The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) is the leading research symposium on software testing and analysis, bringing together academics, industrial researchers, and practitioners to exchange new ideas, problems, and experience on how to analyze and test software systems.
Wed 14 JulDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
18:30 - 19:30 | Session 1 (time band 1) Web ApplicationsTechnical Papers at ISSTA 1 Chair(s): Xusheng Xiao Case Western Reserve University | ||
18:30 20mTalk | Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms Technical Papers Kulani Tharaka Mahadewa National University of Singapore, Yanjun Zhang University of Queensland, Guangdong Bai University of Queensland, Lei Bu Nanjing University, Zhiqiang Zuo Nanjing University, Dileepa Fernando Sri Lanka Technological Campus, Zhenkai Liang National University of Singapore, Jin Song Dong National University of Singapore DOI Media Attached File Attached | ||
18:50 20mTalk | WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes Technical Papers Fei Shao Case Western Reserve University, Rui Xu Case Western Reserve University, Wasif Haque University of Texas at Dallas, Jingwei Xu Peking University, Ying Zhang Peking University, Wei Yang University of Texas at Dallas, Yanfang Ye Case Western Reserve University, Xusheng Xiao Case Western Reserve University DOI File Attached | ||
19:10 20mTalk | Modular Call Graph Construction for Security Scanning of Node.js Applications Technical Papers Benjamin Barslev Nielsen Aarhus University, Martin Toldam Torp Aarhus University, Anders Møller Aarhus University DOI Media Attached |
18:30 - 19:30 | Session 2 (time band 1) Testing Deep Learning Systems 1Technical Papers at ISSTA 2 Chair(s): Lin Tan Purdue University | ||
18:30 20mTalk | Attack as Defense: Characterizing Adversarial Examples using Robustness Technical Papers Zhe Zhao ShanghaiTech University, Guangke Chen ShanghaiTech University, Jingyi Wang Zhejiang University, Yiwei Yang ShanghaiTech University, Fu Song ShanghaiTech University, Jun Sun Singapore Management University DOI Media Attached | ||
18:50 20mTalk | Exposing Previously Undetectable Faults in Deep Neural Networks Technical Papers Isaac Dunn University of Oxford, Hadrien Pouget University of Oxford, Daniel Kroening Amazon, Tom Melham University of Oxford DOI Pre-print Media Attached | ||
19:10 20mTalk | DeepCrime: Mutation Testing of Deep Learning Systems Based on Real Faults Technical Papers DOI |
19:40 - 20:40 | Session 3 (time band 1) Android Application TestingTechnical Papers at ISSTA 1 Chair(s): Alex Orso Georgia Institute of Technology | ||
19:40 20mTalk | Parema: An Unpacking Framework for Demystifying VM-Based Android Packers Technical Papers Lei Xue Hong Kong Polytechnic University, Yuxiao Yan Xi'an Jiaotong University; Hong Kong Polytechnic University, Luyi Yan Hong Kong Polytechnic University, Muhui Jiang Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Dinghao Wu Pennsylvania State University, Yajin Zhou Zhejiang University DOI | ||
20:00 20mTalk | An Infrastructure Approach to Improving Effectiveness of Android UI Testing Tools Technical Papers Wenyu Wang University of Illinois at Urbana-Champaign, Wing Lam University of Illinois at Urbana-Champaign, Tao Xie Peking University Link to publication DOI Media Attached | ||
20:20 20mTalk | Semantic Matching of GUI Events for Test Reuse: Are We There Yet? Technical Papers Leonardo Mariani University of Milano-Bicocca, Ali Mohebbi USI Lugano, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology, Valerio Terragni University of Auckland DOI Pre-print |
19:40 - 20:20 | Session 4 (time band 1) Testing Deep Learning Systems 2Technical Papers at ISSTA 2 Chair(s): Sebastian Elbaum University of Virginia | ||
19:40 20mTalk | DeepHyperion: Exploring the Feature Space of Deep Learning-Based Systems through Illumination Search Technical Papers Tahereh Zohdinasab USI Lugano, Vincenzo Riccio USI Lugano, Alessio Gambi University of Passau, Paolo Tonella USI Lugano DOI File Attached | ||
20:00 20mTalk | Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper) Technical Papers Fitash Ul Haq University of Luxembourg, Donghwan Shin University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa, Thomas Stifter IEE, Jun Wang Post Luxembourg DOI |
Thu 15 JulDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
00:20 - 01:20 | Session 5 (time band 2) Android Application Analysis and TestingTechnical Papers at ISSTA 1 Chair(s): William G.J. Halfond University of Southern California | ||
00:20 20mTalk | GUIDER: GUI Structure and Vision Co-Guided Test Script Repair for Android Apps Technical Papers Tongtong Xu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Guiyin Li Nanjing University, Xia Zeng Tencent, Tian Zhang Nanjing University, Yuetang Deng Tencent, Xuandong Li Nanjing University DOI | ||
