ICST 2024
Mon 27 - Fri 31 May 2024 Canada

ICST 2024 (https://conf.researchr.org/home/icst-2024) invites high-quality submissions in all areas of software testing, verification, and validation. Papers for the research track should present novel and original work that advances the state-of-the-art. Case studies and empirical research papers are also welcome.

Dates
Tracks

This program is tentative and subject to change.

You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 29 May

Displayed time zone: Eastern Time (US & Canada) change

11:00 - 12:40
Test Generation and Test CausalityIndustry / Research Papers / Journal-First Papers at Room 1
11:00
20m
Research paper
Automatically Removing Unnecessary Stubbings from Test Suites
Research Papers
Mengzhen Li University of Minnesota, Mattia Fazzini University of Minnesota
11:20
20m
Industry talk
BugOut: Automated Test Generation and Bug Detection for Low-Code
Industry
11:40
20m
Research paper
Enhanced Fast and Reliable Statistical Vulnerability Root Cause Analysis with Sanitizer
Research Papers
Zhuo Yan Ocean University of China, Haipeng Qu Ocean University of China, Lingyun Ying Qi An Xin Group Corp., Ke Liu , Chao Qu
12:00
20m
Research paper
Causal Test Adequacy
Research Papers
Michael Foster The University of Sheffield, Christopher Wild , Neil Walkinshaw University of Sheffield, Robert Hierons The University of Sheffield
12:20
20m
Long-paper
Summary of Automated Code-based Test Case Reuse for Software Product Line Testing
Journal-First Papers
Pilsu Jung Gyeongsang National Unviersity, Seonah Lee Gyeongsang National University, Uicheon Lee
11:00 - 12:40
Testing and LLMsIndustry / Research Papers at Room 2
11:00
20m
Industry talk
Are We Testing or Being Tested? Exploring the Practical Applications of Large Language Models in Software Testing
Industry
Robson T. de Souza Santos , Italo Santos Northern Arizona University, Cleyton V. C. de Magalhaes CESAR School, Ronnie de Souza Santos University of Calgary
11:20
20m
Research paper
Improving Patch Correctness Analysis via Random Testing and Large Language Models
Research Papers
Facundo Molina IMDEA Software Institute, Juan Manuel Copia IMDEA Software Institute; Universidad Politécnica de Madrid, Alessandra Gorla IMDEA Software Institute
Pre-print
11:40
20m
Research paper
Intent-Driven Mobile GUI Testing with Autonomous Large Language Model Agents
Research Papers
Juyeon Yoon Korea Advanced Institute of Science and Technology, Robert Feldt Chalmers University of Technology, Sweden, Shin Yoo Korea Advanced Institute of Science and Technology
Pre-print
12:00
20m
Research paper
KAT: Dependency-aware Automated API Testing with Large Language Models
Research Papers
Tri Le , Thien Tran , Duy Cao , Vy Le , Vu Nguyen Head of Research, Katalon Inc.; University of Science, VNU-HCM, Vietnam, Tien N. Nguyen University of Texas at Dallas
12:20
20m
