


default search action
32nd ISSTA 2023: Seattle, WA, USA
- René Just, Gordon Fraser:

Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023. ACM 2023
Papers
- Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo:

CydiOS: A Model-Based Testing Framework for iOS Apps. 1-13 - Fuqi Jia

, Rui Han, Pei Huang
, Minghao Liu
, Feifei Ma, Jian Zhang:
Improving Bit-Blasting for Nonlinear Integer Constraints. 14-25 - Yangruibo Ding, Saikat Chakraborty, Luca Buratti, Saurabh Pujar, Alessandro Morari, Gail E. Kaiser

, Baishakhi Ray:
CONCORD: Clone-Aware Contrastive Learning for Source Code. 26-38 - Ensheng Shi, Yanlin Wang

, Hongyu Zhang, Lun Du, Shi Han, Dongmei Zhang, Hongbin Sun:
Towards Efficient Fine-Tuning of Pre-trained Code Models: An Experimental Study and Beyond. 39-51 - Xu Nie, Ningke Li, Kailong Wang

, Shangguang Wang, Xiapu Luo, Haoyu Wang:
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). 52-63 - Zhiqiang Zang

, Aditya Thimmaiah, Milos Gligoric:
Pattern-Based Peephole Optimizations with Java JIT Tests. 64-75 - Michael Chesser, Surya Nepal, Damith C. Ranasinghe:

Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing. 76-88 - Tiancheng Hu, Zijing Xu, Yilin Fang, Yueming Wu

, Bin Yuan, Deqing Zou, Hai Jin:
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree. 89-100 - Dongjie He, Yujiang Gui, Yaoqing Gao

, Jingling Xue:
Reducing the Memory Footprint of IFDS-Based Data-Flow Analyses using Fine-Grained Garbage Collection. 101-113 - Jiangchao Liu, Jierui Liu, Peng Di

, Diyu Wu, Hengjie Zheng, Alex X. Liu, Jingling Xue:
Hybrid Inlining: A Framework for Compositional and Context-Sensitive Static Analysis. 114-126 - Stephan Lipp, Daniel Elsner, Severin Kacianka, Alexander Pretschner, Marcel Böhme, Sebastian Banescu:

Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction. 127-139 - Matteo Kamm, Manuel Rigger, Chengyu Zhang

, Zhendong Su:
Testing Graph Database Engines via Query Partitioning. 140-149 - Richard Schumi, Jun Sun:

Semantic-Based Neural Network Repair. 150-162 - Ziyue Hua, Wei Lin, Luyao Ren, Zongyang Li, Lu Zhang, Wenpin Jiao, Tao Xie:

GDsmith: Detecting Bugs in Cypher Graph Database Engines. 163-174 - Shiwen Yu

, Ting Wang, Ji Wang:
Loop Invariant Inference through SMT Solving Enhanced Reinforcement Learning. 175-187 - Yihong Dong, Ge Li, Zhi Jin:

CODEP: Grammatical Seq2Seq Model for General-Purpose Code Generation. 188-198 - Zhiyu Fan

, Shin Hwei Tan, Abhik Roychoudhury:
Concept-Based Automated Grading of CS-1 Programming Assignments. 199-210 - Yiu Wai Chow, Max Schäfer, Michael Pradel:

Beware of the Unexpected: Bimodal Taint Analysis. 211-222 - Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Yiling He

, Xianhao Liao, Ke Wang
, Jinku Li, Zhan Qin
:
DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity. 223-235 - Muhammad Numair Mansur, Valentin Wüstholz, Maria Christakis:

Dependency-Aware Metamorphic Testing of Datalog Engines. 236-247 - Haoyang Ma, Qingchao Shen, Yongqiang Tian, Junjie Chen, Shing-Chi Cheung:

Fuzzing Deep Learning Compilers with HirGen. 248-260 - Lei Cui, Jiancong Cui

, Yuede Ji, Zhiyu Hao, Lun Li, Zhenquan Ding:
API2Vec: Learning Representations of API Sequences for Malware Detection. 261-273 - Dan Bruce, David A. Kelly, Héctor D. Menéndez, Earl T. Barr, David Clark

