Write a Blog >>
ISSTA 2021
Sun 11 - Sat 17 July 2021 Online
co-located with ECOOP and ISSTA 2021

The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) is the leading research symposium on software testing and analysis, bringing together academics, industrial researchers, and practitioners to exchange new ideas, problems, and experience on how to analyze and test software systems.

Dates
Plenary
You're viewing the program in a time zone which is different from your device's time zone - change time zone

Conference Day
Wed 14 Jul

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

18:30 - 19:30
Session 1 (time band 1) Web ApplicationsTechnical Papers at ISSTA 1
Chair(s): Xusheng XiaoCase Western Reserve University
18:30
20m
Talk
Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms
Technical Papers
Kulani Tharaka MahadewaNational University of Singapore, Yanjun ZhangUniversity of Queensland, Guangdong BaiUniversity of Queensland, Lei BuNanjing University, Zhiqiang ZuoNanjing University, Dileepa FernandoSri Lanka Technological Campus, Zhenkai LiangNational University of Singapore, Jin Song DongNational University of Singapore
DOI Media Attached File Attached
18:50
20m
Talk
WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes
Technical Papers
Fei ShaoCase Western Reserve University, Rui XuCase Western Reserve University, Wasif HaqueUniversity of Texas at Dallas, Jingwei XuPeking University, Ying ZhangPeking University, Wei YangUniversity of Texas at Dallas, Yanfang YeCase Western Reserve University, Xusheng XiaoCase Western Reserve University
DOI File Attached
19:10
20m
Talk
Modular Call Graph Construction for Security Scanning of Node.js Applications
Technical Papers
Benjamin Barslev NielsenAarhus University, Martin Toldam TorpAarhus University, Anders MøllerAarhus University
DOI
18:30 - 19:30
Session 2 (time band 1) Testing Deep Learning Systems 1Technical Papers at ISSTA 2
Chair(s): Lin TanPurdue University
18:30
20m
Talk
Attack as Defense: Characterizing Adversarial Examples using Robustness
Technical Papers
Zhe ZhaoShanghaiTech University, Guangke ChenShanghaiTech University, Jingyi WangZhejiang University, Yiwei YangShanghaiTech University, Fu SongShanghaiTech University, Jun SunSingapore Management University
DOI
18:50
20m
Talk
Exposing Previously Undetectable Faults in Deep Neural Networks
Technical Papers
Isaac DunnUniversity of Oxford, Hadrien PougetUniversity of Oxford, Daniel KroeningAmazon, Tom MelhamUniversity of Oxford
DOI Pre-print Media Attached
19:10
20m
Talk
DeepCrime: Mutation Testing of Deep Learning Systems Based on Real Faults
Technical Papers
Nargiz HumbatovaUSI Lugano, Gunel JahangirovaUSI Lugano, Paolo TonellaUSI Lugano
DOI
19:40 - 20:40
Session 3 (time band 1) Android Application TestingTechnical Papers at ISSTA 1
Chair(s): Alex OrsoGeorgia Institute of Technology
19:40
20m
Talk
Parema: An Unpacking Framework for Demystifying VM-Based Android Packers
Technical Papers
Lei XueHong Kong Polytechnic University, Yuxiao YanXi'an Jiaotong University; Hong Kong Polytechnic University, Luyi YanHong Kong Polytechnic University, Muhui JiangHong Kong Polytechnic University, Xiapu LuoHong Kong Polytechnic University, Dinghao WuPennsylvania State University, Yajin ZhouZhejiang University
DOI
20:00
20m
Talk
An Infrastructure Approach to Improving Effectiveness of Android UI Testing Tools
Technical Papers
Wenyu WangUniversity of Illinois at Urbana-Champaign, Wing LamUniversity of Illinois at Urbana-Champaign, Tao XiePeking University
DOI
20:20
20m
Talk
Semantic Matching of GUI Events for Test Reuse: Are We There Yet?
Technical Papers
Leonardo MarianiUniversity of Milano-Bicocca, Ali MohebbiUSI Lugano, Mauro PezzeUSI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Valerio TerragniUniversity of Auckland
DOI Pre-print
19:40 - 20:20
Session 4 (time band 1) Testing Deep Learning Systems 2Technical Papers at ISSTA 2
Chair(s): Sebastian ElbaumUniversity of Virginia
19:40
20m
Talk
DeepHyperion: Exploring the Feature Space of Deep Learning-Based Systems through Illumination Search
Technical Papers
Tahereh ZohdinasabUSI Lugano, Vincenzo RiccioUSI Lugano, Alessio GambiUniversity of Passau, Paolo TonellaUSI Lugano
DOI File Attached
20:00
20m
Talk
Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper)
Technical Papers
Fitash Ul HaqUniversity of Luxembourg, Donghwan ShinUniversity of Luxembourg, Lionel BriandUniversity of Luxembourg; University of Ottawa, Thomas StifterIEE, Jun WangPost Luxembourg
DOI