00:40 20mTalk | Understanding and Finding System Setting-Related Defects in Android Apps Technical Papers Jingling Sun East China Normal University, Ting Su East China Normal University, Junxin Li East China Normal University, Zhen Dong National University of Singapore, Geguang Pu East China Normal University, Tao Xie Peking University, Zhendong Su ETH Zurich DOI Media Attached | ||
01:00 20mTalk | HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis Technical Papers Yueming Wu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, Xiang Li Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI |
00:20 - 01:20 | Session 6 (time band 2) FuzzingTechnical Papers at ISSTA 2 Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign | ||
00:20 20mTalk | Seed Selection for Successful Fuzzing Technical Papers Adrian Herrera Australian National University; DST, Hendra Gunadi Australian National University, Shane Magrath DST, Michael Norrish CSIRO’s Data61; Australian National University, Mathias Payer EPFL, Tony Hosking Australian National University; CSIRO’s Data61 DOI Pre-print File Attached | ||
00:40 20mTalk | Gramatron: Effective Grammar-Aware Fuzzing Technical Papers DOI Pre-print Media Attached File Attached | ||
01:00 20mTalk | QFuzz: Quantitative Fuzzing for Side Channels Technical Papers DOI Pre-print Media Attached |
01:40 - 02:20 | Session 7 (time band 2) Data Processing Application AnalysisTechnical Papers at ISSTA 1 Chair(s): Darko Marinov University of Illinois at Urbana-Champaign | ||
01:40 20mTalk | SAND: A Static Analysis Approach for Detecting SQL AntipatternsACM SIGSOFT Distinguished Paper Technical Papers Yingjun Lyu Amazon, Sasha Volokh University of Southern California, William G.J. Halfond University of Southern California, Omer Tripp Amazon DOI | ||
02:00 20mTalk | Semantic Table Structure Identification in Spreadsheets Technical Papers Yakun Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiao Lv Microsoft Research, Haoyu Dong Microsoft Research, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Ye Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI Media Attached |
01:40 - 02:20 | Session 8 (time band 2) Dynamic AnalysisTechnical Papers at ISSTA 2 Chair(s): Luís Pina University of Illinois at Chicago | ||
01:40 20mTalk | Runtime Detection of Memory Errors with Smart Status Technical Papers Zhe Chen Nanjing University of Aeronautics and Astronautics, Chong Wang Nanjing University of Aeronautics and Astronautics, Junqi Yan Nanjing University of Aeronautics and Astronautics, Yulei Sui University of Technology Sydney, Jingling Xue UNSW DOI Media Attached | ||
02:00 20mTalk | UAFSan: An Object-Identifier-Based Dynamic Approach for Detecting Use-After-Free Vulnerabilities Technical Papers Binfa Gui Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University DOI Media Attached File Attached |
09:10 - 10:50 | Session 10 (time band 3) Symbolic Execution 1Technical Papers at ISSTA 2 Chair(s): Sébastien Bardin CEA LIST, University Paris-Saclay | ||
09:10 20mTalk | Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration Technical Papers Peisen Yao Hong Kong University of Science and Technology, Heqing Huang Hong Kong University of Science and Technology, Wensheng Tang Hong Kong University of Science and Technology, Qingkai Shi Purdue University, Rongxin Wu Xiamen University, Charles Zhang Hong Kong University of Science and Technology DOI | ||
09:30 20mTalk | Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper) Technical Papers Sicheng Luo Fudan University, Hui Xu Fudan University, Yanxiang Bi Fudan University, Xin Wang Fudan University, Yangfan Zhou Fudan University DOI File Attached | ||
09:50 20mTalk | Synthesize Solving Strategy for Symbolic Execution Technical Papers Zhenbang Chen National University of Defense Technology, Zehua Chen National University of Defense Technology, Ziqi Shuai National University of Defense Technology, Guofeng Zhang Hunan University, Weiyu Pan National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang National University of Defense Technology DOI | ||
10:10 20mTalk | Type and Interval Aware Array Constraint Solving for Symbolic ExecutionACM SIGSOFT Distinguished Paper Technical Papers Ziqi Shuai National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Yufeng Zhang Hunan University, Jun Sun Singapore Management University, Ji Wang National University of Defense Technology DOI | ||
10:30 20mTalk | Grammar-Agnostic Symbolic Execution by Token Symbolization Technical Papers Weiyu Pan National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Guofeng Zhang Hunan University, Yunlai Luo National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang National University of Defense Technology DOI |