Research paper
Quantizing Large-Language Models for Predicting Flaky Tests
Research Papers
Shanto Rahman The University of Texas at Austin, Abdelrahman Baz , Sasa Misailovic University of Illinois at Urbana-Champaign, August Shi The University of Texas at Austin
15:30 - 17:00
15:30
20m
Research paper
MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing
Research Papers
Yang Zhang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Puzhuo Liu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Laile Xi , Xiao Lu , Xin Chen , Shuaizong Si , Limin Sun Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,
15:50
20m
Research paper
U-Fuzz: Stateful Fuzzing of IoT Protocols on COTS Devices
Research Papers
Shang Zewen , Matheus Eduardo Garbelini , Sudipta Chattopadhyay Singapore University of Technology and Design
16:10
20m
Research paper
Formatted Stateful Greybox Fuzzing of TLS server
Research Papers
16:30
20m
Long-paper
A Fuzzing-Based Test-Creation Approach for Evaluating Digital TV Receivers via Transport Streams
Journal-First Papers
Fabrício Izumi Banceira , Eddie Lima Samsung Electronics, Brazil, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil, Orlewilson Maia , Rômulo Fabrício , Bruno Farias , Aguinaldo Silva
16:50
10m
Demonstration
MOTIF: A tool for Mutation Testing with Fuzzing
Testing Tools and Demonstration
Jaekwon Lee University of Ottawa & University of Luxembourg, Enrico Viganò University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
15:30 - 17:00
Testing Autonomous Driving SystemsResearch Papers / Testing Tools and Demonstration at Room 2
15:30
20m
Research paper
Adversarial Testing with Reinforcement Learning: A Case Study on Autonomous Driving
Research Papers
Andréa Doreste , Matteo Biagiola Università della Svizzera italiana, Paolo Tonella USI Lugano
15:50
20m
Research paper
Assessing Quality Metrics for Neural Reality Gap Input Mitigation in Autonomous Driving Testing
Research Papers
Stefano Carlo Lambertenghi Technische Universität München, fortiss GmbH, Andrea Stocco Technical University of Munich, fortiss
Pre-print
16:10
20m
Research paper
Predicting Safety Misbehaviours in Autonomous Driving Systems using Uncertainty Quantification
Research Papers
Ruben Grewal , Paolo Tonella USI Lugano, Andrea Stocco Technical University of Munich, fortiss
Pre-print
16:30
20m
Research paper
AURORA: Navigating UI Tarpits via Automated Neural Screen Understanding
Research Papers
Safwat Ali Khan George Mason University, Wenyu Wang University of Illinois Urbana-Champaign, Yiran Ren , Bin Zhu , Jiangfan Shi , Wing Lam George Mason University, Kevin Moran University of Central Florida
Pre-print
16:50
10m
Demonstration
U-Fuzz: A Tool for Stateful Fuzzing of IoT Protocols on COTS Devices
Testing Tools and Demonstration
Shang Zewen , Matheus Eduardo Garbelini , Sudipta Chattopadhyay Singapore University of Technology and Design

