ICST 2024 (https://conf.researchr.org/home/icst-2024) invites high-quality submissions in all areas of software testing, verification, and validation. Papers for the research track should present novel and original work that advances the state-of-the-art. Case studies and empirical research papers are also welcome.
Wed 29 MayDisplayed time zone: Eastern Time (US & Canada) change
11:00 - 12:40 | Testing and LLMsIndustry / Research Papers at Room 2 & 3 Chair(s): Sudipta Chattopadhyay Singapore University of Technology and Design | ||
11:00 20mIndustry talk | Are We Testing or Being Tested? Exploring the Practical Applications of Large Language Models in Software Testing Industry Robson T. de Souza Santos , Italo Santos Northern Arizona University, Cleyton V. C. de Magalhaes CESAR School, Ronnie de Souza Santos University of Calgary | ||
11:20 20mResearch paper | Improving Patch Correctness Analysis via Random Testing and Large Language Models Research Papers Facundo Molina IMDEA Software Institute, Juan Manuel Copia IMDEA Software Institute; Universidad Politécnica de Madrid, Alessandra Gorla IMDEA Software Institute Pre-print | ||
11:40 20mResearch paper | Intent-Driven Mobile GUI Testing with Autonomous Large Language Model Agents Research Papers Juyeon Yoon Korea Advanced Institute of Science and Technology, Robert Feldt Chalmers University of Technology, Sweden, Shin Yoo Korea Advanced Institute of Science and Technology Pre-print | ||
12:00 20mResearch paper | KAT: Dependency-aware Automated API Testing with Large Language Models Research Papers Tri Le , Thien Tran , Duy Cao , Vy Le , Vu Nguyen Head of Research, Katalon Inc.; University of Science, VNU-HCM, Vietnam, Tien N. Nguyen University of Texas at Dallas | ||
12:20 20mResearch paper | Quantizing Large-Language Models for Predicting Flaky Tests Research Papers Shanto Rahman The University of Texas at Austin, Abdelrahman Baz , Sasa Misailovic University of Illinois at Urbana-Champaign, August Shi The University of Texas at Austin |
15:30 - 17:00 | FuzzingJournal-First Papers / Research Papers / Testing Tools and Demonstration at Room 1 Chair(s): Sahar Tahvili Ericsson AB | ||
15:30 20mResearch paper | MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing Research Papers Yang Zhang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Puzhuo Liu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Laile Xi , Xiao Lu , Xin Chen , Shuaizong Si , Limin Sun Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, | ||
15:50 20mResearch paper | U-Fuzz: Stateful Fuzzing of IoT Protocols on COTS Devices Research Papers Shang Zewen , Matheus Eduardo Garbelini , Sudipta Chattopadhyay Singapore University of Technology and Design | ||
16:10 20mResearch paper | Formatted Stateful Greybox Fuzzing of TLS server Research Papers Fan Hu , Jiangan Ji , Hui Shu , Zheming Li Tsinghua University, Tieming Liu , Chao Zhang Tsinghua University | ||
16:30 20mLong-paper | A Fuzzing-Based Test-Creation Approach for Evaluating Digital TV Receivers via Transport Streams Journal-First Papers Fabrício Izumi Banceira , Eddie Lima Samsung Electronics, Brazil, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil, Orlewilson Maia , Rômulo Fabrício , Bruno Farias University of Manchester, UK, Aguinaldo Silva | ||
16:50 10mDemonstration | MOTIF: A tool for Mutation Testing with Fuzzing Testing Tools and Demonstration Jaekwon Lee University of Ottawa & University of Luxembourg, Enrico Viganò University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland |
Thu 30 MayDisplayed time zone: Eastern Time (US & Canada) change
11:00 - 12:40 | Test FlakinessJournal-First Papers / Research Papers / Industry at Room 1 Chair(s): Andrea Stocco Technical University of Munich, fortiss | ||
11:00 20mLong-paper | Test Code Flakiness in Mobile Apps: The Developer's Perspective Journal-First Papers Valeria Pontillo Vrije Universiteit Brussel, Fabio Palomba University of Salerno, Filomena Ferrucci University of Salerno Link to publication | ||