19:00 - 20:20 | Session 11 (time band 1) Machine Learning and TestingTechnical Papers at ISSTA 1 Chair(s): August Shi University of Texas at Austin | ||
19:00 20mTalk | Interval Constraint-Based Mutation Testing of Numerical Specifications Technical Papers Clothilde Jeangoudoux MPI-SWS, Eva Darulova MPI-SWS, Christoph Lauter University of Alaska at Anchorage DOI | ||
19:20 20mTalk | Predoo: Precision Testing of Deep Learning Operators Technical Papers Xufan Zhang Nanjing University, Ning Sun Nanjing University, Chunrong Fang Nanjing University, Jiawei Liu Nanjing University, Jia Liu Nanjing University, Dong Chai Huawei, Jiang Wang Huawei, Zhenyu Chen Nanjing University DOI | ||
19:40 20mTalk | TERA: Optimizing Stochastic Regression Tests in Machine Learning Projects Technical Papers Saikat Dutta University of Illinois at Urbana-Champaign, Jeeva Selvam University of Illinois at Urbana-Champaign, Aryaman Jain University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign DOI | ||
20:00 20mTalk | Deep Just-in-Time Defect Prediction: How Far Are We? Technical Papers Zhengran Zeng Southern University of Science and Technology, Yuqun Zhang Southern University of Science and Technology, Haotian Zhang Kwai, Lingming Zhang University of Illinois at Urbana-Champaign DOI |
19:00 - 20:20 | Session 12 (time band 1) Configuration and Dependency Technical Papers at ISSTA 2 Chair(s): Jonathan Bell Northeastern University | ||
19:00 20mTalk | Fixing Dependency Errors for Python Build Reproducibility Technical Papers Suchita Mukherjee University of California at Davis, Abigail Almanza University of California at Davis, Cindy Rubio-González University of California at Davis DOI | ||
19:20 20mTalk | Test-Case Prioritization for Configuration TestingACM SIGSOFT Distinguished Paper Technical Papers Runxiang Cheng University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign DOI | ||
19:40 20mTalk | The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android Technical Papers DOI Pre-print | ||
20:00 20mTalk | Challenges and Opportunities: An In-Depth Empirical Study on Configuration Error Injection Testing Technical Papers Wang Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Yuanliang Zhang National University of Defense Technology, Teng Wang National University of Defense Technology, Erci Xu National University of Defense Technology, Ji Wang National University of Defense Technology, Liao Xiangke National University of Defense Technology DOI File Attached |
Fri 16 JulDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
02:00 - 03:20 | Session 13 (time band 2) Testing Deep Learning Systems 4Technical Papers at ISSTA 1 Chair(s): Shiqing Ma Rutgers University | ||
02:00 20mTalk | Efficient White-Box Fairness Testing through Gradient Search Technical Papers Lingfeng Zhang East China Normal University, Yueling Zhang Singapore Management University, Min Zhang East China Normal University DOI Media Attached | ||
02:20 20mTalk | DialTest: Automated Testing for Recurrent-Neural-Network-Driven Dialogue Systems Technical Papers DOI | ||
02:40 20mTalk | AdvDoor: Adversarial Backdoor Attack of Deep Learning System Technical Papers Quan Zhang Tsinghua University, Yifeng Ding Tsinghua University, Yongqiang Tian Tianjin University, Jianmin Guo Tsinghua University, Min Yuan WeBank, Yu Jiang Tsinghua University DOI | ||
03:00 20mTalk | ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection Technical Papers Yuanchun Li Microsoft Research, Ziqi Zhang Peking University, Bingyan Liu Peking University, Ziyue Yang Microsoft Research, Yunxin Liu Tsinghua University DOI |
02:00 - 03:20 | Session 14 (time band 2) Symbolic Execution 2Technical Papers at ISSTA 2 Chair(s): Martin Nowack Imperial College London | ||
02:00 20mTalk | Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration Technical Papers Peisen Yao Hong Kong University of Science and Technology, Heqing Huang Hong Kong University of Science and Technology, Wensheng Tang Hong Kong University of Science and Technology, Qingkai Shi Purdue University, Rongxin Wu Xiamen University, Charles Zhang Hong Kong University of Science and Technology DOI | ||
02:20 20mTalk | Synthesize Solving Strategy for Symbolic Execution Technical Papers Zhenbang Chen National University of Defense Technology, Zehua Chen National University of Defense Technology, Ziqi Shuai National University of Defense Technology, Guofeng Zhang Hunan University, Weiyu Pan National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang National University of Defense Technology DOI | ||