Thu 30 May

Displayed time zone: Eastern Time (US & Canada) change

10:30 - 11:00
10:30
30m
Poster
gptCombFuzz: Combinatorial Oriented LLM Seed Generation for effective Fuzzing
Posters
Darshan Lohiya , Golla Monika Rani , Sangharatna Godboley National Institute of Technology Warangal, Radha Krishna Pisipati
10:30
30m
Poster
Towards Understanding Root Causes of Real Failures in Healthcare Machine Learning Applications
Posters
Guna Sekaran Jaganathan , Nazmul Kazi , Indika Kahanda University of North Florida, Upulee Kanewala University of North Florida
10:30
30m
Poster
VeriSol-MCE: Verification-based condition coverage analysis of Smart Contracts using Model Checker Engines
Posters
Sangharatna Godboley National Institute of Technology Warangal, Radha Krishna Pisipati
10:30
30m
Research paper
Causal Test Adequacy
Research Papers
Michael Foster The University of Sheffield, Christopher Wild , Neil Walkinshaw University of Sheffield, Robert Hierons The University of Sheffield
10:30
30m
Industry talk
BugOut: Automated Test Generation and Bug Detection for Low-Code
Industry
10:30
30m
Industry talk
In industrial embedded software, are some compilation errors easier to localize and fix than others?
Industry
Han Fu , Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity, Kristian Wiklund Ericsson AB, Andreas Ermedahl , Philipp Haller KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden
10:30
30m
Industry talk
Metamorphic Testing of an Autonomous Delivery Robots Scheduler
Industry
Thomas Laurent Lero@Trinity College Dublin, Paolo Arcaini National Institute of Informatics , Xiao-Yi Zhang , Fuyuki Ishikawa National Institute of Informatics
Pre-print
10:30
30m
Doctoral symposium paper
Agile Regression Testing
Doctoral Symposium
Suddhasvatta Das Arizona State University
10:30
30m
Doctoral symposium paper
Insights into System Failures: ML-Assisted Testing and Failure Models for Cyber-Physical Systems
Doctoral Symposium
Baharin Aliashrafi Jodat University of Ottawa
10:30
30m
Doctoral symposium paper
Search-based Security Testing of Enterprise Microservices
Doctoral Symposium
Susruthan Seran , Susruthan Seran Kristiania University College
10:30
30m
Doctoral symposium paper
Teaching Model-Driven Engineering from a model-testing perspective
Doctoral Symposium
Felix Cammaerts KU Leuven
File Attached
11:00 - 12:40
11:00
20m
Long-paper
Test Code Flakiness in Mobile Apps: The Developer's Perspective
Journal-First Papers
Valeria Pontillo Vrije Universiteit Brussel, Fabio Palomba University of Salerno, Filomena Ferrucci University of Salerno
11:20
20m
Long-paper
Flakiness goes live: Insights from an In Vivo testing simulation study
Journal-First Papers
Morena Barboni University of Camerino, Antonia Bertolino National Research Council, Italy, Guglielmo De Angelis CNR-IASI
11:40
20m
Research paper
262,447 Test Failures Later: An Empirical Evaluation of Flaky Failure Classifiers
Research Papers
Abdulrahman Alshammari George Mason University, Paul Ammann George Mason University, USA, Michael Hilton Carnegie Mellon University, Jonathan Bell Northeastern University
12:00
20m
Research paper
Automatically Reproducing Timing-Dependent Flaky-Test Failures
Research Papers
Shanto Rahman The University of Texas at Austin, Aaron Massey George Mason University, Wing Lam George Mason University, August Shi The University of Texas at Austin, Jonathan Bell Northeastern University
12:20
20m
Industry talk
Cost of Flaky Tests in CI: An Industrial Case Study
Industry
Fabian Leinen Technical University of Munich, Daniel Elsner TU Munich, Alexander Pretschner TU Munich, Andreas Stahlbauer , Michael Sailer , Elmar Juergens CQSE GmbH
Pre-print
11:00 - 12:40
Mutation Testing and Test PrioritizaitonResearch Papers / Journal-First Papers / Industry at Room 2
11:00
20m
Industry talk
Towards Mutation-guided Test Suites for Smart Contracts
Industry
11:20
20m
Research paper
On the Coupling between Vulnerabilities and LLM-generated Mutants: A Study on Vul4J dataset