Conference Day
Thu 15 Jul

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

00:20 - 01:20
Session 5 (time band 2) Android Application Analysis and TestingTechnical Papers at ISSTA 1
Chair(s): William G.J. HalfondUniversity of Southern California
00:20
20m
Talk
GUIDER: GUI Structure and Vision Co-Guided Test Script Repair for Android Apps
Technical Papers
Tongtong XuNanjing University, Minxue PanNanjing University, Yu PeiHong Kong Polytechnic University, Guiyin LiNanjing University, Xia ZengTencent, Tian ZhangNanjing University, Yuetang DengTencent, Xuandong LiNanjing University
DOI
00:40
20m
Talk
Understanding and Finding System Setting-Related Defects in Android Apps
Technical Papers
Jingling SunEast China Normal University, Ting SuEast China Normal University, Junxin LiEast China Normal University, Zhen DongNational University of Singapore, Geguang PuEast China Normal University, Tao XiePeking University, Zhendong SuETH Zurich
DOI
01:00
20m
Talk
HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis
Technical Papers
Yueming WuHuazhong University of Science and Technology, Deqing ZouHuazhong University of Science and Technology, Wei YangUniversity of Texas at Dallas, Xiang LiHuazhong University of Science and Technology, Hai JinHuazhong University of Science and Technology
DOI
00:20 - 01:20
Session 6 (time band 2) FuzzingTechnical Papers at ISSTA 2
Chair(s): Lingming ZhangUniversity of Illinois at Urbana-Champaign
00:20
20m
Talk
Seed Selection for Successful Fuzzing
Technical Papers
Adrian HerreraAustralian National University; DST, Hendra GunadiAustralian National University, Shane MagrathDST, Michael NorrishCSIRO’s Data61; Australian National University, Mathias PayerEPFL, Tony HoskingAustralian National University; CSIRO’s Data61
DOI Pre-print File Attached
00:40
20m
Talk
Gramatron: Effective Grammar-Aware Fuzzing
Technical Papers
Prashast SrivastavaPurdue University, Mathias PayerEPFL
DOI Pre-print Media Attached File Attached
01:00
20m
Talk
QFuzz: Quantitative Fuzzing for Side Channels
Technical Papers
Yannic NollerNational University of Singapore, Saeid Tizpaz-NiariUniversity of Texas at El Paso
DOI Pre-print Media Attached
01:40 - 02:20
Session 7 (time band 2) Data Processing Application AnalysisTechnical Papers at ISSTA 1
Chair(s): Darko MarinovUniversity of Illinois at Urbana-Champaign
01:40
20m
Talk
SAND: A Static Analysis Approach for Detecting SQL AntipatternsACM SIGSOFT Distinguished Paper
Technical Papers
Yingjun LyuAmazon, Sasha VolokhUniversity of Southern California, William G.J. HalfondUniversity of Southern California, Omer TrippAmazon
DOI
02:00
20m
Talk
Semantic Table Structure Identification in Spreadsheets
Technical Papers
Yakun ZhangInstitute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiao LvMicrosoft Research, Haoyu DongMicrosoft Research, Wensheng DouInstitute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shi HanMicrosoft Research, Dongmei ZhangMicrosoft Research, Jun WeiInstitute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan YeInstitute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
01:40 - 02:20
Session 8 (time band 2) Dynamic AnalysisTechnical Papers at ISSTA 2
Chair(s): Luís PinaUniversity of Illinois at Chicago
01:40
20m
Talk
Runtime Detection of Memory Errors with Smart Status
Technical Papers
Zhe ChenNanjing University of Aeronautics and Astronautics, Chong WangNanjing University of Aeronautics and Astronautics, Junqi YanNanjing University of Aeronautics and Astronautics, Yulei SuiUniversity of Technology Sydney, Jingling XueUNSW
DOI Media Attached
02:00
20m
Talk
UAFSan: An Object-Identifier-Based Dynamic Approach for Detecting Use-After-Free Vulnerabilities
Technical Papers
Binfa GuiNanjing University of Science and Technology, Wei SongNanjing University of Science and Technology, Jeff HuangTexas A&M University
DOI Media Attached File Attached
09:10 - 10:50
Session 9 (time band 3) Testing Deep Learning Systems 3Technical Papers at ISSTA 1
Chair(s): Mauro PezzeUSI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology
09:10
20m
Talk
Attack as Defense: Characterizing Adversarial Examples using Robustness
Technical Papers
Zhe ZhaoShanghaiTech University, Guangke ChenShanghaiTech University, Jingyi WangZhejiang University, Yiwei YangShanghaiTech University, Fu SongShanghaiTech University, Jun SunSingapore Management University
DOI
09:30
20m
Talk
Exposing Previously Undetectable Faults in Deep Neural Networks
Technical Papers
Isaac DunnUniversity of Oxford, Hadrien PougetUniversity of Oxford, Daniel KroeningAmazon, Tom MelhamUniversity of Oxford
DOI Pre-print Media Attached
09:50
20m
Talk
Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper)
Technical Papers
Fitash Ul HaqUniversity of Luxembourg, Donghwan ShinUniversity of Luxembourg, Lionel BriandUniversity of Luxembourg; University of Ottawa, Thomas StifterIEE, Jun WangPost Luxembourg
DOI
10:10
20m
Talk
DeepHyperion: Exploring the Feature Space of Deep Learning-Based Systems through Illumination Search
Technical Papers
Tahereh ZohdinasabUSI Lugano, Vincenzo RiccioUSI Lugano, Alessio GambiUniversity of Passau, Paolo TonellaUSI Lugano
DOI File Attached
10:30
20m
Talk
DeepCrime: Mutation Testing of Deep Learning Systems Based on Real Faults
Technical Papers
Nargiz HumbatovaUSI Lugano, Gunel JahangirovaUSI Lugano, Paolo TonellaUSI Lugano
DOI
09:10 - 10:50
Session 10 (time band 3) Symbolic Execution 1Technical Papers at ISSTA 2
Chair(s): Sébastien BardinCEA LIST, University Paris-Saclay
09:10
20m
Talk
Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration
Technical Papers
Peisen YaoHong Kong University of Science and Technology, Heqing HuangHong Kong University of Science and Technology, Tang WenshengHong Kong University of Science and Technology, Qingkai ShiPurdue University, USA, Rongxin WuXiamen University, Charles ZhangHong Kong University of Science and Technology
DOI
09:30
20m
Talk
Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper)
Technical Papers
Sicheng LuoFudan University, Hui XuFudan University, Yanxiang BiFudan University, Xin WangFudan University, Yangfan ZhouFudan University
DOI File Attached
09:50
20m
Talk
Synthesize Solving Strategy for Symbolic Execution
Technical Papers
Zhenbang ChenNational University of Defense Technology, Zehua ChenNational University of Defense Technology, Ziqi ShuaiNational University of Defense Technology, Guofeng ZhangHunan University, Weiyu PanNational University of Defense Technology, Yufeng ZhangHunan University, Ji WangNational University of Defense Technology
DOI
10:10
20m
Talk
Type and Interval Aware Array Constraint Solving for Symbolic ExecutionACM SIGSOFT Distinguished Paper
Technical Papers
Ziqi ShuaiNational University of Defense Technology, Zhenbang ChenNational University of Defense Technology, Yufeng ZhangHunan University, Jun SunSingapore Management University, Ji WangNational University of Defense Technology
DOI
10:30
20m
Talk
Grammar-Agnostic Symbolic Execution by Token Symbolization
Technical Papers
Weiyu PanNational University of Defense Technology, Zhenbang ChenNational University of Defense Technology, Guofeng ZhangHunan University, Yunlai LuoNational University of Defense Technology, Yufeng ZhangHunan University, Ji WangNational University of Defense Technology
DOI
19:00 - 20:20
Session 11 (time band 1) Machine Learning and TestingTechnical Papers at ISSTA 1
Chair(s): August ShiThe University of Texas at Austin
19:00
20m
Talk
Interval Constraint-Based Mutation Testing of Numerical Specifications
Technical Papers
Clothilde JeangoudouxMPI-SWS, Eva DarulovaMPI-SWS, Christoph LauterUniversity of Alaska at Anchorage
DOI
19:20
20m
Talk
Predoo: Precision Testing of Deep Learning Operators
Technical Papers
Xufan ZhangNanjing University, Ning SunNanjing University, Chunrong FangNanjing University, Jiawei LiuNanjing University, Jia LiuNanjing University, Dong ChaiHuawei, Jiang WangHuawei, Zhenyu ChenNanjing University
DOI
19:40
20m
Talk
TERA: Optimizing Stochastic Regression Tests in Machine Learning Projects
Technical Papers
Saikat DuttaUniversity of Illinois at Urbana-Champaign, Jeeva SelvamUniversity of Illinois at Urbana-Champaign, Aryaman JainUniversity of Illinois at Urbana-Champaign, Sasa MisailovicUniversity of Illinois at Urbana-Champaign
DOI
20:00
20m
Talk
Deep Just-in-Time Defect Prediction: How Far Are We?
Technical Papers
Zhengran ZengSouthern University of Science and Technology, Yuqun ZhangSouthern University of Science and Technology, Haotian ZhangKwai, Lingming ZhangUniversity of Illinois at Urbana-Champaign
DOI
19:00 - 20:20
Session 12 (time band 1) Configuration and Dependency Technical Papers at ISSTA 2
Chair(s): Jonathan BellNortheastern University
19:00
20m
Talk
Fixing Dependency Errors for Python Build Reproducibility
Technical Papers
Suchita MukherjeeUniversity of California at Davis, Abigail AlmanzaUniversity of California at Davis, Cindy Rubio-GonzálezUniversity of California at Davis
DOI
19:20
20m
Talk
Test-Case Prioritization for Configuration TestingACM SIGSOFT Distinguished Paper
Technical Papers
Runxiang ChengUniversity of Illinois at Urbana-Champaign, Lingming ZhangUniversity of Illinois at Urbana-Champaign, Darko MarinovUniversity of Illinois at Urbana-Champaign, Tianyin XuUniversity of Illinois at Urbana-Champaign
DOI
19:40
20m
Talk
The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android
Technical Papers
Austin MordahlUniversity of Texas at Dallas, Shiyi WeiUniversity of Texas at Dallas
DOI Pre-print
20:00
20m
Talk
Challenges and Opportunities: An In-Depth Empirical Study on Configuration Error Injection Testing
Technical Papers
Wang LiNational University of Defense Technology, Zhouyang JiaNational University of Defense Technology, Shanshan LiNational University of Defense Technology, Yuanliang ZhangNational University of Defense Technology, Teng WangNational University of Defense Technology, Erci XuNational University of Defense Technology, Ji WangNational University of Defense Technology, Xiangke LiaoNational University of Defense Technology
DOI File Attached

