Write a Blog >>
ISSTA 2021
Sun 11 - Sat 17 July 2021 Online
co-located with ECOOP and ISSTA 2021

The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) is the leading research symposium on software testing and analysis, bringing together academics, industrial researchers, and practitioners to exchange new ideas, problems, and experience on how to analyze and test software systems.

Dates
Plenary
You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 14 Jul

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

18:30 - 19:30
Session 1 (time band 1) Web ApplicationsTechnical Papers at ISSTA 1
Chair(s): Xusheng Xiao Case Western Reserve University
18:30
20m
Talk
Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms
Technical Papers
Kulani Tharaka Mahadewa National University of Singapore, Yanjun Zhang University of Queensland, Guangdong Bai University of Queensland, Lei Bu Nanjing University, Zhiqiang Zuo Nanjing University, Dileepa Fernando Sri Lanka Technological Campus, Zhenkai Liang National University of Singapore, Jin Song Dong National University of Singapore
DOI Media Attached File Attached
18:50
20m
Talk
WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes
Technical Papers
Fei Shao Case Western Reserve University, Rui Xu Case Western Reserve University, Wasif Haque University of Texas at Dallas, Jingwei Xu Peking University, Ying Zhang Peking University, Wei Yang University of Texas at Dallas, Yanfang Ye Case Western Reserve University, Xusheng Xiao Case Western Reserve University
DOI File Attached
19:10
20m
Talk
Modular Call Graph Construction for Security Scanning of Node.js Applications
Technical Papers
Benjamin Barslev Nielsen Aarhus University, Martin Toldam Torp Aarhus University, Anders Møller Aarhus University
DOI Media Attached
18:30 - 19:30
Session 2 (time band 1) Testing Deep Learning Systems 1Technical Papers at ISSTA 2
Chair(s): Lin Tan Purdue University
18:30
20m
Talk
Attack as Defense: Characterizing Adversarial Examples using Robustness
Technical Papers
Zhe Zhao ShanghaiTech University, Guangke Chen ShanghaiTech University, Jingyi Wang Zhejiang University, Yiwei Yang ShanghaiTech University, Fu Song ShanghaiTech University, Jun Sun Singapore Management University
DOI Media Attached
18:50
20m
Talk
Exposing Previously Undetectable Faults in Deep Neural Networks
Technical Papers
Isaac Dunn University of Oxford, Hadrien Pouget University of Oxford, Daniel Kroening Amazon, Tom Melham University of Oxford
DOI Pre-print Media Attached
19:10
20m
Talk
DeepCrime: Mutation Testing of Deep Learning Systems Based on Real Faults
Technical Papers
Nargiz Humbatova USI Lugano, Gunel Jahangirova USI Lugano, Paolo Tonella USI Lugano
DOI
19:40 - 20:40
Session 3 (time band 1) Android Application TestingTechnical Papers at ISSTA 1
Chair(s): Alex Orso Georgia Institute of Technology
19:40
20m
Talk
Parema: An Unpacking Framework for Demystifying VM-Based Android Packers
Technical Papers
Lei Xue Hong Kong Polytechnic University, Yuxiao Yan Xi'an Jiaotong University; Hong Kong Polytechnic University, Luyi Yan Hong Kong Polytechnic University, Muhui Jiang Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Dinghao Wu Pennsylvania State University, Yajin Zhou Zhejiang University
DOI
20:00
20m
Talk
An Infrastructure Approach to Improving Effectiveness of Android UI Testing Tools
Technical Papers
Wenyu Wang University of Illinois at Urbana-Champaign, Wing Lam University of Illinois at Urbana-Champaign, Tao Xie Peking University
Link to publication DOI Media Attached
20:20
20m
Talk
Semantic Matching of GUI Events for Test Reuse: Are We There Yet?
Technical Papers
Leonardo Mariani University of Milano-Bicocca, Ali Mohebbi USI Lugano, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology, Valerio Terragni University of Auckland
DOI Pre-print
19:40 - 20:20
Session 4 (time band 1) Testing Deep Learning Systems 2Technical Papers at ISSTA 2
Chair(s): Sebastian Elbaum University of Virginia
19:40
20m
Talk
DeepHyperion: Exploring the Feature Space of Deep Learning-Based Systems through Illumination Search
Technical Papers
Tahereh Zohdinasab USI Lugano, Vincenzo Riccio USI Lugano, Alessio Gambi University of Passau, Paolo Tonella USI Lugano
DOI File Attached
20:00
20m
Talk
Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper)
Technical Papers
Fitash Ul Haq University of Luxembourg, Donghwan Shin University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa, Thomas Stifter IEE, Jun Wang Post Luxembourg
DOI