:
June: A Type Testability Transformation for Improved ATG Performance. 274-284 - Han Liu

, Sen Chen, Ruitao Feng
, Chengwei Liu, Kaixuan Li
, Zhengzi Xu, Liming Nie, Yang Liu
, Yixiang Chen:
A Comprehensive Study on Quality Assurance Tools for Java. 285-297 - Mingxi Ye, Yuhong Nan, Zibin Zheng, Dongpeng Wu, Huizhong Li:

Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing. 298-309 - Huizhong Guo, Jinfeng Li, Jingyi Wang, Xiangyu Liu, Dongxia Wang, Zehong Hu, Rong Zhang, Hui Xue:

FairRec: Fairness Testing for Deep Recommender Systems. 310-321 - Chaofan Shou, Shangyin Tan, Koushik Sen:

ItyFuzz: Snapshot-Based Fuzzer for Smart Contract. 322-333 - Kaibo Liu

, Yudong Han
, Jie M. Zhang, Zhenpeng Chen
, Federica Sarro, Mark Harman, Gang Huang, Yun Ma:
Who Judges the Judge: An Empirical Study on Online Judge Tests. 334-346 - Zifan Xie

, Ming Wen, Haoxiang Jia, Xiaochen Guo, Xiaotong Huang, Deqing Zou, Hai Jin:
Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation. 347-359 - Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun:

Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. 360-372 - Shuo Yang

, Jiachi Chen
, Zibin Zheng:
Definition and Detection of Defects in NFT Smart Contracts. 373-384 - Ningyu He, Zhehao Zhao

, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. 385-397 - Golnaz Gharachorlu, Nick Sumner

:
Type Batched Program Reduction. 398-410 - Zhaoxu Zhang

, Robert Winn, Yu Zhao, Tingting Yu, William G. J. Halfond:
Automatically Reproducing Android Bug Reports using Natural Language Processing and Reinforcement Learning. 411-422 - Yinlin Deng, Chunqiu Steven Xia, Haoran Peng

, Chenyuan Yang, Lingming Zhang:
Large Language Models Are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models. 423-435 - Zhibo Liu, Dongwei Xiao

, Zongjie Li, Shuai Wang, Wei Meng:
Exploring Missed Optimizations in WebAssembly Optimizers. 436-448 - Carl Hildebrandt

, Meriel von Stein, Sebastian G. Elbaum:
PhysCov: Physical Test Coverage for Autonomous Vehicles. 449-461 - Xudong Zhang, Yan Cai

:
Building Critical Testing Scenarios for Autonomous Driving from Real Accidents. 462-474 - Xuanqi Gao, Juan Zhai

, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement. 475-487 - Mingfei Cheng

, Yuan Zhou
, Xiaofei Xie
:
BehAVExplor: Behavior Diversity Guided Testing for Autonomous Driving Systems. 488-500 - Shenglin Bao, Chaofeng Sha, Bihuan Chen, Xin Peng, Wenyun Zhao:

In Defense of Simple Techniques for Neural Network Test Case Selection. 501-513 - Huaxun Huang, Chi Xu

, Ming Wen, Yepang Liu, Shing-Chi Cheung:
ConfFix: Repairing Configuration Compatibility Issues in Android Apps. 514-525 - Tianchang Gao

, Junjie Chen, Yingquan Zhao
, Yuqun Zhang, Lingming Zhang:
Vectorizing Program Ingredients for Better JVM Testing. 526-537 - Linlin Li, Ruifeng Wang, Xian Zhan, Ying Wang, Cuiyun Gao, Sinan Wang, Yepang Liu:

What You See Is What You Get? It Is Not the Case! Detecting Misleading Icons for Mobile Applications. 538-550 - Yingquan Zhao

, Junjie Chen, Ruifeng Fu, Haojie Ye, Zan Wang:
Testing the Compiler for a New-Born Programming Language: An Industrial Case Study (Experience Paper). 551-563 - William Eiers

, Ganesh Sankaran, Tevfik Bultan:
Quantitative Policy Repair for Access Control on the Cloud. 564-575 - Wenxuan Wang, Jingyuan Huang, Chang Chen, Jiazhen Gu, Jianping Zhang, Weibin Wu, Pinjia He, Michael R. Lyu:

Validating Multimedia Content Moderation Software via Semantic Fusion. 576-588 - Zhongxin Liu, Kui Liu, Xin Xia, Xiaohu Yang:

Towards More Realistic Evaluation for Neural Test Oracle Generation. 589-600 - Jun Wang

, Yanhui Li
, Xiang Huang, Lin Chen, Xiaofang Zhang, Yuming Zhou:
Back Deduction Based Testing for Word Sense Disambiguation Ability of Machine Translation Systems. 601-613 - Simin Chen, Shiyi Wei, Cong Liu, Wei Yang:

DyCL: Dynamic Neural Network Compilation Via Program Rewriting and Graph Optimization. 614-626 - Chengpeng Li, Mohammad Mahdi Khosravi, Wing Lam, August Shi:

Systematically Producing Test Orders to Detect Order-Dependent Flaky Tests. 627-638 - Lei Bu, Qiuping Zhang, Suwan Li, Jinglin Dai, Guangdong Bai

, Kai Chen, Xuandong Li:
Security Checking of Trigger-Action-Programming Smart Home Integrations. 639-651 - Sihan Xu, Ya Gao, Lingling Fan, Linyu Li, Xiangrui Cai, Zheli Liu:

LiResolver: License Incompatibility Resolution for Open Source Software. 652-663 - Yu Liu

, Jiyang Zhang, Pengyu Nie, Milos Gligoric, Owolabi Legunsen:
More Precise Regression Test Selection via Reasoning about Semantics-Modifying Changes. 664-676 - Chen Yang, Junjie Chen, Xingyu Fan, Jiajun Jiang, Jun Sun:

Silent Compiler Bug De-duplication via Three-Dimensional Analysis. 677-689 - Jingyi Shi, Yang Xiao, Yuekang Li

, Yeting Li, Dongsong Yu, Chendong Yu, Hui Su, Yufeng Chen, Wei Huo:
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators. 690-702 - Yuhao Zhou, Wei Song:

DDLDroid: Efficiently Detecting Data Loss Issues in Android Apps. 703-714 - Hang Du

, Vijay Krishna Palepu, James A. Jones:
To Kill a Mutant: An Empirical Study of Mutation Testing Kills. 715-726 - Pengcheng Fang, Zhenhua Zou, Xusheng Xiao, Zhuotao Liu

:
iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements. 727-739 - Hao Liu, Yanlin Wang

, Zhao Wei, Yong Xu, Juhong Wang, Hui Li, Rongrong Ji:
RefBERT: A Two-Stage Pre-trained Framework for Automatic Rename Refactoring. 740-752 - Quan Zhang, Yongqiang Tian, Yifeng Ding, Shanshan Li, Chengnian Sun, Yu Jiang, Jiaguang Sun:

CoopHance: Cooperative Enhancement for Robustness of Deep Learning Systems. 753-765 - Boxi Yu, Zhiqing Zhong

, Jiaqi Li, Yixing Yang
, Shilin He, Pinjia He:
ROME: Testing Image Captioning Systems via Recursive Object Melting. 766-778 - Reese Levine, Mingun Cho, Devon McKee, Andrew Quinn

, Tyler Sorensen
:
GPUHarbor: Testing GPU Memory Consistency at Large (Experience Paper). 779-791 - Yichen He

, Liran Wang, Kaiyi Wang, Yupeng Zhang, Hang Zhang, Zhoujun Li:
COME: Commit Message Generation with Modification Embedding. 792-803 - Chengbin Pang, Tiantai Zhang, Xuelan Xu, Linzhang Wang, Bing Mao:

OCFI: Make Function Entry Identification Hard Again. 804-815 - Yiyu Zhang, Tianyi Liu, Zewen Sun, Zhe Chen, Xuandong Li, Zhiqiang Zuo:

Catamaran: Low-Overhead Memory Safety Enforcement via Parallel Acceleration. 816-828 - Yisong Xiao

, Aishan Liu, Tianlin Li, Xianglong Liu:
Latent Imitator: Generating Natural Individual Discriminatory Instances for Black-Box Fairness Testing. 829-841 - Changwen Li, Joseph Sifakis, Qiang Wang, Rongjie Yan, Jian Zhang:

Simulation-Based Validation for Autonomous Driving Systems. 842-853 - Youngjae Kim, Seungheon Han

, Askar Yeltayuly Khamit, Jooyong Yi:
Automated Program Repair from Fuzzing Perspective. 854-866 - Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma

, Xiapu Luo, Yong Xie, Jianjun Chen, Chao Zhang:
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing. 867-879 - Sungmin Kang, Wonkeun Choi, Shin Yoo:

A Bayesian Framework for Automated Debugging. 880-891 - Daniel Lehmann, Michelle Thalakottur, Frank Tip, Michael Pradel:

That's a Tough Call: Studying the Challenges of Call Graph Construction for WebAssembly. 892-903 - Zihan Wang, Pengbo Nie, Xinyuan Miao, Yuting Chen, Chengcheng Wan

, Lei Bu, Jianjun Zhao:
GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing. 904-916 - Yiming Zhang

, Yuxin Hu, Haonan Li, Wenxuan Shi, Zhenyu Ning, Xiapu Luo, Fengwei Zhang:
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features. 917-928 - Vasudev Vikram, Isabella Laybourn, Ao Li, Nicole Nair

, Kelton OBrien
, Rafaello Sanna, Rohan Padhye
:
Guiding Greybox Fuzzing with Mutation Testing. 929-941 - Xiaodong Zhang, Wei Zhao, Yang Sun, Jun Sun, Yulong Shen, Xuewen Dong, Zijiang Yang:

Testing Automated Driving Systems by Breaking Many Laws Efficiently. 942-953 - Tahereh Zohdinasab, Vincenzo Riccio

, Paolo Tonella:
DeepAtash: Focused Test Generation for Deep Learning Systems. 954-966 - Chu Chen, Pinghong Ren, Zhenhua Duan, Cong Tian, Xu Lu, Bin Yu:

SBDT: Search-Based Differential Testing of Certificate Parsers in SSL/TLS Implementations. 967-979 - Zeqin Liao

, Sicheng Hao, Yuhong Nan, Zibin Zheng:
SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis. 980-991 - Jiajun Hu, Lili Wei, Yepang Liu, Shing-Chi Cheung:

ωTest: WebView-Oriented Testing for Android Applications. 992-1004 - Mingyi Zhou

, Xiang Gao, Jing Wu, John C. Grundy, Xiao Chen, Chunyang Chen, Li Li:
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems. 1005-1017 - Juan C. Alonso

, Sergio Segura, Antonio Ruiz-Cortés:
AGORA: Automated Generation of Test Oracles for REST APIs. 1018-1030 - Max Eisele, Daniel Ebert, Christopher Huth, Andreas Zeller:

Fuzzing Embedded Systems using Debug Interfaces. 1031-1042 - He Su, Feng Li, Lili Xu, Wenbo Hu, Yujie Sun, Qing Sun, Huina Chao, Wei Huo:

Splendor: Static Detection of Stored XSS in Modern Web Applications. 1043-1054 - Pablo Valle, Aitor Arrieta, Maite Arratibel:

Applying and Extending the Delta Debugging Algorithm for Elevator Dispatching Algorithms (Experience Paper). 1055-1067 - Ziyad Alsaeed, Michal Young:

Finding Short Slow Inputs Faster with Grammar-Based Search. 1068-1079 - Yang Chen

, Alperen Yildiz, Darko Marinov, Reyhaneh Jabbarvand:
Transforming Test Suites into Croissants. 1080-1092 - Tian Tan, Yue Li:

Tai-e: A Developer-Friendly Static Analysis Framework for Java by Harnessing the Good Designs of Classics. 1093-1105 - Xiangzhe Xu, Shiwei Feng, Yapeng Ye, Guangyu Shen, Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang

, Xiangyu Zhang:
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis. 1106-1118 - Tianxiao Wang, Chen Zhi, Xiaoqun Zhou, Jinjie Wu, Jianwei Yin, Shuiguang Deng:

Data Constraint Mining for Automatic Reconciliation Scripts Generation. 1119-1130 - Nadia Daoudi

, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
Guided Retraining to Enhance the Detection of Difficult Android Malware. 1131-1143 - Queping Kong, Jiachi Chen

, Yanlin Wang
, Zigui Jiang, Zibin Zheng:
DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols. 1144-1156 - Yuzhou Fang, Daoyuan Wu

, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu
, Lingxiao Jiang
:
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts. 1157-1168 - Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo

:
Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing. 1169-1181 - Zhiyi Xue

, Si Liu
, Zhaodi Zhang, Yiting Wu, Min Zhang:
A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation. 1182-1194 - Juan Altmayer Pizzorno

, Emery D. Berger
:
SlipCover: Near Zero-Overhead Code Coverage for Python. 1195-1206 - Yannan Li, Jingbo Wang

, Chao Wang:
Systematic Testing of the Data-Poisoning Robustness of KNN. 1207-1218 - Karine Even-Mendoza, Arindam Sharma

, Alastair F. Donaldson, Cristian Cadar:
GrayC: Greybox Fuzzing of Compilers and Analysers for C. 1219-1231 - Myeongsoo Kim, Davide Corradini, Saurabh Sinha, Alessandro Orso, Michele Pasqua, Rachel Tzoref-Brill, Mariano Ceccato:

Enhancing REST API Testing with NLP Techniques. 1232-1243 - Yu Pan, Zhichao Xu, Levi Taiji Li, Yunhe Yang, Mu Zhang

:
Automated Generation of Security-Centric Descriptions for Smart Contract Bytecode. 1244-1256 - Yifan Mo, Jiachi Chen

, Yanlin Wang
, Zibin Zheng:
Toward Automated Detecting Unanticipated Price Feed in Smart Contract. 1257-1268 - Dhia Elhaq Rzig, Nafees Iqbal, Isabella Attisano, Xue Qin

, Foyzul Hassan:
Virtual Reality (VR) Automated Testing in the Wild: A Case Study on Unity-Based VR Applications. 1269-1281 - Yi Wu

, Nan Jiang
, Hung Viet Pham, Thibaud Lutellier
, Jordan Davis, Lin Tan, Petr Babkin, Sameena Shah:
How Effective Are Neural Networks for Fixing Security Vulnerabilities. 1282-1294 - Seemanta Saha, Laboni Sarker, Md Shafiuzzaman, Chaofan Shou, Albert Li, Ganesh Sankaran, Tevfik Bultan:

Rare Path Guided Fuzzing. 1295-1306 - Piyus Kedia, Rahul Purandare

, Udit Kumar Agarwal, Rishabh:
CGuard: Scalable and Precise Object Bounds Protection for C. 1307-1318 - Yiheng Xiong, Mengqian Xu, Ting Su, Jingling Sun, Jue Wang

, He Wen, Geguang Pu, Jifeng He, Zhendong Su:
An Empirical Study of Functional Bugs in Android Apps. 1319-1331 - Jingyao Zhou, Lei Xu, Gongzheng Lu, Weifeng Zhang, Xiangyu Zhang:

NodeRT: Detecting Races in Node.js Applications Practically. 1332-1344 - Chao Li, Rui Chen, Boxiang Wang, Zhixuan Wang, Tingting Yu, Yunsong Jiang, Bin Gu, Mengfei Yang:

An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software. 1345-1356 - Abdoul Kader Kaboré, Earl T. Barr, Jacques Klein, Tegawendé F. Bissyandé:

CodeGrid: A Grid Representation of Code. 1357-1369 - Jian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun, Xudong Liu, Chunming Hu, Yang Liu

:
Detecting Condition-Related Bugs with Control Flow Graph Neural Network. 1370-1382 - Ling Jiang, Hengchen Yuan, Qiyi Tang, Sen Nie, Shi Wu, Yuqun Zhang:

Third-Party Library Dependency for Large-Scale SCA in the C/C++ Ecosystem: How Far Are We? 1383-1395 - Jiradet Ounjai, Valentin Wüstholz, Maria Christakis:

Green Fuzzer Benchmarking. 1396-1406 - Yutao Hu, Suyuan Wang, Wenke Li

, Junru Peng, Yueming Wu
, Deqing Zou, Hai Jin:
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? 1407-1419 - Kunlun Ren, Weizhong Qiang, Yueming Wu

