dblp: ISSTA 2021 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


30th ISSTA 2021: Virtual Event, Denmark

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Cristian Cadar, Xiangyu Zhang:
ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021. ACM 2021, ISBN 978-1-4503-8459-9
Invited Presentation

Chris Parnin, Alessandro Orso:
Automated debugging: past, present, and future (ISSTA impact paper award). 1
Web Applications

Kulani Mahadewa
, Yanjun Zhang
, Guangdong Bai
, Lei Bu
, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong:
Identifying privacy weaknesses from multi-party trigger-action integration platforms. 2-15

Fei Shao, Rui Xu, Wasif Arman Haque, Jingwei Xu, Ying Zhang, Wei Yang
, Yanfang Ye, Xusheng Xiao
:
WebEvo: taming web application evolution via detecting semantic structure changes. 16-28

Benjamin Barslev Nielsen, Martin Toldam Torp, Anders Møller
:
Modular call graph construction for security scanning of Node.js applications. 29-41
Testing Deep Learning Systems

Zhe Zhao
, Guangke Chen
, Jingyi Wang, Yiwei Yang
, Fu Song, Jun Sun
:
Attack as defense: characterizing adversarial examples using robustness. 42-55

Isaac Dunn
, Hadrien Pouget
, Daniel Kroening
, Tom Melham
:
Exposing previously undetectable faults in deep neural networks. 56-66

Nargiz Humbatova
, Gunel Jahangirova
, Paolo Tonella
:
DeepCrime: mutation testing of deep learning systems based on real faults. 67-78

Tahereh Zohdinasab
, Vincenzo Riccio
, Alessio Gambi, Paolo Tonella
:
DeepHyperion: exploring the feature space of deep learning-based systems through illumination search. 79-90

Fitash Ul Haq
, Donghwan Shin
, Lionel C. Briand
, Thomas Stifter, Jun Wang
:
Automatic test suite generation for key-points detection DNNs using many-objective search (experience paper). 91-102

Lingfeng Zhang
, Yueling Zhang
, Min Zhang
:
Efficient white-box fairness testing through gradient search. 103-114

Zixi Liu, Yang Feng, Zhenyu Chen:
DialTest: automated testing for recurrent-neural-network-driven dialogue systems. 115-126

Quan Zhang
, Yifeng Ding
, Yongqiang Tian
, Jianmin Guo, Min Yuan, Yu Jiang
:
AdvDoor: adversarial backdoor attack of deep learning system. 127-138

Yuanchun Li, Ziqi Zhang, Bingyan Liu, Ziyue Yang, Yunxin Liu:
ModelDiff: testing-based DNN similarity comparison for model reuse detection. 139-151
Android Application Analysis and Testing

Lei Xue, Yuxiao Yan, Luyi Yan
, Muhui Jiang, Xiapu Luo, Dinghao Wu, Yajin Zhou:
Parema: an unpacking framework for demystifying VM-based Android packers. 152-164

Wenyu Wang
, Wing Lam, Tao Xie
:
An infrastructure approach to improving effectiveness of Android UI testing tools. 165-176

Leonardo Mariani
, Ali Mohebbi
, Mauro Pezzè
, Valerio Terragni
:
Semantic matching of GUI events for test reuse: are we there yet? 177-190

Tongtong Xu, Minxue Pan
, Yu Pei
, Guiyin Li, Xia Zeng, Tian Zhang, Yuetang Deng, Xuandong Li:
GUIDER: GUI structure and vision co-guided test script repair for Android apps. 191-203

Jingling Sun
, Ting Su
, Junxin Li
, Zhen Dong, Geguang Pu, Tao Xie
, Zhendong Su:
Understanding and finding system setting-related defects in Android apps. 204-215

Yueming Wu
, Deqing Zou, Wei Yang
, Xiang Li, Hai Jin:
HomDroid: detecting Android covert malware by social-network homophily analysis. 216-229
Fuzzing
Data Processing Application Analysis

Yingjun Lyu
, Sasha Volokh
, William G. J. Halfond
, Omer Tripp
:
SAND: a static analysis approach for detecting SQL antipatterns. 270-282

Yakun Zhang, Xiao Lv, Haoyu Dong, Wensheng Dou, Shi Han, Dongmei Zhang
, Jun Wei, Dan Ye:
Semantic table structure identification in spreadsheets. 283-295
Dynamic Analysis
Symbolic Execution

Peisen Yao
, Heqing Huang
, Wensheng Tang, Qingkai Shi
, Rongxin Wu
, Charles Zhang:
Fuzzing SMT solvers via two-dimensional input space exploration. 322-335

Sicheng Luo, Hui Xu, Yanxiang Bi, Xin Wang, Yangfan Zhou:
Boosting symbolic execution via constraint solving time prediction (experience paper). 336-347

Zhenbang Chen, Zehua Chen, Ziqi Shuai
, Guofeng Zhang
, Weiyu Pan, Yufeng Zhang, Ji Wang:
Synthesize solving strategy for symbolic execution. 348-360

Ziqi Shuai
, Zhenbang Chen, Yufeng Zhang, Jun Sun
, Ji Wang:
Type and interval aware array constraint solving for symbolic execution. 361-373