Conference Day
Fri 16 Jul

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

02:00 - 03:20
Session 13 (time band 2) Testing Deep Learning Systems 4Technical Papers at ISSTA 1
Chair(s): Shiqing MaRutgers University
02:00
20m
Talk
Efficient White-Box Fairness Testing through Gradient Search
Technical Papers
Lingfeng ZhangEast China Normal University, Yueling ZhangSingapore Management University, Min ZhangEast China Normal University
DOI Media Attached
02:20
20m
Talk
DialTest: Automated Testing for Recurrent-Neural-Network-Driven Dialogue Systems
Technical Papers
Zixi LiuNanjing University, Yang FengNanjing University, Zhenyu ChenNanjing University
DOI
02:40
20m
Talk
AdvDoor: Adversarial Backdoor Attack of Deep Learning System
Technical Papers
Quan ZhangTsinghua University, Yifeng DingTsinghua University, Yongqiang TianUniversity of Waterloo, Jianmin GuoTsinghua University, Min YuanWeBank, Yu JiangTsinghua University
DOI
03:00
20m
Talk
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Technical Papers
Yuanchun LiMicrosoft Research, Ziqi ZhangPeking University, Bingyan LiuPeking University, Ziyue YangMicrosoft Research, Yunxin LiuTsinghua University
DOI
02:00 - 03:20
Session 14 (time band 2) Symbolic Execution 2Technical Papers at ISSTA 2
Chair(s): Martin NowackImperial College London
02:00
20m
Talk
Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration
Technical Papers
Peisen YaoHong Kong University of Science and Technology, Heqing HuangHong Kong University of Science and Technology, Tang WenshengHong Kong University of Science and Technology, Qingkai ShiPurdue University, USA, Rongxin WuXiamen University, Charles ZhangHong Kong University of Science and Technology
DOI
02:20
20m
Talk
Synthesize Solving Strategy for Symbolic Execution
Technical Papers
Zhenbang ChenNational University of Defense Technology, Zehua ChenNational University of Defense Technology, Ziqi ShuaiNational University of Defense Technology, Guofeng ZhangHunan University, Weiyu PanNational University of Defense Technology, Yufeng ZhangHunan University, Ji WangNational University of Defense Technology
DOI
02:40
20m
Talk
Type and Interval Aware Array Constraint Solving for Symbolic ExecutionACM SIGSOFT Distinguished Paper
Technical Papers
Ziqi ShuaiNational University of Defense Technology, Zhenbang ChenNational University of Defense Technology, Yufeng ZhangHunan University, Jun SunSingapore Management University, Ji WangNational University of Defense Technology
DOI
03:00
20m
Talk
Grammar-Agnostic Symbolic Execution by Token Symbolization
Technical Papers
Weiyu PanNational University of Defense Technology, Zhenbang ChenNational University of Defense Technology, Guofeng ZhangHunan University, Yunlai LuoNational University of Defense Technology, Yufeng ZhangHunan University, Ji WangNational University of Defense Technology
DOI
08:00 - 09:00
Session 15 (time band 3) Testing 1Technical Papers at ISSTA 1
Chair(s): Phil McMinnUniversity of Sheffield
08:00
20m
Talk
Empirically Evaluating Readily Available Information for Regression Test Optimization in Continuous Integration
Technical Papers
Daniel ElsnerTU Munich, Florian HauerTU Munich, Alexander PretschnerTU Munich, Silke ReimerIVU Traffic Technologies
DOI
08:20
20m
Talk
Toward Optimal MC/DC Test Case Generation
Technical Papers
Sangharatna GodboleyNational Institute of Technology Warangal, Joxan JaffarNational University of Singapore, Rasool MagharehHuawei, Arpita DuttaNational University of Singapore
DOI
08:40
20m
Talk
Log-Based Slicing for System-Level Test Cases
Technical Papers
Salma MessaoudiUniversity of Luxembourg, Donghwan ShinUniversity of Luxembourg, Annibale PanichellaDelft University of Technology; University of Luxembourg, Domenico BianculliUniversity of Luxembourg, Lionel BriandUniversity of Luxembourg; University of Ottawa
DOI Media Attached
08:00 - 09:00
Session 16 (time band 3) Binary AnalysisTechnical Papers at ISSTA 2
Chair(s): Michael PradelUniversity of Stuttgart
08:00
20m
Talk
iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing
Technical Papers
Shisong QinTsinghua University, Chao ZhangTsinghua University, Kaixiang ChenTsinghua University, Zheming LiTsinghua University
DOI
08:20
20m
Talk
RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis
Technical Papers
Ming YuanTsinghua University, Yeseop LeeTsinghua University, Chao ZhangTsinghua University, Yun LiTsinghua University, Yan CaiInstitute of Software at Chinese Academy of Sciences, Bodong ZhaoTsinghua University
DOI
08:40
20m
Talk
A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped BinariesACM SIGSOFT Distinguished Paper
Technical Papers
Han GaoUniversity of Science and Technology of China, Shaoyin ChengUniversity of Science and Technology of China, Yinxing XueUniversity of Science and Technology of China, Weiming ZhangUniversity of Science and Technology of China
DOI
10:00 - 11:20
Session 17 (time band 3) Testing Miscellaneous Systems Technical Papers at ISSTA 1
Chair(s): Thuan PhamThe University of Melbourne
10:00
20m
Talk
Empirical Evaluation of Smart Contract Testing: What Is the Best Choice?
Technical Papers
Meng RenTsinghua University, Zijing YinTsinghua University, Fuchen MaTsinghua University, Zhenyang XuUniversity of Waterloo, Yu JiangTsinghua University, Chengnian SunUniversity of Waterloo, Huizhong LiWeBank, Yan CaiInstitute of Software at Chinese Academy of Sciences
DOI File Attached
10:20
20m
Talk
Interval Constraint-Based Mutation Testing of Numerical Specifications
Technical Papers
Clothilde JeangoudouxMPI-SWS, Eva DarulovaMPI-SWS, Christoph LauterUniversity of Alaska at Anchorage
DOI
10:40
20m
Talk