Thu 15 Jul

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

00:20 - 01:20
Session 5 (time band 2) Android Application Analysis and TestingTechnical Papers at ISSTA 1
Chair(s): William G.J. Halfond University of Southern California
00:20
20m
Talk
GUIDER: GUI Structure and Vision Co-Guided Test Script Repair for Android Apps
Technical Papers
Tongtong Xu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Guiyin Li Nanjing University, Xia Zeng Tencent, Tian Zhang Nanjing University, Yuetang Deng Tencent, Xuandong Li Nanjing University
DOI
00:40
20m
Talk
Understanding and Finding System Setting-Related Defects in Android Apps
Technical Papers
Jingling Sun East China Normal University, Ting Su East China Normal University, Junxin Li East China Normal University, Zhen Dong National University of Singapore, Geguang Pu East China Normal University, Tao Xie Peking University, Zhendong Su ETH Zurich
DOI Media Attached
01:00
20m
Talk
HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis
Technical Papers
Yueming Wu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, Xiang Li Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
DOI
00:20 - 01:20
Session 6 (time band 2) FuzzingTechnical Papers at ISSTA 2
Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign
00:20
20m
Talk
Seed Selection for Successful Fuzzing
Technical Papers
Adrian Herrera Australian National University; DST, Hendra Gunadi Australian National University, Shane Magrath DST, Michael Norrish CSIRO’s Data61; Australian National University, Mathias Payer EPFL, Tony Hosking Australian National University; CSIRO’s Data61
DOI Pre-print File Attached
00:40
20m
Talk
Gramatron: Effective Grammar-Aware Fuzzing
Technical Papers
Prashast Srivastava Purdue University, Mathias Payer EPFL
DOI Pre-print Media Attached File Attached
01:00
20m
Talk
QFuzz: Quantitative Fuzzing for Side Channels
Technical Papers
Yannic Noller National University of Singapore, Saeid Tizpaz-Niari University of Texas at El Paso
DOI Pre-print Media Attached
01:40 - 02:20
Session 7 (time band 2) Data Processing Application AnalysisTechnical Papers at ISSTA 1
Chair(s): Darko Marinov University of Illinois at Urbana-Champaign
01:40
20m
Talk
SAND: A Static Analysis Approach for Detecting SQL AntipatternsACM SIGSOFT Distinguished Paper
Technical Papers
Yingjun Lyu Amazon, Sasha Volokh University of Southern California, William G.J. Halfond University of Southern California, Omer Tripp Amazon
DOI
02:00
20m
Talk
Semantic Table Structure Identification in Spreadsheets
Technical Papers
Yakun Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiao Lv Microsoft Research, Haoyu Dong Microsoft Research, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Ye Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI Media Attached
01:40 - 02:20
Session 8 (time band 2) Dynamic AnalysisTechnical Papers at ISSTA 2
Chair(s): Luís Pina University of Illinois at Chicago
01:40
20m
Talk
Runtime Detection of Memory Errors with Smart Status
Technical Papers
Zhe Chen Nanjing University of Aeronautics and Astronautics, Chong Wang Nanjing University of Aeronautics and Astronautics, Junqi Yan Nanjing University of Aeronautics and Astronautics, Yulei Sui University of Technology Sydney, Jingling Xue UNSW
DOI Media Attached
02:00
20m
Talk
UAFSan: An Object-Identifier-Based Dynamic Approach for Detecting Use-After-Free Vulnerabilities
Technical Papers
Binfa Gui Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University
DOI Media Attached File Attached
09:10 - 10:50
Session 9 (time band 3) Testing Deep Learning Systems 3Technical Papers at ISSTA 1
Chair(s): Mauro Pezze USI Lugano; Schaffhausen Institute of Technology
09:10
20m
Talk
Attack as Defense: Characterizing Adversarial Examples using Robustness
Technical Papers
Zhe Zhao ShanghaiTech University, Guangke Chen ShanghaiTech University, Jingyi Wang Zhejiang University, Yiwei Yang ShanghaiTech University, Fu Song ShanghaiTech University, Jun Sun Singapore Management University
DOI Media Attached
09:30
20m
Talk
Exposing Previously Undetectable Faults in Deep Neural Networks
Technical Papers
Isaac Dunn University of Oxford, Hadrien Pouget University of Oxford, Daniel Kroening Amazon, Tom Melham University of Oxford
DOI Pre-print Media Attached
09:50
20m
Talk
Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper)
Technical Papers
Fitash Ul Haq University of Luxembourg, Donghwan Shin University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa, Thomas Stifter IEE, Jun Wang Post Luxembourg
DOI
10:10
20m
Talk
DeepHyperion: Exploring the Feature Space of Deep Learning-Based Systems through Illumination Search
Technical Papers
Tahereh Zohdinasab USI Lugano, Vincenzo Riccio USI Lugano, Alessio Gambi University of Passau, Paolo Tonella USI Lugano
DOI File Attached
10:30
20m
Talk
DeepCrime: Mutation Testing of Deep Learning Systems Based on Real Faults
Technical Papers
Nargiz Humbatova USI Lugano, Gunel Jahangirova USI Lugano, Paolo Tonella USI Lugano
DOI
09:10 - 10:50
Session 10 (time band 3) Symbolic Execution 1Technical Papers at ISSTA 2
Chair(s): Sébastien Bardin CEA LIST, University Paris-Saclay
09:10
20m
Talk
Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration
Technical Papers
Peisen Yao Hong Kong University of Science and Technology, Heqing Huang Hong Kong University of Science and Technology, Wensheng Tang Hong Kong University of Science and Technology, Qingkai Shi Purdue University, Rongxin Wu Xiamen University, Charles Zhang Hong Kong University of Science and Technology
DOI
09:30
20m
Talk
Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper)
Technical Papers
Sicheng Luo Fudan University, Hui Xu Fudan University, Yanxiang Bi Fudan University, Xin Wang Fudan University, Yangfan Zhou Fudan University
DOI File Attached
09:50
20m
Talk
Synthesize Solving Strategy for Symbolic Execution
Technical Papers
Zhenbang Chen National University of Defense Technology, Zehua Chen National University of Defense Technology, Ziqi Shuai National University of Defense Technology, Guofeng Zhang Hunan University, Weiyu Pan National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang National University of Defense Technology
DOI
10:10
20m
Talk
Type and Interval Aware Array Constraint Solving for Symbolic ExecutionACM SIGSOFT Distinguished Paper
Technical Papers
Ziqi Shuai National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Yufeng Zhang Hunan University, Jun Sun Singapore Management University, Ji Wang National University of Defense Technology
DOI
10:30
20m
Talk
Grammar-Agnostic Symbolic Execution by Token Symbolization
Technical Papers
Weiyu Pan National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Guofeng Zhang Hunan University, Yunlai Luo National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang National University of Defense Technology
DOI
19:00 - 20:20
Session 11 (time band 1) Machine Learning and TestingTechnical Papers at ISSTA 1
Chair(s): August Shi University of Texas at Austin
19:00
20m
Talk
Interval Constraint-Based Mutation Testing of Numerical Specifications
Technical Papers
Clothilde Jeangoudoux MPI-SWS, Eva Darulova MPI-SWS, Christoph Lauter University of Alaska at Anchorage
DOI
19:20
20m
Talk
Predoo: Precision Testing of Deep Learning Operators
Technical Papers
Xufan Zhang Nanjing University, Ning Sun Nanjing University, Chunrong Fang Nanjing University, Jiawei Liu Nanjing University, Jia Liu Nanjing University, Dong Chai Huawei, Jiang Wang Huawei, Zhenyu Chen Nanjing University
DOI
19:40
20m
Talk
TERA: Optimizing Stochastic Regression Tests in Machine Learning Projects
Technical Papers
Saikat Dutta University of Illinois at Urbana-Champaign, Jeeva Selvam University of Illinois at Urbana-Champaign, Aryaman Jain University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign
DOI
20:00
20m
Talk
Deep Just-in-Time Defect Prediction: How Far Are We?
Technical Papers
Zhengran Zeng Southern University of Science and Technology, Yuqun Zhang Southern University of Science and Technology, Haotian Zhang Kwai, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
19:00 - 20:20
Session 12 (time band 1) Configuration and Dependency Technical Papers at ISSTA 2
Chair(s): Jonathan Bell Northeastern University
19:00
20m
Talk
Fixing Dependency Errors for Python Build Reproducibility
Technical Papers
Suchita Mukherjee University of California at Davis, Abigail Almanza University of California at Davis, Cindy Rubio-González University of California at Davis
DOI
19:20
20m
Talk
Test-Case Prioritization for Configuration TestingACM SIGSOFT Distinguished Paper
Technical Papers
Runxiang Cheng University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign
DOI
19:40
20m
Talk
The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android
Technical Papers
Austin Mordahl University of Texas at Dallas, Shiyi Wei University of Texas at Dallas
DOI Pre-print
20:00
20m
Talk
Challenges and Opportunities: An In-Depth Empirical Study on Configuration Error Injection Testing
Technical Papers
Wang Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Yuanliang Zhang National University of Defense Technology, Teng Wang National University of Defense Technology, Erci Xu National University of Defense Technology, Ji Wang National University of Defense Technology, Xiangke Liao National University of Defense Technology
DOI File Attached