02:40 20mTalk | Type and Interval Aware Array Constraint Solving for Symbolic ExecutionACM SIGSOFT Distinguished Paper Technical Papers Ziqi Shuai National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Yufeng Zhang Hunan University, Jun Sun Singapore Management University, Ji Wang National University of Defense Technology DOI | ||
03:00 20mTalk | Grammar-Agnostic Symbolic Execution by Token Symbolization Technical Papers Weiyu Pan National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Guofeng Zhang Hunan University, Yunlai Luo National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang National University of Defense Technology DOI |
08:00 - 09:00 | Session 15 (time band 3) Testing 1Technical Papers at ISSTA 1 Chair(s): Phil McMinn University of Sheffield | ||
08:00 20mTalk | Empirically Evaluating Readily Available Information for Regression Test Optimization in Continuous Integration Technical Papers Daniel Elsner TU Munich, Florian Hauer TU Munich, Alexander Pretschner TU Munich, Silke Reimer IVU Traffic Technologies DOI | ||
08:20 20mTalk | Toward Optimal MC/DC Test Case Generation Technical Papers Sangharatna Godboley National Institute of Technology Warangal, Joxan Jaffar National University of Singapore, Rasool Maghareh Huawei, Arpita Dutta National University of Singapore DOI | ||
08:40 20mTalk | Log-Based Slicing for System-Level Test Cases Technical Papers Salma Messaoudi University of Luxembourg, Donghwan Shin University of Luxembourg, Annibale Panichella Delft University of Technology; University of Luxembourg, Domenico Bianculli University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa DOI Media Attached |
08:00 - 09:00 | Session 16 (time band 3) Binary AnalysisTechnical Papers at ISSTA 2 Chair(s): Michael Pradel University of Stuttgart | ||
08:00 20mTalk | iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing Technical Papers Shisong Qin Tsinghua University, Chao Zhang Tsinghua University, Kaixiang Chen Tsinghua University, Zheming Li Tsinghua University DOI | ||
08:20 20mTalk | RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis Technical Papers Ming Yuan Tsinghua University, Yeseop Lee Tsinghua University, Chao Zhang Tsinghua University, Yun Li Tsinghua University, Yan Cai Institute of Software at Chinese Academy of Sciences, Bodong Zhao Tsinghua University DOI | ||
08:40 20mTalk | A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped BinariesACM SIGSOFT Distinguished Paper Technical Papers Han Gao University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Weiming Zhang University of Science and Technology of China DOI |
10:00 - 11:20 | Session 17 (time band 3) Testing Miscellaneous Systems Technical Papers at ISSTA 1 Chair(s): Thuan Pham The University of Melbourne | ||
10:00 20mTalk | Empirical Evaluation of Smart Contract Testing: What Is the Best Choice? Technical Papers Meng Ren Tsinghua University, Zijing Yin Tsinghua University, Fuchen Ma Tsinghua University, Zhenyang Xu University of Waterloo, Yu Jiang Tsinghua University, Chengnian Sun University of Waterloo, Huizhong Li WeBank, Yan Cai Institute of Software at Chinese Academy of Sciences DOI File Attached | ||
10:20 20mTalk | Interval Constraint-Based Mutation Testing of Numerical Specifications Technical Papers Clothilde Jeangoudoux MPI-SWS, Eva Darulova MPI-SWS, Christoph Lauter University of Alaska at Anchorage DOI | ||
10:40 20mTalk | TERA: Optimizing Stochastic Regression Tests in Machine Learning Projects Technical Papers Saikat Dutta University of Illinois at Urbana-Champaign, Jeeva Selvam University of Illinois at Urbana-Champaign, Aryaman Jain University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign DOI | ||
11:00 20mTalk | Predoo: Precision Testing of Deep Learning Operators Technical Papers Xufan Zhang Nanjing University, Ning Sun Nanjing University, Chunrong Fang Nanjing University, Jiawei Liu Nanjing University, Jia Liu Nanjing University, Dong Chai Huawei, Jiang Wang Huawei, Zhenyu Chen Nanjing University DOI |
10:00 - 11:20 | Session 18 (time band 3) Android Application Testing 2Technical Papers at ISSTA 2 Chair(s): Shin Hwei Tan Southern University of Science and Technology | ||
10:00 20mTalk | GUIDER: GUI Structure and Vision Co-Guided Test Script Repair for Android Apps Technical Papers Tongtong Xu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Guiyin Li Nanjing University, Xia Zeng Tencent, Tian Zhang Nanjing University, Yuetang Deng Tencent, Xuandong Li Nanjing University DOI | ||
10:20 20mTalk | Understanding and Finding System Setting-Related Defects in Android Apps Technical Papers Jingling Sun East China Normal University, Ting Su East China Normal University, Junxin Li East China Normal University, Zhen Dong National University of Singapore, Geguang Pu East China Normal University, Tao Xie Peking University, Zhendong Su ETH Zurich DOI Media Attached | ||