11:20 20mLong-paper | Flakiness goes live: Insights from an In Vivo testing simulation study Journal-First Papers Morena Barboni University of Camerino, Antonia Bertolino National Research Council, Italy, Guglielmo De Angelis CNR-IASI | ||
11:40 20mResearch paper | 262,447 Test Failures Later: An Empirical Evaluation of Flaky Failure Classifiers Research Papers Abdulrahman Alshammari George Mason University, Paul Ammann George Mason University, USA, Michael Hilton Carnegie Mellon University, Jonathan Bell Northeastern University | ||
12:00 20mResearch paper | Automatically Reproducing Timing-Dependent Flaky-Test Failures Research Papers Shanto Rahman The University of Texas at Austin, Aaron Massey George Mason University, Wing Lam George Mason University, August Shi The University of Texas at Austin, Jonathan Bell Northeastern University | ||
12:20 20mIndustry talk | Cost of Flaky Tests in CI: An Industrial Case Study Industry Fabian Leinen Technical University of Munich, Daniel Elsner TU Munich, Alexander Pretschner TU Munich, Andreas Stahlbauer , Michael Sailer , Elmar Juergens CQSE GmbH Pre-print |
11:00 - 12:40 | Mutation Testing and Test PrioritizaitonResearch Papers / Journal-First Papers / Industry at Room 2 & 3 Chair(s): Facundo Molina IMDEA Software Institute | ||
11:00 20mIndustry talk | Towards Mutation-guided Test Suites for Smart Contracts Industry Pre-print | ||
11:20 20mResearch paper | On the Coupling between Vulnerabilities and LLM-generated Mutants: A Study on Vul4J dataset Research Papers Aayush Garg Luxembourg Institute of Science and Technology, Renzo Degiovanni Luxembourg Institute of Science and Technology, Mike Papadakis University of Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg Pre-print | ||
11:40 20mLong-paper | Mutation Testing Optimisations using the Clang Front-end Journal-First Papers Sten Vercammen , Serge Demeyer University of Antwerp; Flanders Make, Markus Borg CodeScene, Niklas Pettersson , Görel Hedin Lund University | ||
12:00 20mResearch paper | MACS: Multi-agent Adversarial Reinforcement Learning for Finding Diverse Critical Driving Scenarios Research Papers Shuting Kang University of Chinese Academy of Sciences, Qian Dong Institute of Software Chinese Academy of Sciences, Yunzhi Xue Institute of Software Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences | ||
12:20 20mLong-paper | Lessons learned from replicating a study on information-retrieval-based test case prioritization Journal-First Papers Nasir Mehmood Minhas Mälardalen University, Mohsin Irshad , Kai Petersen University of Applied Sciences Flensburg, Germany / Blekinge Institute of Technology, Sweden, Jürgen Börstler Blekinge Institute of Technology |
12:40 - 14:00 | |||
12:40 80mLunch | Lunch Social |
14:00 - 15:00 | Software Testing Education and Fault LocalizationResearch Papers / Journal-First Papers at Room 1 Chair(s): Shin Yoo Korea Advanced Institute of Science and Technology | ||
14:00 20mResearch paper | State of the Practice in Software Testing Teaching in Four European Countries Research Papers Porfirio Tramontana Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Italy, Beatriz Marín Universitat Politècnica de València, Ana Paiva Faculty of Engineering, University of Porto and INESC TEC, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC, Tanja E. J. Vos Universitat Politècnica de València and Open Universiteit, Domenico Amalfitano University of Naples Federico II, Felix Cammaerts KU Leuven, Monique Snoeck Katholieke Universiteit Leuven, Anna Rita Fasolino Federico II University of Naples | ||
14:20 20mLong-paper | Can gamification help in software testing education? Findings from an empirical study Journal-First Papers Raquel Blanco , Manuel Trinidad , María José Suárez-Cabal , Alejandro Calderón Sánchez , Mercedes Ruiz University of Cadiz, Javier Tuya Computer Science Department, University of Oviedo | ||
14:40 20mResearch paper | FusionFL: A statement-level feature fusion based fault localization approach Research Papers Yanbo Zhang , Yawen Wang State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Dongming Zhu , Wenjing Liu |