TERA: Optimizing Stochastic Regression Tests in Machine Learning Projects
Technical Papers
Saikat DuttaUniversity of Illinois at Urbana-Champaign, Jeeva SelvamUniversity of Illinois at Urbana-Champaign, Aryaman JainUniversity of Illinois at Urbana-Champaign, Sasa MisailovicUniversity of Illinois at Urbana-Champaign
DOI
11:00
20m
Talk
Predoo: Precision Testing of Deep Learning Operators
Technical Papers
Xufan ZhangNanjing University, Ning SunNanjing University, Chunrong FangNanjing University, Jiawei LiuNanjing University, Jia LiuNanjing University, Dong ChaiHuawei, Jiang WangHuawei, Zhenyu ChenNanjing University
DOI
10:00 - 11:20
Session 18 (time band 3) Android Application Testing 2Technical Papers at ISSTA 2
Chair(s): Shin Hwei TanSouthern University of Science and Technology
10:00
20m
Talk
GUIDER: GUI Structure and Vision Co-Guided Test Script Repair for Android Apps
Technical Papers
Tongtong XuNanjing University, Minxue PanNanjing University, Yu PeiHong Kong Polytechnic University, Guiyin LiNanjing University, Xia ZengTencent, Tian ZhangNanjing University, Yuetang DengTencent, Xuandong LiNanjing University
DOI
10:20
20m
Talk
Understanding and Finding System Setting-Related Defects in Android Apps
Technical Papers
Jingling SunEast China Normal University, Ting SuEast China Normal University, Junxin LiEast China Normal University, Zhen DongNational University of Singapore, Geguang PuEast China Normal University, Tao XiePeking University, Zhendong SuETH Zurich
DOI
10:40
20m
Talk
Parema: An Unpacking Framework for Demystifying VM-Based Android Packers
Technical Papers
Lei XueHong Kong Polytechnic University, Yuxiao YanXi'an Jiaotong University; Hong Kong Polytechnic University, Luyi YanHong Kong Polytechnic University, Muhui JiangHong Kong Polytechnic University, Xiapu LuoHong Kong Polytechnic University, Dinghao WuPennsylvania State University, Yajin ZhouZhejiang University
DOI
11:00
20m
Talk
HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis
Technical Papers
Yueming WuHuazhong University of Science and Technology, Deqing ZouHuazhong University of Science and Technology, Wei YangUniversity of Texas at Dallas, Xiang LiHuazhong University of Science and Technology, Hai JinHuazhong University of Science and Technology
DOI
17:00 - 17:55
ISSTA Impact Paper Award TalkKeynotes at Keynote
Chair(s): Cristian CadarImperial College London, UK
17:00
55m
Keynote
Automated Debugging: Past, Present, and Future (ISSTA Impact Paper Award)Keynote
Keynotes
Alessandro OrsoGeorgia Tech, Chris ParninNorth Carolina State University
18:20 - 20:00
Session 19 (time band 1) Testing 2Technical Papers at ISSTA 1
Chair(s): Rohan PadhyeCarnegie Mellon University
18:20
20m
Talk
Model-Based Testing of Networked Applications
Technical Papers
Yishuai LiUniversity of Pennsylvania, Benjamin C. PierceUniversity of Pennsylvania, Steve ZdancewicUniversity of Pennsylvania
DOI Pre-print
18:40
20m
Talk
Validating Static Warnings via Testing Code Fragments
Technical Papers
Ashwin Kallingal JoshyIowa State University, Xueyuan ChenIowa State University, Benjamin SteenhoekIowa State University, Wei LeIowa State University
DOI
19:00
20m
Talk
Gramatron: Effective Grammar-Aware Fuzzing
Technical Papers
Prashast SrivastavaPurdue University, Mathias PayerEPFL
DOI Pre-print Media Attached File Attached
19:20
20m
Talk
Empirically Evaluating Readily Available Information for Regression Test Optimization in Continuous Integration
Technical Papers
Daniel ElsnerTU Munich, Florian HauerTU Munich, Alexander PretschnerTU Munich, Silke ReimerIVU Traffic Technologies
DOI
19:40
20m
Talk
Log-Based Slicing for System-Level Test Cases
Technical Papers
Salma MessaoudiUniversity of Luxembourg, Donghwan ShinUniversity of Luxembourg, Annibale PanichellaDelft University of Technology; University of Luxembourg, Domenico BianculliUniversity of Luxembourg, Lionel BriandUniversity of Luxembourg; University of Ottawa
DOI Media Attached
18:20 - 20:00
Session 20 (time band 1) AnalysisTechnical Papers at ISSTA 2
Chair(s): Shiyi WeiUniversity of Texas at Dallas
18:20
20m
Talk
A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped BinariesACM SIGSOFT Distinguished Paper
Technical Papers
Han GaoUniversity of Science and Technology of China, Shaoyin ChengUniversity of Science and Technology of China, Yinxing XueUniversity of Science and Technology of China, Weiming ZhangUniversity of Science and Technology of China
DOI
18:40
20m
Talk
Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper)
Technical Papers
Sicheng LuoFudan University, Hui XuFudan University, Yanxiang BiFudan University, Xin WangFudan University, Yangfan ZhouFudan University
DOI File Attached
19:00
20m
Talk
Finding Data Compatibility Bugs with JSON Subschema CheckingDistinguished Artifact
Technical Papers
Andrew HabibSnT, University of Luxembourg, Avraham ShinnarIBM Research, Martin HirzelIBM Research, Michael PradelUniversity of Stuttgart
Link to publication DOI Pre-print File Attached
19:20
20m
Talk
SAND: A Static Analysis Approach for Detecting SQL AntipatternsACM SIGSOFT Distinguished Paper
Technical Papers
Yingjun LyuAmazon, Sasha VolokhUniversity of Southern California, William G.J. HalfondUniversity of Southern California, Omer TrippAmazon
DOI
19:40
20m
Talk
Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact
Technical Papers
Ridwan Salihin ShariffdeenNational University of Singapore, Xiang GaoNational University of Singapore, Gregory J. DuckNational University of Singapore, Shin Hwei TanSouthern University of Science and Technology, Julia LawallInria, Abhik RoychoudhuryNational University of Singapore
DOI Pre-print Media Attached