Research Papers
Aayush Garg Luxembourg Institute of Science and Technology, Renzo Degiovanni SnT, University of Luxembourg, Mike Papadakis University of Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
Pre-print
11:40
20m
Long-paper
Mutation Testing Optimisations using the Clang Front-end
Journal-First Papers
Sten Vercammen , Serge Demeyer University of Antwerp; Flanders Make, Markus Borg CodeScene, Niklas Pettersson , Görel Hedin Lund University
12:00
20m
Research paper
MACS: Multi-agent Adversarial Reinforcement Learning for Finding Diverse Critical Driving Scenarios
Research Papers
Shuting Kang University of Chinese Academy of Sciences, Qian Dong Institute of Software Chinese Academy of Sciences, Yunzhi Xue Institute of Software Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences
12:20
20m
Long-paper
Lessons learned from replicating a study on information-retrieval-based test case prioritization
Journal-First Papers
Nasir Mehmood Minhas Mälardalen University, Mohsin Irshad , Kai Petersen University of Applied Sciences Flensburg, Germany / Blekinge Institute of Technology, Sweden, Jürgen Börstler Blekinge Institute of Technology
12:40 - 14:00
12:40
80m
Poster
gptCombFuzz: Combinatorial Oriented LLM Seed Generation for effective Fuzzing
Posters
Darshan Lohiya , Golla Monika Rani , Sangharatna Godboley National Institute of Technology Warangal, Radha Krishna Pisipati
12:40
80m
Poster
Towards Understanding Root Causes of Real Failures in Healthcare Machine Learning Applications
Posters
Guna Sekaran Jaganathan , Nazmul Kazi , Indika Kahanda University of North Florida, Upulee Kanewala University of North Florida
12:40
80m
Poster
VeriSol-MCE: Verification-based condition coverage analysis of Smart Contracts using Model Checker Engines
Posters
Sangharatna Godboley National Institute of Technology Warangal, Radha Krishna Pisipati
12:40
80m
Research paper
Causal Test Adequacy
Research Papers
Michael Foster The University of Sheffield, Christopher Wild , Neil Walkinshaw University of Sheffield, Robert Hierons The University of Sheffield
12:40
80m
Industry talk
BugOut: Automated Test Generation and Bug Detection for Low-Code
Industry
12:40
80m
Industry talk
In industrial embedded software, are some compilation errors easier to localize and fix than others?
Industry
Han Fu , Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity, Kristian Wiklund Ericsson AB, Andreas Ermedahl , Philipp Haller KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden
12:40
80m
Industry talk
Metamorphic Testing of an Autonomous Delivery Robots Scheduler
Industry
Thomas Laurent Lero@Trinity College Dublin, Paolo Arcaini National Institute of Informatics , Xiao-Yi Zhang , Fuyuki Ishikawa National Institute of Informatics
Pre-print
12:40
80m
Doctoral symposium paper
Agile Regression Testing
Doctoral Symposium
Suddhasvatta Das Arizona State University
12:40
80m
Doctoral symposium paper
Insights into System Failures: ML-Assisted Testing and Failure Models for Cyber-Physical Systems
Doctoral Symposium
Baharin Aliashrafi Jodat University of Ottawa
12:40
80m
Doctoral symposium paper
Search-based Security Testing of Enterprise Microservices
Doctoral Symposium
Susruthan Seran , Susruthan Seran Kristiania University College
12:40
80m
Doctoral symposium paper
Teaching Model-Driven Engineering from a model-testing perspective
Doctoral Symposium
Felix Cammaerts KU Leuven
File Attached
14:00 - 15:00
Software Testing Education and Fault LocalizationResearch Papers / Journal-First Papers at Room 1
14:00
20m
Research paper
State of the Practice in Software Testing Teaching in Four European Countries
Research Papers
Porfirio Tramontana Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Italy, Beatriz Marín Universitat Politècnica de València, Ana Paiva Faculty of Engineering, University of Porto and INESC TEC, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC, Tanja E. J. Vos Universitat Politècnica de València and Open Universiteit, Domenico Amalfitano University of Naples Federico II, Felix Cammaerts KU Leuven, Monique Snoeck Katholieke Universiteit Leuven, Anna Rita Fasolino Federico II University of Naples