, Yi Zhou, Deqing Zou, Hai Jin:
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors. 1420-1432 - Dhanushka Jayasuriya, Valerio Terragni, Jens Dietrich

, Samuel Ou, Kelly Blincoe:
Understanding Breaking Changes in the Wild. 1433-1444 - Dylan Callaghan

, Bernd Fischer:
Improving Spectrum-Based Localization of Multiple Faults by Iterative Test Suite Reduction. 1445-1457 - Yu Liu

, Pengyu Nie, Anna Guo, Milos Gligoric, Owolabi Legunsen:
Extracting Inline Tests from Unit Tests. 1458-1470
Tool Demonstrations
- Yuhao Zhou, Wei Song:

DDLDroid: A Static Analyzer for Automatically Detecting Data Loss Issues in Android Applications. 1471-1474 - Roland Kuhn, Alan Darmasaputra:

Behaviorally Typed State Machines in TypeScript for Heterogeneous Swarms. 1475-1478 - Austin Mordahl, Dakota Soles, Miao Miao, Zenong Zhang, Shiyi Wei:

ECSTATIC: Automatic Configuration-Aware Testing and Debugging of Static Analysis Tools. 1479-1482 - Mayank Sharma, Pingshi Yu, Alastair F. Donaldson:

RustSmith: Random Differential Compiler Testing for Rust. 1483-1486 - Qinglong Wang, Runzhe Wang, Yuxi Hu, Xiaohai Shi, Zheng Liu, Tao Ma, Houbing Song

, Heyuan Shi
:
KeenTune: Automated Tuning Tool for Cloud Application Performance Testing and Optimization. 1487-1490 - Daniel Schemmel, Julian Büning, Frank Busse

, Martin Nowack, Cristian Cadar:
KDAlloc: The KLEE Deterministic Allocator: Deterministic Memory Allocation during Symbolic Execution and Test Case Replay. 1491-1494 - Konstantinos Sagonas

, Thanasis Typaldos:
EDHOC-Fuzzer: An EDHOC Protocol State Fuzzer. 1495-1498 - Frederico Ramos

, Diogo Costa Reis, Miguel Trigo, António Morgado
, José Fragoso Santos
:
MetaData262: Automatic Test Suite Selection for Partial JavaScript Implementations. 1499-1502 - Sven Peldszus

, Noubar Akopian, Thorsten Berger:
RobotBT: Behavior-Tree-Based Test-Case Specification for the Robot Framework. 1503-1506 - Ziyad Alsaeed, Michal Young:

TreeLine and SlackLine: Grammar-Based Performance Fuzzing on Coffee Break. 1507-1510 - Francisco Ferreira

, Sung-Shik Jongmans:
Oven: Safe and Live Communication Protocols in Scala, using Synthetic Behavioural Type Analysis. 1511-1514 - Frédéric Tuong

, Mohammad Omidvar Tehrani, Marco Gaboardi
, Steven Y. Ko:
SymRustC: A Hybrid Fuzzer for Rust. 1515-1518 - Facundo Molina

, Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias
:
EvoSpex: A Search-Based Tool for Postcondition Inference. 1519-1522 - Sunzhou Huang

, Xiaoyin Wang:
PExReport-Maven: Creating Pruned Executable Cross-Project Failure Reports in Maven Build System. 1523-1526
Late PhD Students
- Mara Downing:

Quantitative Robustness Analysis of Neural Networks. 1527-1531 - Austin Mordahl:

Automatic Testing and Benchmarking for Configurable Static Analysis Tools. 1532-1536 - Ori Roth:

Type Automata. 1537-1540 - Sohil Lal Shrestha:

Harnessing Large Language Models for Simulink Toolchain Testing and Developing Diverse Open-Source Corpora of Simulink Models for Metric and Evolution Analysis. 1541-1545
Early PhD Students
- Huizhong Guo:

Fairness Testing for Recommender Systems. 1546-1548 - Laboni Sarker:

Quantitative Symbolic Similarity Analysis. 1549-1551 - Pingshi Yu:

Reasoning about MLIR Semantics through Effects and Handlers. 1552-1554

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