Conference Day
Sat 17 Jul

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

00:00 - 00:55
ISSTA Impact Paper Award TalkKeynotes at Keynote
Chair(s): Xiangyu ZhangPurdue University
00:00
55m
Keynote
Automated Debugging: Past, Present, and Future (ISSTA Impact Paper Award)Keynote
Keynotes
Alessandro OrsoGeorgia Tech, Chris ParninNorth Carolina State University
01:10 - 02:30
Session 21 (time band 2) Testing 3Technical Papers at ISSTA 1
Chair(s): Rohan PadhyeCarnegie Mellon University
01:10
20m
Talk
Continuous Test Suite Failure Prediction
Technical Papers
Cong PanBeihang University, Michael PradelUniversity of Stuttgart
DOI Media Attached
01:30
20m
Talk
Toward Optimal MC/DC Test Case Generation
Technical Papers
Sangharatna GodboleyNational Institute of Technology Warangal, Joxan JaffarNational University of Singapore, Rasool MagharehHuawei, Arpita DuttaNational University of Singapore
DOI
01:50
20m
Talk
Challenges and Opportunities: An In-Depth Empirical Study on Configuration Error Injection Testing
Technical Papers
Wang LiNational University of Defense Technology, Zhouyang JiaNational University of Defense Technology, Shanshan LiNational University of Defense Technology, Yuanliang ZhangNational University of Defense Technology, Teng WangNational University of Defense Technology, Erci XuNational University of Defense Technology, Ji WangNational University of Defense Technology, Xiangke LiaoNational University of Defense Technology
DOI File Attached
02:10
20m
Talk
Test-Case Prioritization for Configuration TestingACM SIGSOFT Distinguished Paper
Technical Papers
Runxiang ChengUniversity of Illinois at Urbana-Champaign, Lingming ZhangUniversity of Illinois at Urbana-Champaign, Darko MarinovUniversity of Illinois at Urbana-Champaign, Tianyin XuUniversity of Illinois at Urbana-Champaign
DOI
01:10 - 02:30
Session 22 (time band 2) Bugs and Analysis 1 Technical Papers at ISSTA 2
Chair(s): Saeid Tizpaz-NiariUniversity of Texas at El Paso
01:10
20m
Talk
Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space
Technical Papers
Yicheng PanPeking University, Meng MaPeking University, Xinrui JiangPeking University, Ping WangPeking University
DOI Media Attached File Attached
01:30
20m
Talk
iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing
Technical Papers
Shisong QinTsinghua University, Chao ZhangTsinghua University, Kaixiang ChenTsinghua University, Zheming LiTsinghua University
DOI
01:50
20m
Talk
RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis
Technical Papers
Ming YuanTsinghua University, Yeseop LeeTsinghua University, Chao ZhangTsinghua University, Yun LiTsinghua University, Yan CaiInstitute of Software at Chinese Academy of Sciences, Bodong ZhaoTsinghua University
DOI
02:10
20m
Talk
Fixing Dependency Errors for Python Build Reproducibility
Technical Papers
Suchita MukherjeeUniversity of California at Davis, Abigail AlmanzaUniversity of California at Davis, Cindy Rubio-GonzálezUniversity of California at Davis
DOI
02:40 - 03:40
Session 23 (time band 2) Testing 4Technical Papers at ISSTA 1
Chair(s): Wensheng DouInstitute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
02:40
20m
Talk
Validating Static Warnings via Testing Code Fragments
Technical Papers
Ashwin Kallingal JoshyIowa State University, Xueyuan ChenIowa State University, Benjamin SteenhoekIowa State University, Wei LeIowa State University
DOI
03:00
20m
Talk
Empirical Evaluation of Smart Contract Testing: What Is the Best Choice?
Technical Papers
Meng RenTsinghua University, Zijing YinTsinghua University, Fuchen MaTsinghua University, Zhenyang XuUniversity of Waterloo, Yu JiangTsinghua University, Chengnian SunUniversity of Waterloo, Huizhong LiWeBank, Yan CaiInstitute of Software at Chinese Academy of Sciences
DOI File Attached
03:20
20m
Talk
Model-Based Testing of Networked Applications
Technical Papers
Yishuai LiUniversity of Pennsylvania, Benjamin C. PierceUniversity of Pennsylvania, Steve ZdancewicUniversity of Pennsylvania
DOI Pre-print
02:40 - 03:40
Session 24 (time band 2) Android and Web Application TestingTechnical Papers at ISSTA 2
Chair(s): Omer TrippIBM Thomas J. Watson Research Center
02:40
20m
Talk
WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes
Technical Papers
Fei ShaoCase Western Reserve University, Rui XuCase Western Reserve University, Wasif HaqueUniversity of Texas at Dallas, Jingwei XuPeking University, Ying ZhangPeking University, Wei YangUniversity of Texas at Dallas, Yanfang YeCase Western Reserve University, Xusheng XiaoCase Western Reserve University
DOI File Attached
03:00
20m
Talk
The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android
Technical Papers
Austin MordahlUniversity of Texas at Dallas, Shiyi WeiUniversity of Texas at Dallas
DOI Pre-print
03:20
20m
Talk
An Infrastructure Approach to Improving Effectiveness of Android UI Testing Tools
Technical Papers
Wenyu WangUniversity of Illinois at Urbana-Champaign, Wing LamUniversity of Illinois at Urbana-Champaign, Tao XiePeking University
DOI
08:00 - 09:20
Session 25 (time band 3) Testing and AnalysisTechnical Papers at ISSTA 1
Chair(s): Michael PradelUniversity of Stuttgart
08:00
20m
Talk
Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact
Technical Papers