14:20
20m
Long-paper
Can gamification help in software testing education? Findings from an empirical study
Journal-First Papers
Raquel Blanco , Manuel Trinidad , María José Suárez-Cabal , Alejandro Calderón Sánchez , Mercedes Ruiz University of Cadiz, Javier Tuya Computer Science Department, University of Oviedo
14:40
20m
Research paper
FusionFL: A statement-level feature fusion based fault localization approach
Research Papers
Yanbo Zhang , Yawen Wang State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Dongming Zhu , Wenjing Liu
14:00 - 15:00
Verification and TestingIndustry / Journal-First Papers / Research Papers at Room 2
14:00
20m
Industry talk
Randomised Testing of the Compiler for a Verification-Aware Programming Language
Industry
Alastair F. Donaldson Imperial College London, Dilan Sheth Imperial College London, Jean-Baptiste Tristan Amazon Web Services, Alex Usher Imperial College London
14:20
20m
Long-paper
Automatically Generating Test Cases for Safety-Critical Software via Symbolic Execution
Journal-First Papers
Elson Kurian University of Milano Bicocca, Daniela Briola University of Milano Bicocca, Pietro Braione University of Milano-Bicocca, Giovanni Denaro University of Milano - Bicocca
14:40
20m
Research paper
EmoSTL: Formal Spatial-Temporal Verification of Emotion Specifications in Computer Games
Research Papers
Saba Gholizadeh Ansari Utrecht University, Wishnu Prasetya Utrecht University, Frank Dignum Umea University, Mehdi Dastani , Gabriele Keller Utrecht University
15:00 - 15:30
15:00
30m
Poster
gptCombFuzz: Combinatorial Oriented LLM Seed Generation for effective Fuzzing
Posters
Darshan Lohiya , Golla Monika Rani , Sangharatna Godboley National Institute of Technology Warangal, Radha Krishna Pisipati
15:00
30m
Poster
Towards Understanding Root Causes of Real Failures in Healthcare Machine Learning Applications
Posters
Guna Sekaran Jaganathan , Nazmul Kazi , Indika Kahanda University of North Florida, Upulee Kanewala University of North Florida
15:00
30m
Poster
VeriSol-MCE: Verification-based condition coverage analysis of Smart Contracts using Model Checker Engines
Posters
Sangharatna Godboley National Institute of Technology Warangal, Radha Krishna Pisipati
15:00
30m
Research paper
Causal Test Adequacy
Research Papers
Michael Foster The University of Sheffield, Christopher Wild , Neil Walkinshaw University of Sheffield, Robert Hierons The University of Sheffield
15:00
30m
Industry talk
BugOut: Automated Test Generation and Bug Detection for Low-Code
Industry
15:00
30m
Industry talk
In industrial embedded software, are some compilation errors easier to localize and fix than others?
Industry
Han Fu , Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity, Kristian Wiklund Ericsson AB, Andreas Ermedahl , Philipp Haller KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden
15:00
30m
Industry talk
Metamorphic Testing of an Autonomous Delivery Robots Scheduler
Industry
Thomas Laurent Lero@Trinity College Dublin, Paolo Arcaini National Institute of Informatics , Xiao-Yi Zhang , Fuyuki Ishikawa National Institute of Informatics
Pre-print
15:00
30m
Doctoral symposium paper
Agile Regression Testing
Doctoral Symposium
Suddhasvatta Das Arizona State University
15:00
30m
Doctoral symposium paper
Insights into System Failures: ML-Assisted Testing and Failure Models for Cyber-Physical Systems
Doctoral Symposium
Baharin Aliashrafi Jodat University of Ottawa
15:00
30m
Doctoral symposium paper
Search-based Security Testing of Enterprise Microservices
Doctoral Symposium
Susruthan Seran , Susruthan Seran Kristiania University College
15:00
30m
Doctoral symposium paper
Teaching Model-Driven Engineering from a model-testing perspective
Doctoral Symposium
Felix Cammaerts KU Leuven
File Attached