Fri 16 Jul

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

02:00 - 03:20
Session 13 (time band 2) Testing Deep Learning Systems 4Technical Papers at ISSTA 1
Chair(s): Shiqing Ma Rutgers University
02:00
20m
Talk
Efficient White-Box Fairness Testing through Gradient Search
Technical Papers
Lingfeng Zhang East China Normal University, Yueling Zhang Singapore Management University, Min Zhang East China Normal University
DOI Media Attached
02:20
20m
Talk
DialTest: Automated Testing for Recurrent-Neural-Network-Driven Dialogue Systems
Technical Papers
Zixi Liu Nanjing University, Yang Feng Nanjing University, Zhenyu Chen Nanjing University
DOI
02:40
20m
Talk
AdvDoor: Adversarial Backdoor Attack of Deep Learning System
Technical Papers
Quan Zhang Tsinghua University, Yifeng Ding Tsinghua University, Yongqiang Tian Tianjin University, Jianmin Guo Tsinghua University, Min Yuan WeBank, Yu Jiang Tsinghua University
DOI
03:00
20m
Talk
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Technical Papers
Yuanchun Li Microsoft Research, Ziqi Zhang Peking University, Bingyan Liu Peking University, Ziyue Yang Microsoft Research, Yunxin Liu Tsinghua University
DOI
02:00 - 03:20
Session 14 (time band 2) Symbolic Execution 2Technical Papers at ISSTA 2
Chair(s): Martin Nowack Imperial College London
02:00
20m
Talk
Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration
Technical Papers
Peisen Yao Hong Kong University of Science and Technology, Heqing Huang Hong Kong University of Science and Technology, Wensheng Tang Hong Kong University of Science and Technology, Qingkai Shi Purdue University, Rongxin Wu Xiamen University, Charles Zhang Hong Kong University of Science and Technology
DOI
02:20
20m
Talk
Synthesize Solving Strategy for Symbolic Execution
Technical Papers
Zhenbang Chen National University of Defense Technology, Zehua Chen National University of Defense Technology, Ziqi Shuai National University of Defense Technology, Guofeng Zhang Hunan University, Weiyu Pan National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang National University of Defense Technology
DOI
02:40
20m
Talk
Type and Interval Aware Array Constraint Solving for Symbolic ExecutionACM SIGSOFT Distinguished Paper
Technical Papers
Ziqi Shuai National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Yufeng Zhang Hunan University, Jun Sun Singapore Management University, Ji Wang National University of Defense Technology
DOI
03:00
20m
Talk
Grammar-Agnostic Symbolic Execution by Token Symbolization
Technical Papers
Weiyu Pan National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Guofeng Zhang Hunan University, Yunlai Luo National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang National University of Defense Technology
DOI
08:00 - 09:00
Session 15 (time band 3) Testing 1Technical Papers at ISSTA 1
Chair(s): Phil McMinn University of Sheffield
08:00
20m
Talk
Empirically Evaluating Readily Available Information for Regression Test Optimization in Continuous Integration
Technical Papers
Daniel Elsner TU Munich, Florian Hauer TU Munich, Alexander Pretschner TU Munich, Silke Reimer IVU Traffic Technologies
DOI
08:20
20m
Talk
Toward Optimal MC/DC Test Case Generation
Technical Papers
Sangharatna Godboley National Institute of Technology Warangal, Joxan Jaffar National University of Singapore, Rasool Maghareh Huawei, Arpita Dutta National University of Singapore
DOI
08:40
20m
Talk
Log-Based Slicing for System-Level Test Cases
Technical Papers
Salma Messaoudi University of Luxembourg, Donghwan Shin University of Luxembourg, Annibale Panichella Delft University of Technology; University of Luxembourg, Domenico Bianculli University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
DOI Media Attached
08:00 - 09:00
Session 16 (time band 3) Binary AnalysisTechnical Papers at ISSTA 2
Chair(s): Michael Pradel University of Stuttgart
08:00
20m
Talk
iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing
Technical Papers
Shisong Qin Tsinghua University, Chao Zhang Tsinghua University, Kaixiang Chen Tsinghua University, Zheming Li Tsinghua University
DOI
08:20
20m
Talk
RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis
Technical Papers
Ming Yuan Tsinghua University, Yeseop Lee Tsinghua University, Chao Zhang Tsinghua University, Yun Li Tsinghua University, Yan Cai Institute of Software at Chinese Academy of Sciences, Bodong Zhao Tsinghua University
DOI
08:40
20m
Talk
A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped BinariesACM SIGSOFT Distinguished Paper
Technical Papers
Han Gao University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Weiming Zhang University of Science and Technology of China
DOI
10:00 - 11:20
Session 17 (time band 3) Testing Miscellaneous Systems Technical Papers at ISSTA 1
Chair(s): Thuan Pham The University of Melbourne
10:00
20m
Talk
Empirical Evaluation of Smart Contract Testing: What Is the Best Choice?
Technical Papers
Meng Ren Tsinghua University, Zijing Yin Tsinghua University, Fuchen Ma Tsinghua University, Zhenyang Xu University of Waterloo, Yu Jiang Tsinghua University, Chengnian Sun University of Waterloo, Huizhong Li WeBank, Yan Cai Institute of Software at Chinese Academy of Sciences
DOI File Attached
10:20
20m
Talk
Interval Constraint-Based Mutation Testing of Numerical Specifications
Technical Papers
Clothilde Jeangoudoux MPI-SWS, Eva Darulova MPI-SWS, Christoph Lauter University of Alaska at Anchorage