Fri 31 MayDisplayed time zone: Eastern Time (US & Canada) change
11:00 - 12:20 | Testing and ApplicationsResearch Papers / Testing Tools and Demonstration / Industry at Room 1 Chair(s): Jeremy Bradbury Ontario Tech University | ||
11:00 20mIndustry talk | In industrial embedded software, are some compilation errors easier to localize and fix than others? Industry Han Fu , Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity, Kristian Wiklund Ericsson AB, Andreas Ermedahl , Philipp Haller KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden | ||
11:20 20mResearch paper | Brewing Up Reliability: Espresso Test Generation for Android Apps Research Papers Iván Arcuschin Moreno University of Buenos Aires, Argentina, Lisandro Di Meo , Michael Auer University of Passau, Juan Pablo Galeotti University of Buenos Aires, Gordon Fraser University of Passau DOI Pre-print | ||
11:40 20mResearch paper | Differential Optimization Testing of Gremlin-Based Graph Database Systems Research Papers Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Jiansen Song Institute of Software Chinese Academy of Sciences, Ziyue Cheng , Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong , Tao Huang Institute of Software Chinese Academy of Sciences | ||
12:00 10mDemonstration | MLHCBugs: A Framework to Reproduce Real Faults in Healthcare Machine Learning Applications Testing Tools and Demonstration Guna Sekaran Jaganathan , Nazmul Kazi , Indika Kahanda University of North Florida, Upulee Kanewala University of North Florida | ||
12:10 10mDemonstration | The GitHub Recent Bugs Dataset for Evaluating LLM-based Debugging Applications Testing Tools and Demonstration Jae Yong Lee , Sungmin Kang , Juyeon Yoon Korea Advanced Institute of Science and Technology, Shin Yoo Korea Advanced Institute of Science and Technology |
11:00 - 12:20 | Testing with and for Deep and Reinforcement LearningResearch Papers / Industry at Room 2 & 3 Chair(s): Paolo Arcaini National Institute of Informatics | ||
11:00 20mResearch paper | METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities Research Papers Sangwon Hyun University of Adelaide, Mingyu Guo , Muhammad Ali Babar School of Computer Science, The University of Adelaide | ||
11:20 20mIndustry talk | End-to-end RPA-like testing using reinforcement learning Industry Ciprian Paduraru University of Bucharest, Rares Cristea University of Bucharest, Alin Stefanescu University of Bucharest | ||
11:40 20mResearch paper | Spectral Analysis of the Relation between Deep Learning Faults and Neural Activation Values Research Papers | ||
12:00 20mResearch paper | Learning Environment Models with Continuous Stochastic Dynamics - with an Application to Deep RL Testing Research Papers Martin Tappler TU Wien, Austria, Edi Muskardin , Bernhard Aichernig Graz University of Technology, Bettina Könighofer |
13:30 - 14:30 | Testing and RepairResearch Papers / Industry at Room 1 Chair(s): August Shi The University of Texas at Austin | ||
13:30 20mResearch paper | Evolutionary Testing for Program Repair Research Papers Haifeng Ruan , Hoang Lam Nguyen Humboldt-Universität zu Berlin, Ridwan Salihin Shariffdeen National University of Singapore, Yannic Noller Singapore University of Technology and Design, Abhik Roychoudhury National University of Singapore | ||
13:50 20mResearch paper | Does Going Beyond Branch Coverage Make Program Repair Tools More Reliable? Research Papers Amirfarhad Nilizadeh University of Central Florida, Gary T. Leavens University of Central Florida, Corina Pasareanu CMU, NASA, KBR, Xuan-Bach D. Le The University of Melbourne, David Cok CEA, LIST, Software Safety and Security Laboratory | ||
14:10 20mIndustry talk | SafeRevert: When Can Breaking Changes be Automatically Reverted? Industry Pre-print |
13:30 - 14:30 | Metamorphic and Combinatorial TestingIndustry / Journal-First Papers at Room 2 & 3 Chair(s): Wishnu Prasetya Utrecht University | ||
13:30 20mIndustry talk | Metamorphic Testing of an Autonomous Delivery Robots Scheduler Industry Thomas Laurent Lero@Trinity College Dublin, Paolo Arcaini National Institute of Informatics