Fri 31 May

Displayed time zone: Eastern Time (US & Canada) change

11:00 - 12:20
11:00
20m
Industry talk
In industrial embedded software, are some compilation errors easier to localize and fix than others?
Industry
Han Fu , Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity, Kristian Wiklund Ericsson AB, Andreas Ermedahl , Philipp Haller KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden
11:20
20m
Research paper
Brewing Up Reliability: Espresso Test Generation for Android Apps
Research Papers
Iván Arcuschin Moreno University of Buenos Aires, Argentina, Lisandro Di Meo , Michael Auer University of Passau, Juan Pablo Galeotti University of Buenos Aires, Gordon Fraser University of Passau
11:40
20m
Research paper
Differential Optimization Testing of Gremlin-Based Graph Database Systems
Research Papers
Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Jiansen Song Institute of Software Chinese Academy of Sciences, Ziyue Cheng , Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong , Tao Huang Institute of Software Chinese Academy of Sciences
12:00
10m
Demonstration
MLHCBugs: A Framework to Reproduce Real Faults in Healthcare Machine Learning Applications
Testing Tools and Demonstration
Guna Sekaran Jaganathan , Nazmul Kazi , Indika Kahanda University of North Florida, Upulee Kanewala University of North Florida
12:10
10m
Demonstration
The GitHub Recent Bugs Dataset for Evaluating LLM-based Debugging Applications
Testing Tools and Demonstration
Jae Yong Lee , Sungmin Kang , Juyeon Yoon Korea Advanced Institute of Science and Technology, Shin Yoo Korea Advanced Institute of Science and Technology
11:00 - 12:20
Testing with and for Deep and Reinforcement LearningResearch Papers / Industry at Room 2
11:00
20m
Research paper
METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities
Research Papers
Sangwon Hyun University of Adelaide, Mingyu Guo , Muhammad Ali Babar School of Computer Science, The University of Adelaide
11:20
20m
Industry talk
End-to-end RPA-like testing using reinforcement learning
Industry
Ciprian Paduraru University of Bucharest, Rares Cristea University of Bucharest, Alin Stefanescu University of Bucharest
11:40
20m
Research paper
Spectral Analysis of the Relation between Deep Learning Faults and Neural Activation Values
Research Papers
Nargiz Humbatova USI Lugano, Gunel Jahangirova King's College London, Paolo Tonella USI Lugano
12:00
20m
Research paper
Learning Environment Models with Continuous Stochastic Dynamics - with an Application to Deep RL Testing
Research Papers
Martin Tappler TU Graz; Silicon Austria Labs, Edi Muskardin , Bernhard Aichernig Graz University of Technology, Bettina Könighofer
13:30 - 14:30
Testing and RepairResearch Papers / Industry at Room 1
13:30
20m
Research paper
Evolutionary Testing for Program Repair
Research Papers
Haifeng Ruan , Hoang Lam Nguyen Humboldt-Universität zu Berlin, Ridwan Salihin Shariffdeen National University of Singapore, Yannic Noller Singapore University of Technology and Design, Abhik Roychoudhury National University of Singapore
13:50
20m
Research paper
Does Going Beyond Branch Coverage Make Program Repair Tools More Reliable?
Research Papers
Amirfarhad Nilizadeh University of Central Florida, Gary T. Leavens University of Central Florida, Corina Pasareanu CMU, NASA, KBR, Xuan-Bach D. Le The University of Melbourne, David Cok CEA, LIST, Software Safety and Security Laboratory
14:10
20m
Industry talk
SafeRevert: When Can Breaking Changes be Automatically Reverted?
Industry
Pre-print
13:30 - 14:30
Metamorphic and Combinatorial TestingIndustry / Journal-First Papers at Room 2
13:30
20m
Industry talk
Metamorphic Testing of an Autonomous Delivery Robots Scheduler
Industry
Thomas Laurent Lero@Trinity College Dublin, Paolo Arcaini National Institute of Informatics , Xiao-Yi Zhang , Fuyuki Ishikawa National Institute of Informatics
Pre-print
13:50
20m
Long-paper
Design, implementation, and validation of a benchmark generator for combinatorial interaction testing tools
Journal-First Papers
Andrea Bombarda University of Bergamo, Angelo Gargantini University of Bergamo