DOI
10:40
20m
Talk
TERA: Optimizing Stochastic Regression Tests in Machine Learning Projects
Technical Papers
Saikat Dutta University of Illinois at Urbana-Champaign, Jeeva Selvam University of Illinois at Urbana-Champaign, Aryaman Jain University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign
DOI
11:00
20m
Talk
Predoo: Precision Testing of Deep Learning Operators
Technical Papers
Xufan Zhang Nanjing University, Ning Sun Nanjing University, Chunrong Fang Nanjing University, Jiawei Liu Nanjing University, Jia Liu Nanjing University, Dong Chai Huawei, Jiang Wang Huawei, Zhenyu Chen Nanjing University
DOI
10:00 - 11:20
Session 18 (time band 3) Android Application Testing 2Technical Papers at ISSTA 2
Chair(s): Shin Hwei Tan Southern University of Science and Technology
10:00
20m
Talk
GUIDER: GUI Structure and Vision Co-Guided Test Script Repair for Android Apps
Technical Papers
Tongtong Xu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Guiyin Li Nanjing University, Xia Zeng Tencent, Tian Zhang Nanjing University, Yuetang Deng Tencent, Xuandong Li Nanjing University
DOI
10:20
20m
Talk
Understanding and Finding System Setting-Related Defects in Android Apps
Technical Papers
Jingling Sun East China Normal University, Ting Su East China Normal University, Junxin Li East China Normal University, Zhen Dong National University of Singapore, Geguang Pu East China Normal University, Tao Xie Peking University, Zhendong Su ETH Zurich
DOI Media Attached
10:40
20m
Talk
Parema: An Unpacking Framework for Demystifying VM-Based Android Packers
Technical Papers
Lei Xue Hong Kong Polytechnic University, Yuxiao Yan Xi'an Jiaotong University; Hong Kong Polytechnic University, Luyi Yan Hong Kong Polytechnic University, Muhui Jiang Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Dinghao Wu Pennsylvania State University, Yajin Zhou Zhejiang University
DOI
11:00
20m
Talk
HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis
Technical Papers
Yueming Wu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, Xiang Li Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
DOI
17:00 - 17:55
ISSTA Impact Paper Award TalkKeynotes at Keynote
Chair(s): Cristian Cadar Imperial College London, UK
17:00
55m
Keynote
Automated Debugging: Past, Present, and Future (ISSTA Impact Paper Award)Keynote
Keynotes
Alessandro Orso Georgia Tech, Chris Parnin North Carolina State University
Media Attached
18:20 - 20:00
Session 19 (time band 1) Testing 2Technical Papers at ISSTA 1
Chair(s): Rohan Padhye Carnegie Mellon University
18:20
20m
Talk
Model-Based Testing of Networked Applications
Technical Papers
Yishuai Li University of Pennsylvania, Benjamin C. Pierce University of Pennsylvania, Steve Zdancewic University of Pennsylvania
DOI Pre-print
18:40
20m
Talk
Validating Static Warnings via Testing Code Fragments
Technical Papers
Ashwin Kallingal Joshy Iowa State University, Xueyuan Chen Iowa State University, Benjamin Steenhoek Iowa State University, Wei Le Iowa State University
DOI
19:00
20m
Talk
Gramatron: Effective Grammar-Aware Fuzzing
Technical Papers
Prashast Srivastava Purdue University, Mathias Payer EPFL
DOI Pre-print Media Attached File Attached
19:20
20m
Talk
Empirically Evaluating Readily Available Information for Regression Test Optimization in Continuous Integration
Technical Papers
Daniel Elsner TU Munich, Florian Hauer TU Munich, Alexander Pretschner TU Munich, Silke Reimer IVU Traffic Technologies
DOI
19:40
20m
Talk
Log-Based Slicing for System-Level Test Cases
Technical Papers
Salma Messaoudi University of Luxembourg, Donghwan Shin University of Luxembourg, Annibale Panichella Delft University of Technology; University of Luxembourg, Domenico Bianculli University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
DOI Media Attached
18:20 - 20:00
Session 20 (time band 1) AnalysisTechnical Papers at ISSTA 2
Chair(s): Shiyi Wei University of Texas at Dallas
18:20
20m
Talk
A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped BinariesACM SIGSOFT Distinguished Paper
Technical Papers
Han Gao University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Weiming Zhang University of Science and Technology of China
DOI
18:40
20m
Talk
Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper)
Technical Papers
Sicheng Luo Fudan University, Hui Xu Fudan University, Yanxiang Bi Fudan University, Xin Wang Fudan University, Yangfan Zhou Fudan University
DOI File Attached
19:00
20m
Talk
Finding Data Compatibility Bugs with JSON Subschema CheckingDistinguished Artifact
Technical Papers
Andrew Habib SnT, University of Luxembourg, Avraham Shinnar IBM Research, Martin Hirzel IBM Research, Michael Pradel University of Stuttgart
Link to publication DOI Pre-print File Attached
19:20
20m
Talk
SAND: A Static Analysis Approach for Detecting SQL AntipatternsACM SIGSOFT Distinguished Paper
Technical Papers
Yingjun Lyu Amazon, Sasha Volokh University of Southern California, William G.J. Halfond University of Southern California, Omer Tripp Amazon
DOI
19:40
20m
Talk
Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact
Technical Papers
Ridwan Salihin Shariffdeen National University of Singapore, Xiang Gao National University of Singapore, Gregory J. Duck National University of Singapore, Shin Hwei Tan Southern University of Science and Technology, Julia Lawall Inria, Abhik Roychoudhury National University of Singapore
DOI Pre-print Media Attached