Ridwan Salihin ShariffdeenNational University of Singapore, Xiang GaoNational University of Singapore, Gregory J. DuckNational University of Singapore, Shin Hwei TanSouthern University of Science and Technology, Julia LawallInria, Abhik RoychoudhuryNational University of Singapore
DOI Pre-print Media Attached
08:20
20m
Talk
Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms
Technical Papers
Kulani Tharaka MahadewaNational University of Singapore, Yanjun ZhangUniversity of Queensland, Guangdong BaiUniversity of Queensland, Lei BuNanjing University, Zhiqiang ZuoNanjing University, Dileepa FernandoSri Lanka Technological Campus, Zhenkai LiangNational University of Singapore, Jin Song DongNational University of Singapore
DOI Media Attached File Attached
08:40
20m
Talk
Modular Call Graph Construction for Security Scanning of Node.js Applications
Technical Papers
Benjamin Barslev NielsenAarhus University, Martin Toldam TorpAarhus University, Anders MøllerAarhus University
DOI
09:00
20m
Talk
Semantic Matching of GUI Events for Test Reuse: Are We There Yet?
Technical Papers
Leonardo MarianiUniversity of Milano-Bicocca, Ali MohebbiUSI Lugano, Mauro PezzeUSI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Valerio TerragniUniversity of Auckland
DOI Pre-print
08:00 - 09:20
Session 26 (time band 3) Testing Deep Learning Systems 5Technical Papers at ISSTA 2
Chair(s): Junjie ChenTianjin University
08:00
20m
Talk
Efficient White-Box Fairness Testing through Gradient Search
Technical Papers
Lingfeng ZhangEast China Normal University, Yueling ZhangSingapore Management University, Min ZhangEast China Normal University
DOI Media Attached
08:20
20m
Talk
DialTest: Automated Testing for Recurrent-Neural-Network-Driven Dialogue Systems
Technical Papers
Zixi LiuNanjing University, Yang FengNanjing University, Zhenyu ChenNanjing University
DOI
08:40
20m
Talk
AdvDoor: Adversarial Backdoor Attack of Deep Learning System
Technical Papers
Quan ZhangTsinghua University, Yifeng DingTsinghua University, Yongqiang TianUniversity of Waterloo, Jianmin GuoTsinghua University, Min YuanWeBank, Yu JiangTsinghua University
DOI
09:00
20m
Talk
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Technical Papers
Yuanchun LiMicrosoft Research, Ziqi ZhangPeking University, Bingyan LiuPeking University, Ziyue YangMicrosoft Research, Yunxin LiuTsinghua University
DOI
09:30 - 11:10
Session 27 (time band 3) Bugs and Analysis 2Technical Papers at ISSTA 1
Chair(s): Mike PapadakisUniversity of Luxembourg, Luxembourg
09:30
20m
Talk
Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space
Technical Papers
Yicheng PanPeking University, Meng MaPeking University, Xinrui JiangPeking University, Ping WangPeking University
DOI Media Attached File Attached
09:50
20m
Talk
Finding Data Compatibility Bugs with JSON Subschema CheckingDistinguished Artifact
Technical Papers
Andrew HabibSnT, University of Luxembourg, Avraham ShinnarIBM Research, Martin HirzelIBM Research, Michael PradelUniversity of Stuttgart
Link to publication DOI Pre-print File Attached
10:10
20m
Talk
Semantic Table Structure Identification in Spreadsheets
Technical Papers
Yakun ZhangInstitute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiao LvMicrosoft Research, Haoyu DongMicrosoft Research, Wensheng DouInstitute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shi HanMicrosoft Research, Dongmei ZhangMicrosoft Research, Jun WeiInstitute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan YeInstitute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
10:30
20m
Talk
Deep Just-in-Time Defect Prediction: How Far Are We?
Technical Papers
Zhengran ZengSouthern University of Science and Technology, Yuqun ZhangSouthern University of Science and Technology, Haotian ZhangKwai, Lingming ZhangUniversity of Illinois at Urbana-Champaign
DOI
10:50
20m
Talk
Continuous Test Suite Failure Prediction
Technical Papers
Cong PanBeihang University, Michael PradelUniversity of Stuttgart
DOI Media Attached
09:30 - 10:50
Session 28 (time band 3) Fuzzing and Runtime AnalysisTechnical Papers at ISSTA 2
Chair(s): Michaël MarcozziUniversité Paris-Saclay, CEA, List
09:30
20m
Talk
Runtime Detection of Memory Errors with Smart Status
Technical Papers
Zhe ChenNanjing University of Aeronautics and Astronautics, Chong WangNanjing University of Aeronautics and Astronautics, Junqi YanNanjing University of Aeronautics and Astronautics, Yulei SuiUniversity of Technology Sydney, Jingling XueUNSW
DOI Media Attached
09:50
20m
Talk
UAFSan: An Object-Identifier-Based Dynamic Approach for Detecting Use-After-Free Vulnerabilities
Technical Papers
Binfa GuiNanjing University of Science and Technology, Wei SongNanjing University of Science and Technology, Jeff HuangTexas A&M University
DOI Media Attached File Attached
10:10
20m
Talk
Seed Selection for Successful Fuzzing
Technical Papers
Adrian HerreraAustralian National University; DST, Hendra GunadiAustralian National University, Shane MagrathDST, Michael NorrishCSIRO’s Data61; Australian National University, Mathias PayerEPFL, Tony HoskingAustralian National University; CSIRO’s Data61
DOI Pre-print File Attached
10:30
20m
Talk
QFuzz: Quantitative Fuzzing for Side Channels
Technical Papers
Yannic NollerNational University of Singapore, Saeid Tizpaz-NiariUniversity of Texas at El Paso
DOI Pre-print Media Attached

