]
- Toward optimal mc/dc test case generationSangharatna Godboley, Joxan Jaffar, Rasool Maghareh, Arpita Dutta. 505-516 [doi]
- Log-based slicing for system-level test casesSalma Messaoudi, Donghwan Shin 0001, Annibale Panichella, Domenico Bianculli, Lionel C. Briand. 517-528 [doi]
- Model-based testing of networked applicationsYishuai Li, Benjamin C. Pierce, Steve Zdancewic. 529-539 [doi]
- Validating static warnings via testing code fragmentsAshwin Kallingal Joshy, Xueyuan Chen, Benjamin Steenhoek, Wei Le. 540-552 [doi]
- Continuous test suite failure predictionCong Pan, Michael Pradel. 553-565 [doi]
- Empirical evaluation of smart contract testing: what is the best choice?Meng Ren, Zijing Yin, Fuchen Ma, ZhenYang Xu, Yu Jiang, Chengnian Sun, Huizhong Li, Yan Cai. 566-579 [doi]
- iDEV: exploring and exploiting semantic deviations in ARM instruction processingShisong Qin, Chao Zhang, Kaixiang Chen, Zheming Li. 580-592 [doi]
- RAProducer: efficiently diagnose and reproduce data race bugs for binaries via trace analysisMing Yuan, Yeseop Lee, Chao Zhang, Yun Li, Yan Cai, Bodong Zhao. 593-606 [doi]
- A lightweight framework for function name reassignment based on large-scale stripped binariesHan Gao, Shaoyin Cheng, Yinxing Xue, Weiming Zhang. 607-619 [doi]
- Finding data compatibility bugs with JSON subschema checkingAndrew Habib, Avraham Shinnar, Martin Hirzel, Michael Pradel. 620-632 [doi]
- Automated patch backporting in Linux (experience paper)Ridwan Shariffdeen, Xiang Gao, Gregory J. Duck, Shin Hwei Tan, Julia Lawall, Abhik Roychoudhury. 633-645 [doi]
- Faster, deeper, easier: crowdsourcing diagnosis of microservice kernel failure from user spaceYicheng Pan, Meng Ma, Xinrui Jiang, Ping Wang. 646-657 [doi]
- echidna-parade: a tool for diverse multicore smart contract fuzzingAlex Groce, Gustavo Grieco. 658-661 [doi]
- ProFuzzBench: a benchmark for stateful protocol fuzzingRoberto Natella, Van-Thuan Pham. 662-665 [doi]
- SCStudio: a secure and efficient integrated development environment for smart contractsMeng Ren, Fuchen Ma, Zijing Yin, Huizhong Li, Ying Fu, Ting Chen, Yu Jiang. 666-669 [doi]
- C4: the C compiler concurrency checkerMatt Windsor, Alastair F. Donaldson, John Wickerson. 670-673 [doi]
- TauMed: test augmentation of deep learning in medical diagnosisYunhan Hou, Jiawei Liu, Daiwei Wang, Jiawei He, Chunrong Fang, Zhenyu Chen. 674-677 [doi]
- MoScan: a model-based vulnerability scanner for web single sign-on servicesHanlin Wei, Behnaz Hassanshahi, Guangdong Bai, Padmanabhan Krishnan, Kostyantyn Vorobyov. 678-681 [doi]
- RESTest: automated black-box testing of RESTful web APIsAlberto Martin-Lopez, Sergio Segura, Antonio Ruiz Cortés. 682-685 [doi]