Accepted Papers

Title
262,447 Test Failures Later: An Empirical Evaluation of Flaky Failure Classifiers
Research Papers
Adversarial Testing with Reinforcement Learning: A Case Study on Autonomous Driving
Research Papers
Assessing Quality Metrics for Neural Reality Gap Input Mitigation in Autonomous Driving Testing
Research Papers
Pre-print
AURORA: Navigating UI Tarpits via Automated Neural Screen Understanding
Research Papers
Pre-print
Automatically Removing Unnecessary Stubbings from Test Suites
Research Papers
Automatically Reproducing Timing-Dependent Flaky-Test Failures
Research Papers
Brewing Up Reliability: Espresso Test Generation for Android Apps
Research Papers
Causal Test Adequacy
Research Papers
Differential Optimization Testing of Gremlin-Based Graph Database Systems
Research Papers
Does Going Beyond Branch Coverage Make Program Repair Tools More Reliable?
Research Papers
EmoSTL: Formal Spatial-Temporal Verification of Emotion Specifications in Computer Games
Research Papers
Enhanced Fast and Reliable Statistical Vulnerability Root Cause Analysis with Sanitizer
Research Papers
Evolutionary Testing for Program Repair
Research Papers
Formatted Stateful Greybox Fuzzing of TLS server
Research Papers
FusionFL: A statement-level feature fusion based fault localization approach
Research Papers
Improving Patch Correctness Analysis via Random Testing and Large Language Models
Research Papers
Pre-print
Intent-Driven Mobile GUI Testing with Autonomous Large Language Model Agents
Research Papers
Pre-print
KAT: Dependency-aware Automated API Testing with Large Language Models
Research Papers
Learning Environment Models with Continuous Stochastic Dynamics - with an Application to Deep RL Testing
Research Papers
MACS: Multi-agent Adversarial Reinforcement Learning for Finding Diverse Critical Driving Scenarios
Research Papers
METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities
Research Papers
MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing
Research Papers
On the Coupling between Vulnerabilities and LLM-generated Mutants: A Study on Vul4J dataset
Research Papers
Pre-print
Predicting Safety Misbehaviours in Autonomous Driving Systems using Uncertainty Quantification
Research Papers
Pre-print
Quantizing Large-Language Models for Predicting Flaky Tests
Research Papers
Spectral Analysis of the Relation between Deep Learning Faults and Neural Activation Values
Research Papers
State of the Practice in Software Testing Teaching in Four European Countries
Research Papers
U-Fuzz: Stateful Fuzzing of IoT Protocols on COTS Devices
Research Papers

Call for Papers

ICST 2024 (https://conf.researchr.org/home/icst-2024) invites high-quality submissions in all areas of software testing, verification, and validation. Papers for the research track should present novel and original work that advances the state-of-the-art. Case studies and empirical research papers are also welcome.

Topics of Interest

Topics of interest include, but are not limited to, the following:
  • Automated test generation, e.g., fuzz testing, search-based test generation, (dynamic) symbolic execution
  • Manual testing practices and techniques
  • Security testing
  • Model-based testing
  • Test automation
  • Static analysis and symbolic execution
  • Formal verification and model checking
  • Software reliability
  • Social aspects of software testing process
  • Testability and design
  • Testing and development processes
  • Testing education
  • Testing in specific domains, such as mobile, web, embedded/cyber-physical systems, concurrent, distributed, cloud, GUI, and real-time systems
  • Testing for learning-enabled software, including deep learning
  • Testing video games, augmented reality
  • Testing/debugging tools
  • Theory of software testing
  • Empirical studies
  • Experience reports

Each submission will be reviewed by at least three members of the ICST Program Committee.

Papers that have a strong industrial/practical component and focus more on impact rather than (technical) novelty are encouraged to consider the industry track instead.

Submission Format

Full Research papers, as well as Industry papers, must conform to the two-column IEEE conference publication format, not exceed 10 pages, including all text, figures, tables, and appendices; two additional pages containing only references are permitted. It must conform to the IEEE Conference Proceedings Formatting Guidelines (please use the letter format template and conference option). The ICST 2024 research track only accepts full research papers. Short papers are not accepted to the research track.

The submission must also comply with the ACM plagiarism policy and procedures. In particular, it must not have been published elsewhere and must not be under review elsewhere while under review for ICST. The submission must also comply with the IEEE Policy on Authorship.

Lastly, the ICST 2024 Research papers track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular, the authors’ names must be omitted from the submission, and references to their prior work should be in the third person. Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.

Submissions to the Research Papers Track that meet the above requirements can be made via EasyChair.

Any submission that does not comply with the above requirements may be rejected by the PC Chairs without further review.

If a submission is accepted, at least one author of the paper is required to attend the conference and present the paper for it to be published in the ICST 2023 conference proceedings.

Replication Material

Submissions must supply all information that is needed to replicate the results, and therefore are expected to include or point to a replication package with the necessary software, data, and instructions. Reviewers may consult these packages to resolve open issues. There can be good reasons for the absence of a replication package, such as confidential code and/or data, the research being mostly qualitative, or the paper being fully self-contained. If a paper does not come with a replication package, authors should comment on its absence in the submission data; reviewers will take such comments into account.