10:40 20mTalk | Parema: An Unpacking Framework for Demystifying VM-Based Android Packers Technical Papers Lei Xue Hong Kong Polytechnic University, Yuxiao Yan Xi'an Jiaotong University; Hong Kong Polytechnic University, Luyi Yan Hong Kong Polytechnic University, Muhui Jiang Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Dinghao Wu Pennsylvania State University, Yajin Zhou Zhejiang University DOI | ||
11:00 20mTalk | HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis Technical Papers Yueming Wu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, Xiang Li Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI |
17:00 - 17:55 | ISSTA Impact Paper Award TalkKeynotes at Keynote Chair(s): Cristian Cadar Imperial College London, UK | ||
17:00 55mKeynote | Automated Debugging: Past, Present, and Future (ISSTA Impact Paper Award)Keynote Keynotes Media Attached |
18:20 - 20:00 | Session 19 (time band 1) Testing 2Technical Papers at ISSTA 1 Chair(s): Rohan Padhye Carnegie Mellon University | ||
18:20 20mTalk | Model-Based Testing of Networked Applications Technical Papers Yishuai Li University of Pennsylvania, Benjamin C. Pierce University of Pennsylvania, Steve Zdancewic University of Pennsylvania DOI Pre-print | ||
18:40 20mTalk | Validating Static Warnings via Testing Code Fragments Technical Papers Ashwin Kallingal Joshy Iowa State University, Xueyuan Chen Iowa State University, Benjamin Steenhoek Iowa State University, Wei Le Iowa State University DOI | ||
19:00 20mTalk | Gramatron: Effective Grammar-Aware Fuzzing Technical Papers DOI Pre-print Media Attached File Attached | ||
19:20 20mTalk | Empirically Evaluating Readily Available Information for Regression Test Optimization in Continuous Integration Technical Papers Daniel Elsner TU Munich, Florian Hauer TU Munich, Alexander Pretschner TU Munich, Silke Reimer IVU Traffic Technologies DOI | ||
19:40 20mTalk | Log-Based Slicing for System-Level Test Cases Technical Papers Salma Messaoudi University of Luxembourg, Donghwan Shin University of Luxembourg, Annibale Panichella Delft University of Technology; University of Luxembourg, Domenico Bianculli University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa DOI Media Attached |
18:20 - 20:00 | Session 20 (time band 1) AnalysisTechnical Papers at ISSTA 2 Chair(s): Shiyi Wei University of Texas at Dallas | ||
18:20 20mTalk | A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped BinariesACM SIGSOFT Distinguished Paper Technical Papers Han Gao University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Weiming Zhang University of Science and Technology of China DOI | ||
18:40 20mTalk | Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper) Technical Papers Sicheng Luo Fudan University, Hui Xu Fudan University, Yanxiang Bi Fudan University, Xin Wang Fudan University, Yangfan Zhou Fudan University DOI File Attached | ||
19:00 20mTalk | Finding Data Compatibility Bugs with JSON Subschema CheckingDistinguished Artifact Technical Papers Andrew Habib SnT, University of Luxembourg, Avraham Shinnar IBM Research, Martin Hirzel IBM Research, Michael Pradel University of Stuttgart Link to publication DOI Pre-print File Attached | ||
19:20 20mTalk | SAND: A Static Analysis Approach for Detecting SQL AntipatternsACM SIGSOFT Distinguished Paper Technical Papers Yingjun Lyu Amazon, Sasha Volokh University of Southern California, William G.J. Halfond University of Southern California, Omer Tripp Amazon DOI | ||
19:40 20mTalk | Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact Technical Papers Ridwan Salihin Shariffdeen National University of Singapore, Xiang Gao National University of Singapore, Gregory J. Duck National University of Singapore, Shin Hwei Tan Southern University of Science and Technology, Julia Lawall Inria, Abhik Roychoudhury National University of Singapore DOI Pre-print Media Attached |
Sat 17 JulDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
00:00 - 00:55 | |||
00:00 55mKeynote | Automated Debugging: Past, Present, and Future (ISSTA Impact Paper Award)Keynote Keynotes Media Attached |
01:10 - 02:30 | Session 21 (time band 2) Testing 3Technical Papers at ISSTA 1 Chair(s): Rohan Padhye Carnegie Mellon University | ||
01:10 20mTalk | Continuous Test Suite Failure Prediction Technical Papers DOI Media Attached | ||
01:30 20mTalk | Toward Optimal MC/DC Test Case Generation Technical Papers Sangharatna Godboley National Institute of Technology Warangal, Joxan Jaffar National University of Singapore, Rasool Maghareh Huawei, Arpita Dutta National University of Singapore DOI | ||