Sat 17 Jul

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

00:00 - 00:55
ISSTA Impact Paper Award TalkKeynotes at Keynote
Chair(s): Xiangyu Zhang Purdue University
00:00
55m
Keynote
Automated Debugging: Past, Present, and Future (ISSTA Impact Paper Award)Keynote
Keynotes
Alessandro Orso Georgia Tech, Chris Parnin North Carolina State University
Media Attached
01:10 - 02:30
Session 21 (time band 2) Testing 3Technical Papers at ISSTA 1
Chair(s): Rohan Padhye Carnegie Mellon University
01:10
20m
Talk
Continuous Test Suite Failure Prediction
Technical Papers
Cong Pan Beihang University, Michael Pradel University of Stuttgart
DOI Media Attached
01:30
20m
Talk
Toward Optimal MC/DC Test Case Generation
Technical Papers
Sangharatna Godboley National Institute of Technology Warangal, Joxan Jaffar National University of Singapore, Rasool Maghareh Huawei, Arpita Dutta National University of Singapore
DOI
01:50
20m
Talk
Challenges and Opportunities: An In-Depth Empirical Study on Configuration Error Injection Testing
Technical Papers
Wang Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Yuanliang Zhang National University of Defense Technology, Teng Wang National University of Defense Technology, Erci Xu National University of Defense Technology, Ji Wang National University of Defense Technology, Xiangke Liao National University of Defense Technology
DOI File Attached
02:10
20m
Talk
Test-Case Prioritization for Configuration TestingACM SIGSOFT Distinguished Paper
Technical Papers
Runxiang Cheng University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign
DOI
01:10 - 02:30
Session 22 (time band 2) Bugs and Analysis 1 Technical Papers at ISSTA 2
Chair(s): Saeid Tizpaz-Niari University of Texas at El Paso
01:10
20m
Talk
Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space
Technical Papers
Yicheng Pan Peking University, Meng Ma Peking University, Xinrui Jiang Peking University, Ping Wang Peking University
DOI Media Attached File Attached
01:30
20m
Talk
iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing
Technical Papers
Shisong Qin Tsinghua University, Chao Zhang Tsinghua University, Kaixiang Chen Tsinghua University, Zheming Li Tsinghua University
DOI
01:50
20m
Talk
RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis
Technical Papers
Ming Yuan Tsinghua University, Yeseop Lee Tsinghua University, Chao Zhang Tsinghua University, Yun Li Tsinghua University, Yan Cai Institute of Software at Chinese Academy of Sciences, Bodong Zhao Tsinghua University
DOI
02:10
20m
Talk
Fixing Dependency Errors for Python Build Reproducibility
Technical Papers
Suchita Mukherjee University of California at Davis, Abigail Almanza University of California at Davis, Cindy Rubio-González University of California at Davis
DOI
02:40 - 03:40
Session 23 (time band 2) Testing 4Technical Papers at ISSTA 1
Chair(s): Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
02:40
20m
Talk
Validating Static Warnings via Testing Code Fragments
Technical Papers
Ashwin Kallingal Joshy Iowa State University, Xueyuan Chen Iowa State University, Benjamin Steenhoek Iowa State University, Wei Le Iowa State University
DOI
03:00
20m
Talk
Empirical Evaluation of Smart Contract Testing: What Is the Best Choice?
Technical Papers
Meng Ren Tsinghua University, Zijing Yin Tsinghua University, Fuchen Ma Tsinghua University, Zhenyang Xu University of Waterloo, Yu Jiang Tsinghua University, Chengnian Sun University of Waterloo, Huizhong Li WeBank, Yan Cai Institute of Software at Chinese Academy of Sciences
DOI File Attached
03:20
20m
Talk
Model-Based Testing of Networked Applications
Technical Papers
Yishuai Li University of Pennsylvania, Benjamin C. Pierce University of Pennsylvania, Steve Zdancewic University of Pennsylvania
DOI Pre-print
02:40 - 03:40
Session 24 (time band 2) Android and Web Application TestingTechnical Papers at ISSTA 2
Chair(s): Omer Tripp IBM Thomas J. Watson Research Center
02:40
20m
Talk
WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes
Technical Papers
Fei Shao Case Western Reserve University, Rui Xu Case Western Reserve University, Wasif Haque University of Texas at Dallas, Jingwei Xu Peking University, Ying Zhang Peking University, Wei Yang University of Texas at Dallas, Yanfang Ye Case Western Reserve University, Xusheng Xiao Case Western Reserve University
DOI File Attached
03:00
20m
Talk
The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android
Technical Papers
Austin Mordahl University of Texas at Dallas, Shiyi Wei University of Texas at Dallas
DOI Pre-print
03:20
20m
Talk
An Infrastructure Approach to Improving Effectiveness of Android UI Testing Tools
Technical Papers
Wenyu Wang University of Illinois at Urbana-Champaign, Wing Lam University of Illinois at Urbana-Champaign, Tao Xie Peking University
Link to publication DOI Media Attached
08:00 - 09:20
Session 25 (time band 3) Testing and AnalysisTechnical Papers at ISSTA 1
Chair(s): Michael Pradel University of Stuttgart
08:00
20m
Talk
Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact
Technical Papers