Please note that the Double Anonymous Review process is not used by all tracks, e.g., Industry Track. Check in the call for papers whether it is used or not.

Q: How does one prepare an ICST 2024 submission for double anonymous reviewing?

To comply, you do not have to make your identity undiscoverable; the double­ anonymous aspect of the review process is not an adversarial identity discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers can read and review your paper without having to know who any of the authors are. Specifically, this involves at least the following four points:

Omit all authors’ names, affiliations, emails, and related information from the title page as well as from the content of the paper itself. Refer to your work in the third person. You should not change the names of your tools, approaches, or systems, since this would compromise the review process. It breaks the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches, or systems in the third person, so that it is credible that another author could have written your paper. Do not rely on supplementary material (your website, GitHub repository, YouTube channel, a companion technical report, or thesis) in the paper. Supplementary information might result in revealing author identities. Anonymize project and grant names and numbers or those of funding agencies or countries as well as any acknowledgments of support to the work you report on. We further expect you to follow the excellent advice on anonymization from ACM.

When anonymizing your email, affiliations, name, etc., try to refrain from being overly creative or “funny” by coming up with your own, anonymized versions. For emails preferably use author1@anon.org, author2@anon.org, etc., since initial DBR screening will be done by an automated tool.

Q: I previously published an earlier version of this work in a venue that does not have double anonymous reviews. What should I do about acknowledging that previous work?

Double anonymous reviewing does not and cannot mean that it is impossible for the referees to discover the identity of the author. However, we require authors to help make it easy for author identity to not play a role in the reviewing process. Therefore, we ask that in the materials you submit to us to be reviewed author’s identity is not revealed.

If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv departmental tech report), there is no need to cite it, because unrefereed work is not truly part of the scientific literature. If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not clear whether or not this work was done by the author of the submitted paper or some other set of authors unknown. However, if citing in the third person would still risk that it is easy to identify the authors please err on the side of caution by also anonymizing the papers being extended (both when cited and in the reference list).

Q: Our submission makes use of work from a Ph.D./master’s thesis dissertation/report that has been published. Citing the dissertation might compromise anonymity. What should we do?

It is perfectly OK to publish work from a Ph.D./master’s thesis, and there is no need to cite it in the version submitted for review because prior dissertation publication does not compromise novelty. In the final (post-review, camera-ready) version of the paper, please do cite the dissertation to acknowledge its contribution, but in the refereed version of the paper that you submit, please refrain from citing the dissertation.

However, you need not worry whether or not the dissertation has appeared, since your job is only to help the committee review your work without awareness of author identity, but not to make it impossible for them to discover the identity of authors. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.

Q: I am submitting to the industry track. Should I double anonymous my submission?

No, you should not. Since industry papers typically rely heavily on the industrial or practical context in which the work was carried out it would be too much to ask to require this context to be anonymized.

Q: I want to include a link to an online appendix in my submission. How should I do this?

Ideally, the information in the appendix should be anonymous and it should be uploaded to an anonymous service such for example figshare or create a new Github (or other) sharing account that is not associated with your real name. These sites will give you an anonymous link. Later, if the paper is accepted you can turn that link into a non-anonymized link or just put the appendix on your site and change the link in the camera-ready version of the paper. An alternative solution is to not include the link in the submission; normally papers should be possible to review based on only the material of the paper itself.

To upload material on Figshare please create an account there, then add a new item, use the keywords “Supplemental Materials” and add the other item-specific data, and then select “Make file(s) confidential” and select “Generate private link”. Copy the URL generated there and then “Save changes”. Your file(s) can now be accessed anonymously at the given URL so you can put it in your ICST submission.

Q: What if we want to cite some unpublished work of our own (as motivation for example)

If the unpublished paper is an earlier version of the paper you want to submit to ICST and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures). Otherwise, if the unpublished work is not an earlier version of the proposed ICST submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works.

Q: Can I disseminate a non-anonymized version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?

You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you are allowed to put your submission on your home page and present your work at small professional meetings. However, you should not discuss your work with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post your work on ArXiV or a similar site just before or after submitting it to the conference.