01:50 20mTalk | Challenges and Opportunities: An In-Depth Empirical Study on Configuration Error Injection Testing Technical Papers Wang Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Yuanliang Zhang National University of Defense Technology, Teng Wang National University of Defense Technology, Erci Xu National University of Defense Technology, Ji Wang National University of Defense Technology, Liao Xiangke National University of Defense Technology DOI File Attached | ||
02:10 20mTalk | Test-Case Prioritization for Configuration TestingACM SIGSOFT Distinguished Paper Technical Papers Runxiang Cheng University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign DOI |
01:10 - 02:30 | Session 22 (time band 2) Bugs and Analysis 1 Technical Papers at ISSTA 2 Chair(s): Saeid Tizpaz-Niari University of Texas at El Paso | ||
01:10 20mTalk | Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space Technical Papers Yicheng Pan Peking University, Meng Ma Peking University, Xinrui Jiang Peking University, Ping Wang Peking University DOI Media Attached File Attached | ||
01:30 20mTalk | iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing Technical Papers Shisong Qin Tsinghua University, Chao Zhang Tsinghua University, Kaixiang Chen Tsinghua University, Zheming Li Tsinghua University DOI | ||
01:50 20mTalk | RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis Technical Papers Ming Yuan Tsinghua University, Yeseop Lee Tsinghua University, Chao Zhang Tsinghua University, Yun Li Tsinghua University, Yan Cai Institute of Software at Chinese Academy of Sciences, Bodong Zhao Tsinghua University DOI | ||
02:10 20mTalk | Fixing Dependency Errors for Python Build Reproducibility Technical Papers Suchita Mukherjee University of California at Davis, Abigail Almanza University of California at Davis, Cindy Rubio-González University of California at Davis DOI |
02:40 - 03:40 | Session 23 (time band 2) Testing 4Technical Papers at ISSTA 1 Chair(s): Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
02:40 20mTalk | Validating Static Warnings via Testing Code Fragments Technical Papers Ashwin Kallingal Joshy Iowa State University, Xueyuan Chen Iowa State University, Benjamin Steenhoek Iowa State University, Wei Le Iowa State University DOI | ||
03:00 20mTalk | Empirical Evaluation of Smart Contract Testing: What Is the Best Choice? Technical Papers Meng Ren Tsinghua University, Zijing Yin Tsinghua University, Fuchen Ma Tsinghua University, Zhenyang Xu University of Waterloo, Yu Jiang Tsinghua University, Chengnian Sun University of Waterloo, Huizhong Li WeBank, Yan Cai Institute of Software at Chinese Academy of Sciences DOI File Attached | ||
03:20 20mTalk | Model-Based Testing of Networked Applications Technical Papers Yishuai Li University of Pennsylvania, Benjamin C. Pierce University of Pennsylvania, Steve Zdancewic University of Pennsylvania DOI Pre-print |
02:40 - 03:40 | Session 24 (time band 2) Android and Web Application TestingTechnical Papers at ISSTA 2 Chair(s): Omer Tripp IBM Thomas J. Watson Research Center | ||
02:40 20mTalk | WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes Technical Papers Fei Shao Case Western Reserve University, Rui Xu Case Western Reserve University, Wasif Haque University of Texas at Dallas, Jingwei Xu Peking University, Ying Zhang Peking University, Wei Yang University of Texas at Dallas, Yanfang Ye Case Western Reserve University, Xusheng Xiao Case Western Reserve University DOI File Attached | ||
03:00 20mTalk | The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android Technical Papers DOI Pre-print | ||
03:20 20mTalk | An Infrastructure Approach to Improving Effectiveness of Android UI Testing Tools Technical Papers Wenyu Wang University of Illinois at Urbana-Champaign, Wing Lam University of Illinois at Urbana-Champaign, Tao Xie Peking University Link to publication DOI Media Attached |
08:00 - 09:20 | Session 25 (time band 3) Testing and AnalysisTechnical Papers at ISSTA 1 Chair(s): Michael Pradel University of Stuttgart | ||
08:00 20mTalk | Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact Technical Papers Ridwan Salihin Shariffdeen National University of Singapore, Xiang Gao National University of Singapore, Gregory J. Duck National University of Singapore, Shin Hwei Tan Southern University of Science and Technology, Julia Lawall Inria, Abhik Roychoudhury National University of Singapore DOI Pre-print Media Attached | ||
08:20 20mTalk | Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms Technical Papers Kulani Tharaka Mahadewa National University of Singapore, Yanjun Zhang University of Queensland, Guangdong Bai University of Queensland, Lei Bu Nanjing University, Zhiqiang Zuo Nanjing University, Dileepa Fernando Sri Lanka Technological Campus, Zhenkai Liang National University of Singapore, Jin Song Dong National University of Singapore DOI Media Attached File Attached | ||