Ridwan Salihin Shariffdeen National University of Singapore, Xiang Gao National University of Singapore, Gregory J. Duck National University of Singapore, Shin Hwei Tan Southern University of Science and Technology, Julia Lawall Inria, Abhik Roychoudhury National University of Singapore
DOI Pre-print Media Attached
08:20
20m
Talk
Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms
Technical Papers
Kulani Tharaka Mahadewa National University of Singapore, Yanjun Zhang University of Queensland, Guangdong Bai University of Queensland, Lei Bu Nanjing University, Zhiqiang Zuo Nanjing University, Dileepa Fernando Sri Lanka Technological Campus, Zhenkai Liang National University of Singapore, Jin Song Dong National University of Singapore
DOI Media Attached File Attached
08:40
20m
Talk
Modular Call Graph Construction for Security Scanning of Node.js Applications
Technical Papers
Benjamin Barslev Nielsen Aarhus University, Martin Toldam Torp Aarhus University, Anders Møller Aarhus University
DOI Media Attached
09:00
20m
Talk
Semantic Matching of GUI Events for Test Reuse: Are We There Yet?
Technical Papers
Leonardo Mariani University of Milano-Bicocca, Ali Mohebbi USI Lugano, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology, Valerio Terragni University of Auckland
DOI Pre-print
08:00 - 09:20
Session 26 (time band 3) Testing Deep Learning Systems 5Technical Papers at ISSTA 2
Chair(s): Junjie Chen Tianjin University
08:00
20m
Talk
Efficient White-Box Fairness Testing through Gradient Search
Technical Papers
Lingfeng Zhang East China Normal University, Yueling Zhang Singapore Management University, Min Zhang East China Normal University
DOI Media Attached
08:20
20m
Talk
DialTest: Automated Testing for Recurrent-Neural-Network-Driven Dialogue Systems
Technical Papers
Zixi Liu Nanjing University, Yang Feng Nanjing University, Zhenyu Chen Nanjing University
DOI
08:40
20m
Talk
AdvDoor: Adversarial Backdoor Attack of Deep Learning System
Technical Papers
Quan Zhang Tsinghua University, Yifeng Ding Tsinghua University, Yongqiang Tian Tianjin University, Jianmin Guo Tsinghua University, Min Yuan WeBank, Yu Jiang Tsinghua University
DOI
09:00
20m
Talk
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Technical Papers
Yuanchun Li Microsoft Research, Ziqi Zhang Peking University, Bingyan Liu Peking University, Ziyue Yang Microsoft Research, Yunxin Liu Tsinghua University
DOI
09:30 - 11:10
Session 27 (time band 3) Bugs and Analysis 2Technical Papers at ISSTA 1
Chair(s): Mike Papadakis University of Luxembourg, Luxembourg
09:30
20m
Talk
Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space
Technical Papers
Yicheng Pan Peking University, Meng Ma Peking University, Xinrui Jiang Peking University, Ping Wang Peking University
DOI Media Attached File Attached
09:50
20m
Talk
Finding Data Compatibility Bugs with JSON Subschema CheckingDistinguished Artifact
Technical Papers
Andrew Habib SnT, University of Luxembourg, Avraham Shinnar IBM Research, Martin Hirzel IBM Research, Michael Pradel University of Stuttgart
Link to publication DOI Pre-print File Attached
10:10
20m
Talk
Semantic Table Structure Identification in Spreadsheets
Technical Papers
Yakun Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiao Lv Microsoft Research, Haoyu Dong Microsoft Research, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Ye Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI Media Attached
10:30
20m
Talk
Deep Just-in-Time Defect Prediction: How Far Are We?
Technical Papers
Zhengran Zeng Southern University of Science and Technology, Yuqun Zhang Southern University of Science and Technology, Haotian Zhang Kwai, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
10:50
20m
Talk
Continuous Test Suite Failure Prediction
Technical Papers
Cong Pan Beihang University, Michael Pradel University of Stuttgart
DOI Media Attached
09:30 - 10:50
Session 28 (time band 3) Fuzzing and Runtime AnalysisTechnical Papers at ISSTA 2
Chair(s): Michaël Marcozzi Université Paris-Saclay, CEA, List
09:30
20m
Talk
Runtime Detection of Memory Errors with Smart Status
Technical Papers
Zhe Chen Nanjing University of Aeronautics and Astronautics, Chong Wang Nanjing University of Aeronautics and Astronautics, Junqi Yan Nanjing University of Aeronautics and Astronautics, Yulei Sui University of Technology Sydney, Jingling Xue UNSW
DOI Media Attached
09:50
20m
Talk
UAFSan: An Object-Identifier-Based Dynamic Approach for Detecting Use-After-Free Vulnerabilities
Technical Papers
Binfa Gui Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University
DOI Media Attached File Attached
10:10
20m
Talk
Seed Selection for Successful Fuzzing
Technical Papers
Adrian Herrera Australian National University; DST, Hendra Gunadi Australian National University, Shane Magrath DST, Michael Norrish CSIRO’s Data61; Australian National University, Mathias Payer EPFL, Tony Hosking Australian National University; CSIRO’s Data61
DOI Pre-print File Attached
10:30
20m
Talk
QFuzz: Quantitative Fuzzing for Side Channels
Technical Papers
Yannic Noller National University of Singapore, Saeid Tizpaz-Niari University of Texas at El Paso
DOI Pre-print Media Attached