, Xiao-Yi Zhang , Fuyuki Ishikawa National Institute of Informatics Pre-print | ||
13:50 20mLong-paper | Design, implementation, and validation of a benchmark generator for combinatorial interaction testing tools Journal-First Papers |
Accepted Papers
Call for Papers
ICST 2024 (https://conf.researchr.org/home/icst-2024) invites high-quality submissions in all areas of software testing, verification, and validation. Papers for the research track should present novel and original work that advances the state-of-the-art. Case studies and empirical research papers are also welcome.
Topics of Interest
Topics of interest include, but are not limited to, the following:- Automated test generation, e.g., fuzz testing, search-based test generation, (dynamic) symbolic execution
- Manual testing practices and techniques
- Security testing
- Model-based testing
- Test automation
- Static analysis and symbolic execution
- Formal verification and model checking
- Software reliability
- Social aspects of software testing process
- Testability and design
- Testing and development processes
- Testing education
- Testing in specific domains, such as mobile, web, embedded/cyber-physical systems, concurrent, distributed, cloud, GUI, and real-time systems
- Testing for learning-enabled software, including deep learning
- Testing video games, augmented reality
- Testing/debugging tools
- Theory of software testing
- Empirical studies
- Experience reports
Each submission will be reviewed by at least three members of the ICST Program Committee.
Papers that have a strong industrial/practical component and focus more on impact rather than (technical) novelty are encouraged to consider the industry track instead.
Submission Format
Full Research papers, as well as Industry papers, must conform to the two-column IEEE conference publication format, not exceed 10 pages, including all text, figures, tables, and appendices; two additional pages containing only references are permitted. It must conform to the IEEE Conference Proceedings Formatting Guidelines (please use the letter format template and conference option). The ICST 2024 research track only accepts full research papers. Short papers are not accepted to the research track.The submission must also comply with the ACM plagiarism policy and procedures. In particular, it must not have been published elsewhere and must not be under review elsewhere while under review for ICST. The submission must also comply with the IEEE Policy on Authorship.
Lastly, the ICST 2024 Research papers track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular, the authors’ names must be omitted from the submission, and references to their prior work should be in the third person. Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.
Submissions to the Research Papers Track that meet the above requirements can be made via EasyChair.
Any submission that does not comply with the above requirements may be rejected by the PC Chairs without further review.
If a submission is accepted, at least one author of the paper is required to attend the conference and present the paper for it to be published in the ICST 2023 conference proceedings.
Replication Material
Submissions must supply all information that is needed to replicate the results, and therefore are expected to include or point to a replication package with the necessary software, data, and instructions. Reviewers may consult these packages to resolve open issues. There can be good reasons for the absence of a replication package, such as confidential code and/or data, the research being mostly qualitative, or the paper being fully self-contained. If a paper does not come with a replication package, authors should comment on its absence in the submission data; reviewers will take such comments into account.Submitting to ICST2024: Q&A
Please note that the Double Anonymous Review process is not used by all tracks, e.g., Industry Track. Check in the call for papers whether it is used or not.
Q: How does one prepare an ICST 2024 submission for double anonymous reviewing?