08:40 20mTalk | Modular Call Graph Construction for Security Scanning of Node.js Applications Technical Papers Benjamin Barslev Nielsen Aarhus University, Martin Toldam Torp Aarhus University, Anders Møller Aarhus University DOI Media Attached | ||
09:00 20mTalk | Semantic Matching of GUI Events for Test Reuse: Are We There Yet? Technical Papers Leonardo Mariani University of Milano-Bicocca, Ali Mohebbi USI Lugano, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology, Valerio Terragni University of Auckland DOI Pre-print |
08:00 - 09:20 | Session 26 (time band 3) Testing Deep Learning Systems 5Technical Papers at ISSTA 2 Chair(s): Junjie Chen Tianjin University | ||
08:00 20mTalk | Efficient White-Box Fairness Testing through Gradient Search Technical Papers Lingfeng Zhang East China Normal University, Yueling Zhang Singapore Management University, Min Zhang East China Normal University DOI Media Attached | ||
08:20 20mTalk | DialTest: Automated Testing for Recurrent-Neural-Network-Driven Dialogue Systems Technical Papers DOI | ||
08:40 20mTalk | AdvDoor: Adversarial Backdoor Attack of Deep Learning System Technical Papers Quan Zhang Tsinghua University, Yifeng Ding Tsinghua University, Yongqiang Tian Tianjin University, Jianmin Guo Tsinghua University, Min Yuan WeBank, Yu Jiang Tsinghua University DOI | ||
09:00 20mTalk | ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection Technical Papers Yuanchun Li Microsoft Research, Ziqi Zhang Peking University, Bingyan Liu Peking University, Ziyue Yang Microsoft Research, Yunxin Liu Tsinghua University DOI |
09:30 - 11:10 | Session 27 (time band 3) Bugs and Analysis 2Technical Papers at ISSTA 1 Chair(s): Mike Papadakis University of Luxembourg, Luxembourg | ||
09:30 20mTalk | Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space Technical Papers Yicheng Pan Peking University, Meng Ma Peking University, Xinrui Jiang Peking University, Ping Wang Peking University DOI Media Attached File Attached | ||
09:50 20mTalk | Finding Data Compatibility Bugs with JSON Subschema CheckingDistinguished Artifact Technical Papers Andrew Habib SnT, University of Luxembourg, Avraham Shinnar IBM Research, Martin Hirzel IBM Research, Michael Pradel University of Stuttgart Link to publication DOI Pre-print File Attached | ||
10:10 20mTalk | Semantic Table Structure Identification in Spreadsheets Technical Papers Yakun Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiao Lv Microsoft Research, Haoyu Dong Microsoft Research, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Ye Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI Media Attached | ||
10:30 20mTalk | Deep Just-in-Time Defect Prediction: How Far Are We? Technical Papers Zhengran Zeng Southern University of Science and Technology, Yuqun Zhang Southern University of Science and Technology, Haotian Zhang Kwai, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
10:50 20mTalk | Continuous Test Suite Failure Prediction Technical Papers DOI Media Attached |
09:30 - 10:50 | Session 28 (time band 3) Fuzzing and Runtime AnalysisTechnical Papers at ISSTA 2 Chair(s): Michaël Marcozzi Université Paris-Saclay, CEA, List | ||
09:30 20mTalk | Runtime Detection of Memory Errors with Smart Status Technical Papers Zhe Chen Nanjing University of Aeronautics and Astronautics, Chong Wang Nanjing University of Aeronautics and Astronautics, Junqi Yan Nanjing University of Aeronautics and Astronautics, Yulei Sui University of Technology Sydney, Jingling Xue UNSW DOI Media Attached | ||
09:50 20mTalk | UAFSan: An Object-Identifier-Based Dynamic Approach for Detecting Use-After-Free Vulnerabilities Technical Papers Binfa Gui Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University DOI Media Attached File Attached | ||
10:10 20mTalk | Seed Selection for Successful Fuzzing Technical Papers Adrian Herrera Australian National University; DST, Hendra Gunadi Australian National University, Shane Magrath DST, Michael Norrish CSIRO’s Data61; Australian National University, Mathias Payer EPFL, Tony Hosking Australian National University; CSIRO’s Data61 DOI Pre-print File Attached | ||
10:30 20mTalk | QFuzz: Quantitative Fuzzing for Side Channels Technical Papers DOI Pre-print Media Attached |
Accepted Papers
Call for Papers
Technical Papers
Authors are invited to submit research papers describing original contributions in testing or analysis of computer software. Papers describing original theoretical or empirical research, new techniques, methods for emerging systems, in-depth case studies, infrastructures of testing and analysis, or tools are welcome.