Call for Papers

Technical Papers

Authors are invited to submit research papers describing original contributions in testing or analysis of computer software. Papers describing original theoretical or empirical research, new techniques, methods for emerging systems, in-depth case studies, infrastructures of testing and analysis, or tools are welcome.

Experience Papers

Authors are invited to submit experience papers describing a significant experience in applying software testing and analysis methods or tools and should carefully identify and discuss important lessons learned so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of software testing and analysis methods or tools.

Replicability Studies

ISSTA would like to encourage researchers to replicate results from previous papers. A replicability study must go beyond simply re-implementing an algorithm and/or re-running the artifacts provided by the original paper. It should at the very least apply the approach to new, significantly broadened inputs. Particularly, replicability studies are encouraged to target techniques that previously were evaluated only on proprietary subject programs or inputs. A replicability study should clearly report on results that the authors were able to replicate as well as on aspects of the work that were not replicatable. In the latter case, authors are encouraged to make an effort to communicate or collaborate with the original paper’s authors to determine the cause for any observed discrepancies and, if possible, address them (e.g., through minor implementation changes). We explicitly encourage authors to not focus on a single paper/artifact only, but instead to perform a comparative experiment of multiple related approaches. In particular, replicability studies should follow the ACM guidelines on replicability (different team, different experimental setup): The measurement can be obtained with stated precision by a different team, a different measuring system, in a different location on multiple trials. For computational experiments, this means that an independent group can obtain the same result using artifacts which they develop completely independently. This means that it is also insufficient to focus on reproducibility (i.e., different team, same experimental setup) alone. Replicability Studies will be evaluated according to the following standards:

  • Depth and breadth of experiments
  • Clarity of writing
  • Appropriateness of conclusions
  • Amount of useful, actionable insights
  • Availability of artifacts

We expect replicability studies to clearly point out the artifacts the study is built on, and to submit those artifacts to artifact evaluation (see below). Artifacts evaluated positively will be eligible to obtain the prestigious Results Reproduced badge.

Submissions Guideline

Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this symposium. Authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions. More details are available at the Submission Policies page. Research and Experience Papers as well as Replicability Studies should be at most 10 pages in length, with at most 2 additional pages for references. Experience papers and replicability studies should clearly specify their category in the paper title upon submission, e.g., “XXX (Experience Paper)”. All authors should use the official “ACM Master article template”, which can be obtained from the ACM Proceedings Template pages. Latex users should use the “sigconf” option, as well as the “review” (to produce line numbers for easy reference by the reviewers) and “anonymous” (omitting author names) options. To that end, the following latex code can be placed at the start of the latex document:

\documentclass[sigconf,review, anonymous]{acmart}
\acmConference[ISSTA 2021]{ACM SIGSOFT International Symposium on Software Testing and Analysis}{12-16 July, 2021}{ Aarhus, Denmark}

Submit your papers via the HotCRP ISSTA 2021 submission website.