Accepted Papers

Title
AdvDoor: Adversarial Backdoor Attack of Deep Learning System
Technical Papers
DOI
A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped BinariesACM SIGSOFT Distinguished Paper
Technical Papers
DOI
An Infrastructure Approach to Improving Effectiveness of Android UI Testing Tools
Technical Papers
Link to publication DOI Media Attached
Attack as Defense: Characterizing Adversarial Examples using Robustness
Technical Papers
DOI Media Attached
Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact
Technical Papers
DOI Pre-print Media Attached
Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper)
Technical Papers
DOI
Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper)
Technical Papers
DOI File Attached
Challenges and Opportunities: An In-Depth Empirical Study on Configuration Error Injection Testing
Technical Papers
DOI File Attached
Continuous Test Suite Failure Prediction
Technical Papers
DOI Media Attached
DeepCrime: Mutation Testing of Deep Learning Systems Based on Real Faults
Technical Papers
DOI
DeepHyperion: Exploring the Feature Space of Deep Learning-Based Systems through Illumination Search
Technical Papers
DOI File Attached
Deep Just-in-Time Defect Prediction: How Far Are We?
Technical Papers
DOI
DialTest: Automated Testing for Recurrent-Neural-Network-Driven Dialogue Systems
Technical Papers
DOI
Efficient White-Box Fairness Testing through Gradient Search
Technical Papers
DOI Media Attached
Empirical Evaluation of Smart Contract Testing: What Is the Best Choice?
Technical Papers
DOI File Attached
Empirically Evaluating Readily Available Information for Regression Test Optimization in Continuous Integration
Technical Papers
DOI
Exposing Previously Undetectable Faults in Deep Neural Networks
Technical Papers
DOI Pre-print Media Attached
Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space
Technical Papers
DOI Media Attached File Attached
Finding Data Compatibility Bugs with JSON Subschema CheckingDistinguished Artifact
Technical Papers
Link to publication DOI Pre-print File Attached
Fixing Dependency Errors for Python Build Reproducibility
Technical Papers
DOI
Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration
Technical Papers
DOI
Gramatron: Effective Grammar-Aware Fuzzing
Technical Papers
DOI Pre-print Media Attached File Attached
Grammar-Agnostic Symbolic Execution by Token Symbolization
Technical Papers
DOI
GUIDER: GUI Structure and Vision Co-Guided Test Script Repair for Android Apps
Technical Papers
DOI
HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis
Technical Papers
DOI
Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms
Technical Papers
DOI Media Attached File Attached
iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing
Technical Papers
DOI
Interval Constraint-Based Mutation Testing of Numerical Specifications
Technical Papers
DOI
Log-Based Slicing for System-Level Test Cases
Technical Papers
DOI Media Attached
Model-Based Testing of Networked Applications
Technical Papers
DOI Pre-print
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Technical Papers
DOI
Modular Call Graph Construction for Security Scanning of Node.js Applications
Technical Papers
DOI Media Attached
Parema: An Unpacking Framework for Demystifying VM-Based Android Packers
Technical Papers
DOI
Predoo: Precision Testing of Deep Learning Operators
Technical Papers
DOI
QFuzz: Quantitative Fuzzing for Side Channels
Technical Papers
DOI Pre-print Media Attached
RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis
Technical Papers
DOI
Runtime Detection of Memory Errors with Smart Status
Technical Papers
DOI Media Attached
SAND: A Static Analysis Approach for Detecting SQL AntipatternsACM SIGSOFT Distinguished Paper
Technical Papers
DOI
Seed Selection for Successful Fuzzing
Technical Papers
DOI Pre-print File Attached
Semantic Matching of GUI Events for Test Reuse: Are We There Yet?
Technical Papers
DOI Pre-print
Semantic Table Structure Identification in Spreadsheets
Technical Papers
DOI Media Attached
Synthesize Solving Strategy for Symbolic Execution
Technical Papers
DOI
TERA: Optimizing Stochastic Regression Tests in Machine Learning Projects
Technical Papers
DOI
Test-Case Prioritization for Configuration TestingACM SIGSOFT Distinguished Paper
Technical Papers
DOI
The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android
Technical Papers
DOI Pre-print
Toward Optimal MC/DC Test Case Generation
Technical Papers
DOI
Type and Interval Aware Array Constraint Solving for Symbolic ExecutionACM SIGSOFT Distinguished Paper
Technical Papers
DOI
UAFSan: An Object-Identifier-Based Dynamic Approach for Detecting Use-After-Free Vulnerabilities
Technical Papers
DOI Media Attached File Attached
Understanding and Finding System Setting-Related Defects in Android Apps
Technical Papers
DOI Media Attached
Validating Static Warnings via Testing Code Fragments
Technical Papers
DOI
WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes
Technical Papers
DOI File Attached