Weiyu Pan, Zhenbang Chen, Guofeng Zhang
, Yunlai Luo, Yufeng Zhang, Ji Wang:
Grammar-agnostic symbolic execution by token symbolization. 374-387
Machine Learning and Testing

Clothilde Jeangoudoux, Eva Darulova
, Christoph Quirin Lauter:
Interval constraint-based mutation testing of numerical specifications. 388-399

Xufan Zhang, Ning Sun
, Chunrong Fang
, Jiawei Liu, Jia Liu, Dong Chai, Jiang Wang, Zhenyu Chen:
Predoo: precision testing of deep learning operators. 400-412

Saikat Dutta, Jeeva Selvam, Aryaman Jain, Sasa Misailovic:
TERA: optimizing stochastic regression tests in machine learning projects. 413-426

Zhengran Zeng, Yuqun Zhang, Haotian Zhang, Lingming Zhang
:
Deep just-in-time defect prediction: how far are we? 427-438
Configuration and Dependency

Suchita Mukherjee, Abigail Almanza, Cindy Rubio-González:
Fixing dependency errors for Python build reproducibility. 439-451

Runxiang Cheng
, Lingming Zhang
, Darko Marinov
, Tianyin Xu
:
Test-case prioritization for configuration testing. 452-465

Austin Mordahl
, Shiyi Wei:
The impact of tool configuration spaces on the evaluation of configurable taint analysis for Android. 466-477

Wang Li, Zhouyang Jia, Shanshan Li, Yuanliang Zhang, Teng Wang, Erci Xu, Ji Wang, Xiangke Liao:
Challenges and opportunities: an in-depth empirical study on configuration error injection testing. 478-490
Testing

Daniel Elsner, Florian Hauer, Alexander Pretschner, Silke Reimer:
Empirically evaluating readily available information for regression test optimization in continuous integration. 491-504

Sangharatna Godboley
, Joxan Jaffar
, Rasool Maghareh
, Arpita Dutta
:
Toward optimal mc/dc test case generation. 505-516

Salma Messaoudi
, Donghwan Shin
, Annibale Panichella
, Domenico Bianculli
, Lionel C. Briand
:
Log-based slicing for system-level test cases. 517-528

Yishuai Li
, Benjamin C. Pierce
, Steve Zdancewic
:
Model-based testing of networked applications. 529-539

Ashwin Kallingal Joshy
, Xueyuan Chen, Benjamin Steenhoek, Wei Le
:
Validating static warnings via testing code fragments. 540-552

Cong Pan
, Michael Pradel
:
Continuous test suite failure prediction. 553-565

Meng Ren, Zijing Yin
, Fuchen Ma, Zhenyang Xu, Yu Jiang
, Chengnian Sun, Huizhong Li, Yan Cai
:
Empirical evaluation of smart contract testing: what is the best choice? 566-579
Binary Analysis

Shisong Qin
, Chao Zhang, Kaixiang Chen, Zheming Li:
iDEV: exploring and exploiting semantic deviations in ARM instruction processing. 580-592

Ming Yuan, Yeseop Lee, Chao Zhang, Yun Li, Yan Cai
, Bodong Zhao:
RAProducer: efficiently diagnose and reproduce data race bugs for binaries via trace analysis. 593-606

Han Gao
, Shaoyin Cheng
, Yinxing Xue, Weiming Zhang
:
A lightweight framework for function name reassignment based on large-scale stripped binaries. 607-619
Bugs and Analysis

Andrew Habib
, Avraham Shinnar, Martin Hirzel, Michael Pradel
:
Finding data compatibility bugs with JSON subschema checking. 620-632

Ridwan Shariffdeen
, Xiang Gao
, Gregory J. Duck
, Shin Hwei Tan
, Julia Lawall, Abhik Roychoudhury
:
Automated patch backporting in Linux (experience paper). 633-645

Yicheng Pan
, Meng Ma, Xinrui Jiang, Ping Wang:
Faster, deeper, easier: crowdsourcing diagnosis of microservice kernel failure from user space. 646-657
Demo Papers

Alex Groce, Gustavo Grieco:
echidna-parade: a tool for diverse multicore smart contract fuzzing. 658-661

Roberto Natella
, Van-Thuan Pham
:
ProFuzzBench: a benchmark for stateful protocol fuzzing. 662-665

Meng Ren, Fuchen Ma, Zijing Yin
, Huizhong Li, Ying Fu, Ting Chen, Yu Jiang
:
SCStudio: a secure and efficient integrated development environment for smart contracts. 666-669

Matt Windsor
, Alastair F. Donaldson
, John Wickerson
:
C4: the C compiler concurrency checker. 670-673

Yunhan Hou, Jiawei Liu, Daiwei Wang, Jiawei He, Chunrong Fang
, Zhenyu Chen:
TauMed: test augmentation of deep learning in medical diagnosis. 674-677

Hanlin Wei
, Behnaz Hassanshahi, Guangdong Bai
, Padmanabhan Krishnan
, Kostyantyn Vorobyov
:
MoScan: a model-based vulnerability scanner for web single sign-on services. 678-681

Alberto Martin-Lopez
, Sergio Segura
, Antonio Ruiz-Cortés
:
RESTest: automated black-box testing of RESTful web APIs. 682-685

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