Experience Papers
Authors are invited to submit experience papers describing a significant experience in applying software testing and analysis methods or tools and should carefully identify and discuss important lessons learned so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of software testing and analysis methods or tools.
Replicability Studies
ISSTA would like to encourage researchers to replicate results from previous papers. A replicability study must go beyond simply re-implementing an algorithm and/or re-running the artifacts provided by the original paper. It should at the very least apply the approach to new, significantly broadened inputs. Particularly, replicability studies are encouraged to target techniques that previously were evaluated only on proprietary subject programs or inputs. A replicability study should clearly report on results that the authors were able to replicate as well as on aspects of the work that were not replicatable. In the latter case, authors are encouraged to make an effort to communicate or collaborate with the original paper’s authors to determine the cause for any observed discrepancies and, if possible, address them (e.g., through minor implementation changes). We explicitly encourage authors to not focus on a single paper/artifact only, but instead to perform a comparative experiment of multiple related approaches. In particular, replicability studies should follow the ACM guidelines on replicability (different team, different experimental setup): The measurement can be obtained with stated precision by a different team, a different measuring system, in a different location on multiple trials. For computational experiments, this means that an independent group can obtain the same result using artifacts which they develop completely independently. This means that it is also insufficient to focus on reproducibility (i.e., different team, same experimental setup) alone. Replicability Studies will be evaluated according to the following standards:
- Depth and breadth of experiments
- Clarity of writing
- Appropriateness of conclusions
- Amount of useful, actionable insights
- Availability of artifacts
We expect replicability studies to clearly point out the artifacts the study is built on, and to submit those artifacts to artifact evaluation (see below). Artifacts evaluated positively will be eligible to obtain the prestigious Results Reproduced badge.
Submissions Guideline
Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this symposium. Authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions. More details are available at the Submission Policies page. Research and Experience Papers as well as Replicability Studies should be at most 10 pages in length, with at most 2 additional pages for references. Experience papers and replicability studies should clearly specify their category in the paper title upon submission, e.g., “XXX (Experience Paper)”. All authors should use the official “ACM Master article template”, which can be obtained from the ACM Proceedings Template pages. Latex users should use the “sigconf” option, as well as the “review” (to produce line numbers for easy reference by the reviewers) and “anonymous” (omitting author names) options. To that end, the following latex code can be placed at the start of the latex document:
\documentclass[sigconf,review, anonymous]{acmart}
\acmConference[ISSTA 2021]{ACM SIGSOFT International Symposium on Software Testing and Analysis}{12-16 July, 2021}{ Aarhus, Denmark}
Submit your papers via the HotCRP ISSTA 2021 submission website.
Double-blind Reviewing
ISSTA 2021 will conduct double-blind reviewing. Submissions should not reveal the identity of the authors in any way. Authors should leave out author names and affiliations from the body of their submission. They should also ensure that any citations to related work by themselves are written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
Double-blind reviewing should not hinder the usual communication of results. But, during the review period, please don’t broadcast the work on social media. Also, to the extent to which this is possible, please avoid publishing the preprint of your work (e.g., on arXiv or on your website) until it is accepted for publication. In exceptional cases this might be required, but then please avoid spreading the paper more actively.
Authors with further questions on double-blind reviewing are encouraged to contact the Program Chair by email.
Supplementary Material
Authors are free to provide supplementary material if that material supports the claims in the paper. Such material may include proofs, experimental results, and/or data sets. This material should be uploaded at the same time as the submission. Any supplementary material must also be anonymized. Reviewers are not required to examine the supplementary material but may refer to it if they would like to find further evidence supporting the claims in the paper. Please prepare the supplementary material in the PDF format.
Reviews and Responses
Each paper will receive three reviews, followed by an author response. After the response, some papers might receive additional reviews where necessary, to which authors can respond in a second author-response phase.
Visa Policy
In cases where the travel Visa is rejected or delayed for a long time (e.g., due to additional checks) so that the authors are not able to attend the conference despite best efforts, alternative presentation methods will be considered. However, the authors should notify the program chair at least one week before the conference and provide proof of visa being applied in time.