Call for Papers

Technical Papers

Authors are invited to submit research papers describing original contributions in testing or analysis of computer software. Papers describing original theoretical or empirical research, new techniques, methods for emerging systems, in-depth case studies, infrastructures of testing and analysis, or tools are welcome.

Experience Papers

Authors are invited to submit experience papers describing a significant experience in applying software testing and analysis methods or tools and should carefully identify and discuss important lessons learned so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of software testing and analysis methods or tools.

Replicability Studies

ISSTA would like to encourage researchers to replicate results from previous papers. A replicability study must go beyond simply re-implementing an algorithm and/or re-running the artifacts provided by the original paper. It should at the very least apply the approach to new, significantly broadened inputs. Particularly, replicability studies are encouraged to target techniques that previously were evaluated only on proprietary subject programs or inputs. A replicability study should clearly report on results that the authors were able to replicate as well as on aspects of the work that were not replicatable. In the latter case, authors are encouraged to make an effort to communicate or collaborate with the original paper’s authors to determine the cause for any observed discrepancies and, if possible, address them (e.g., through minor implementation changes). We explicitly encourage authors to not focus on a single paper/artifact only, but instead to perform a comparative experiment of multiple related approaches. In particular, replicability studies should follow the ACM guidelines on replicability (different team, different experimental setup): The measurement can be obtained with stated precision by a different team, a different measuring system, in a different location on multiple trials. For computational experiments, this means that an independent group can obtain the same result using artifacts which they develop completely independently. This means that it is also insufficient to focus on reproducibility (i.e., different team, same experimental setup) alone. Replicability Studies will be evaluated according to the following standards:

  • Depth and breadth of experiments
  • Clarity of writing
  • Appropriateness of conclusions
  • Amount of useful, actionable insights
  • Availability of artifacts

We expect replicability studies to clearly point out the artifacts the study is built on, and to submit those artifacts to artifact evaluation (see below). Artifacts evaluated positively will be eligible to obtain the prestigious Results Reproduced badge.

Submissions Guideline

Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this symposium. Authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions. More details are available at the Submission Policies page. Research and Experience Papers as well as Replicability Studies should be at most 10 pages in length, with at most 2 additional pages for references. Experience papers and replicability studies should clearly specify their category in the paper title upon submission, e.g., “XXX (Experience Paper)”. All authors should use the official “ACM Master article template”, which can be obtained from the ACM Proceedings Template pages. Latex users should use the “sigconf” option, as well as the “review” (to produce line numbers for easy reference by the reviewers) and “anonymous” (omitting author names) options. To that end, the following latex code can be placed at the start of the latex document:

\documentclass[sigconf,review, anonymous]{acmart}
\acmConference[ISSTA 2021]{ACM SIGSOFT International Symposium on Software Testing and Analysis}{12-16 July, 2021}{ Aarhus, Denmark}

Submit your papers via the HotCRP ISSTA 2021 submission website.

Double-blind Reviewing

ISSTA 2021 will conduct double-blind reviewing. Submissions should not reveal the identity of the authors in any way. Authors should leave out author names and affiliations from the body of their submission. They should also ensure that any citations to related work by themselves are written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.

Double-blind reviewing should not hinder the usual communication of results. But, during the review period, please don’t broadcast the work on social media. Also, to the extent to which this is possible, please avoid publishing the preprint of your work (e.g., on arXiv or on your website) until it is accepted for publication. In exceptional cases this might be required, but then please avoid spreading the paper more actively.

Authors with further questions on double-blind reviewing are encouraged to contact the Program Chair by email.

Supplementary Material

Authors are free to provide supplementary material if that material supports the claims in the paper. Such material may include proofs, experimental results, and/or data sets. This material should be uploaded at the same time as the submission. Any supplementary material must also be anonymized. Reviewers are not required to examine the supplementary material but may refer to it if they would like to find further evidence supporting the claims in the paper. Please prepare the supplementary material in the PDF format.

Reviews and Responses

Each paper will receive three reviews, followed by an author response. After the response, some papers might receive additional reviews where necessary, to which authors can respond in a second author-response phase.

Visa Policy

In cases where the travel Visa is rejected or delayed for a long time (e.g., due to additional checks) so that the authors are not able to attend the conference despite best efforts, alternative presentation methods will be considered. However, the authors should notify the program chair at least one week before the conference and provide proof of visa being applied in time.