To comply, you do not have to make your identity undiscoverable; the double anonymous aspect of the review process is not an adversarial identity discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers can read and review your paper without having to know who any of the authors are. Specifically, this involves at least the following four points:
Omit all authors’ names, affiliations, emails, and related information from the title page as well as from the content of the paper itself. Refer to your work in the third person. You should not change the names of your tools, approaches, or systems, since this would compromise the review process. It breaks the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches, or systems in the third person, so that it is credible that another author could have written your paper. Do not rely on supplementary material (your website, GitHub repository, YouTube channel, a companion technical report, or thesis) in the paper. Supplementary information might result in revealing author identities. Anonymize project and grant names and numbers or those of funding agencies or countries as well as any acknowledgments of support to the work you report on. We further expect you to follow the excellent advice on anonymization from ACM.
When anonymizing your email, affiliations, name, etc., try to refrain from being overly creative or “funny” by coming up with your own, anonymized versions. For emails preferably use author1@anon.org, author2@anon.org, etc., since initial DBR screening will be done by an automated tool.
Q: I previously published an earlier version of this work in a venue that does not have double anonymous reviews. What should I do about acknowledging that previous work?
Double anonymous reviewing does not and cannot mean that it is impossible for the referees to discover the identity of the author. However, we require authors to help make it easy for author identity to not play a role in the reviewing process. Therefore, we ask that in the materials you submit to us to be reviewed author’s identity is not revealed.
If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv departmental tech report), there is no need to cite it, because unrefereed work is not truly part of the scientific literature. If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not clear whether or not this work was done by the author of the submitted paper or some other set of authors unknown. However, if citing in the third person would still risk that it is easy to identify the authors please err on the side of caution by also anonymizing the papers being extended (both when cited and in the reference list).
Q: Our submission makes use of work from a Ph.D./master’s thesis dissertation/report that has been published. Citing the dissertation might compromise anonymity. What should we do?
It is perfectly OK to publish work from a Ph.D./master’s thesis, and there is no need to cite it in the version submitted for review because prior dissertation publication does not compromise novelty. In the final (post-review, camera-ready) version of the paper, please do cite the dissertation to acknowledge its contribution, but in the refereed version of the paper that you submit, please refrain from citing the dissertation.
However, you need not worry whether or not the dissertation has appeared, since your job is only to help the committee review your work without awareness of author identity, but not to make it impossible for them to discover the identity of authors. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.
Q: I am submitting to the industry track. Should I double anonymous my submission?
No, you should not. Since industry papers typically rely heavily on the industrial or practical context in which the work was carried out it would be too much to ask to require this context to be anonymized.
Q: I want to include a link to an online appendix in my submission. How should I do this?
Ideally, the information in the appendix should be anonymous and it should be uploaded to an anonymous service such for example figshare or create a new Github (or other) sharing account that is not associated with your real name. These sites will give you an anonymous link. Later, if the paper is accepted you can turn that link into a non-anonymized link or just put the appendix on your site and change the link in the camera-ready version of the paper. An alternative solution is to not include the link in the submission; normally papers should be possible to review based on only the material of the paper itself.
To upload material on Figshare please create an account there, then add a new item, use the keywords “Supplemental Materials” and add the other item-specific data, and then select “Make file(s) confidential” and select “Generate private link”. Copy the URL generated there and then “Save changes”. Your file(s) can now be accessed anonymously at the given URL so you can put it in your ICST submission.
Q: What if we want to cite some unpublished work of our own (as motivation for example)
If the unpublished paper is an earlier version of the paper you want to submit to ICST and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures). Otherwise, if the unpublished work is not an earlier version of the proposed ICST submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works.
Q: Can I disseminate a non-anonymized version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?
You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you are allowed to put your submission on your home page and present your work at small professional meetings. However, you should not discuss your work with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post your work on ArXiV or a similar site just before or after submitting it to the conference.