Double-blind Reviewing

ISSTA 2021 will conduct double-blind reviewing. Submissions should not reveal the identity of the authors in any way. Authors should leave out author names and affiliations from the body of their submission. They should also ensure that any citations to related work by themselves are written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.

Double-blind reviewing should not hinder the usual communication of results. But, during the review period, please don’t broadcast the work on social media. Also, to the extent to which this is possible, please avoid publishing the preprint of your work (e.g., on arXiv or on your website) until it is accepted for publication. In exceptional cases this might be required, but then please avoid spreading the paper more actively.

Authors with further questions on double-blind reviewing are encouraged to contact the Program Chair by email.

Supplementary Material

Authors are free to provide supplementary material if that material supports the claims in the paper. Such material may include proofs, experimental results, and/or data sets. This material should be uploaded at the same time as the submission. Any supplementary material must also be anonymized. Reviewers are not required to examine the supplementary material but may refer to it if they would like to find further evidence supporting the claims in the paper. Please prepare the supplementary material in the PDF format.

Reviews and Responses

Each paper will receive three reviews, followed by an author response. After the response, some papers might receive additional reviews where necessary, to which authors can respond in a second author-response phase.

Visa Policy

In cases where the travel Visa is rejected or delayed for a long time (e.g., due to additional checks) so that the authors are not able to attend the conference despite best efforts, alternative presentation methods will be considered. However, the authors should notify the program chair at least one week before the conference and provide proof of visa being applied in time.

Accepted Papers

Title
A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped BinariesACM SIGSOFT Distinguished Paper
Technical Papers
DOI
AdvDoor: Adversarial Backdoor Attack of Deep Learning System
Technical Papers
DOI
An Infrastructure Approach to Improving Effectiveness of Android UI Testing Tools
Technical Papers
DOI
Attack as Defense: Characterizing Adversarial Examples using Robustness
Technical Papers
DOI
Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact
Technical Papers
DOI Pre-print Media Attached
Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper)
Technical Papers
DOI
Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper)
Technical Papers
DOI File Attached
Challenges and Opportunities: An In-Depth Empirical Study on Configuration Error Injection Testing
Technical Papers
DOI File Attached
Continuous Test Suite Failure Prediction
Technical Papers
DOI Media Attached
Deep Just-in-Time Defect Prediction: How Far Are We?
Technical Papers
DOI
DeepCrime: Mutation Testing of Deep Learning Systems Based on Real Faults
Technical Papers
DOI
DeepHyperion: Exploring the Feature Space of Deep Learning-Based Systems through Illumination Search
Technical Papers
DOI File Attached
DialTest: Automated Testing for Recurrent-Neural-Network-Driven Dialogue Systems
Technical Papers
DOI
Efficient White-Box Fairness Testing through Gradient Search
Technical Papers
DOI Media Attached
Empirical Evaluation of Smart Contract Testing: What Is the Best Choice?
Technical Papers
DOI File Attached
Empirically Evaluating Readily Available Information for Regression Test Optimization in Continuous Integration
Technical Papers
DOI
Exposing Previously Undetectable Faults in Deep Neural Networks
Technical Papers
DOI Pre-print Media Attached
Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space
Technical Papers
DOI Media Attached File Attached
Finding Data Compatibility Bugs with JSON Subschema CheckingDistinguished Artifact
Technical Papers
Link to publication DOI Pre-print File Attached
Fixing Dependency Errors for Python Build Reproducibility
Technical Papers
DOI
Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration
Technical Papers
DOI
GUIDER: GUI Structure and Vision Co-Guided Test Script Repair for Android Apps
Technical Papers
DOI
Gramatron: Effective Grammar-Aware Fuzzing
Technical Papers
DOI Pre-print Media Attached File Attached
Grammar-Agnostic Symbolic Execution by Token Symbolization
Technical Papers
DOI
HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis
Technical Papers
DOI
Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms
Technical Papers
DOI Media Attached File Attached
Interval Constraint-Based Mutation Testing of Numerical Specifications
Technical Papers
DOI
Log-Based Slicing for System-Level Test Cases
Technical Papers
DOI Media Attached
Model-Based Testing of Networked Applications
Technical Papers
DOI Pre-print
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Technical Papers
DOI
Modular Call Graph Construction for Security Scanning of Node.js Applications
Technical Papers
DOI
Parema: An Unpacking Framework for Demystifying VM-Based Android Packers
Technical Papers
DOI
Predoo: Precision Testing of Deep Learning Operators
Technical Papers
DOI
QFuzz: Quantitative Fuzzing for Side Channels
Technical Papers
DOI Pre-print Media Attached
RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis
Technical Papers
DOI
Runtime Detection of Memory Errors with Smart Status
Technical Papers
DOI Media Attached
SAND: A Static Analysis Approach for Detecting SQL AntipatternsACM SIGSOFT Distinguished Paper
Technical Papers
DOI
Seed Selection for Successful Fuzzing
Technical Papers
DOI Pre-print File Attached
Semantic Matching of GUI Events for Test Reuse: Are We There Yet?
Technical Papers
DOI Pre-print
Semantic Table Structure Identification in Spreadsheets
Technical Papers
DOI
Synthesize Solving Strategy for Symbolic Execution
Technical Papers
DOI
TERA: Optimizing Stochastic Regression Tests in Machine Learning Projects
Technical Papers
DOI
Test-Case Prioritization for Configuration TestingACM SIGSOFT Distinguished Paper
Technical Papers
DOI
The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android
Technical Papers
DOI Pre-print
Toward Optimal MC/DC Test Case Generation
Technical Papers
DOI
Type and Interval Aware Array Constraint Solving for Symbolic ExecutionACM SIGSOFT Distinguished Paper
Technical Papers
DOI
UAFSan: An Object-Identifier-Based Dynamic Approach for Detecting Use-After-Free Vulnerabilities
Technical Papers
DOI Media Attached File Attached
Understanding and Finding System Setting-Related Defects in Android Apps
Technical Papers
DOI
Validating Static Warnings via Testing Code Fragments
Technical Papers
DOI
WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes
Technical Papers
DOI File Attached
iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing
Technical Papers
DOI