default search action
28th ISSRE 2017: Toulouse, France
- 28th IEEE International Symposium on Software Reliability Engineering, ISSRE 2017, Toulouse, France, October 23-26, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-0941-5
Best Paper Session
- Antonio Ken Iannillo, Roberto Natella, Domenico Cotroneo, Cristina Nita-Rotaru:
Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations. 1-11 - Jie Liu, Yue Li, Tian Tan, Jingling Xue:
Reflection Analysis for Java: Uncovering More Reflective Targets Precisely. 12-23 - Sihan Xu, Aishwarya Sivaraman, Siau-Cheng Khoo, Jing Xu:
GEMS: An Extract Method Refactoring Recommender. 24-34
Modelling
- Hiroyuki Okamura, Tadashi Dohi:
A Generalized Bivariate Modeling Framework of Fault Detection and Correction Processes. 35-45 - Giulio Masetti, Silvano Chiaradonna, Felicita Di Giandomenico:
A Stochastic Modeling Approach for an Efficient Dependability Evaluation of Large Systems with Non-anonymous Interconnected Components. 46-55 - Kun Qiu, Zheng Zheng, Kishor S. Trivedi, Bei-Bei Yin:
Understanding the Impacts of Influencing Factors on Time to a DataRace Software Failure. 56-66
Faults and Failures Analysis (1)
- Luca Gazzola, Leonardo Mariani, Fabrizio Pastore, Mauro Pezzè:
An Exploratory Study of Field Failures. 67-77 - Xiao Yu, Jin Liu, Zijiang Yang, Xiangyang Jia, Qi Ling, Sizhe Ye:
Learning from Imbalanced Data for Predicting the Number of Software Defects. 78-89 - Domenico Cotroneo, Roberto Natella, Stefano Rosiello:
A Fault Correlation Approach to Detect Performance Anomalies in Virtual Network Function Chains. 90-100
Faults and Failures Analysis (2)
- Guanping Xiao, Zheng Zheng, Beibei Yin, Kishor S. Trivedi, Xiaoting Du, Kai-Yuan Cai:
Experience Report: Fault Triggers in Linux Operating System: from Evolution Perspective. 101-111 - Matthew Leeke:
Simultaneous Fault Models for the Generation of Efficient Error Detection Mechanisms. 112-123 - Qiao Huang, David Lo, Xin Xia, Qingye Wang, Shanping Li:
Which Packages Would be Affected by This Bug Report? 124-135
WAP and PER
- Frederico Cerveira, Raul Barbosa, Henrique Madeira:
Experience Report: On the Impact of Software Faults in the Privileged Virtual Machine. 136-145 - Weilin Luo, Ou Wei:
WAP: SAT-Based Computation of Minimal Cut Sets. 146-151 - Katerina Goseva-Popstojanova, Jacob Tyo:
Experience Report: Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports. 152-163 - Yukasa Murakami, Masateru Tsunoda, Hidetake Uwano:
WAP: Does Reviewer Age Affect Code Review Performance? 164-169
Dynamic and Static Analysis
- Alexandre Melo Braga, Ricardo Dahab, Nuno Antunes, Nuno Laranjeiro, Marco Vieira:
Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study. 170-181 - Raphaël Jakse, Yliès Falcone, Jean-François Méhaut, Kevin Pouget:
Interactive Runtime Verification - When Interactive Debugging Meets Runtime Verification. 182-193 - Chris Bogdiukiewicz, Michael J. Butler, Thai Son Hoang, Martin Paxton, James Snook, Xanthippe Waldron, Toby Wilkinson:
Formal Development of Policing Functions for Intelligent Systems. 194-204
Security Modeling and Empirical Studies
- Anatoliy Gorbenko, Alexander B. Romanovsky, Olga Tarasyuk, Oleksandr Biloborodov:
Experience Report: Study of Vulnerabilities of Enterprise Operating Systems. 205-215 - Nadia Patricia Da Silva Medeiros, Naghmeh Ramezani Ivaki, Pedro Costa, Marco Vieira:
Software Metrics as Indicators of Security Vulnerabilities. 216-227 - Peter T. Popov:
Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks. 228-239
Security Assessment and Quality Assurance
- Aad P. A. van Moorsel, Matthew Forshaw, Francisco Rocha:
Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case. 240-249 - Jiaojiao Fu, Yangfan Zhou, Huan Liu, Yu Kang, Xin Wang:
Perman: Fine-Grained Permission Management for Android Applications. 250-259 - Andreas Johnsen, Kristina Lundqvist, Kaj Hänninen, Paul Pettersson:
AQAT: The Architecture Quality Assurance Tool for Critical Embedded Systems. 260-270
PER: Reliability
- Andreas Johnsen, Kristina Lundqvist, Kaj Hänninen, Paul Pettersson, Martin Torelm:
Experience Report: Evaluating Fault Detection Effectiveness and Resource Efficiency of the Architecture Quality Assurance Framework and Tool. 271-281 - Maayan Goldstein, Danny Raz, Itai Segall:
Experience Report: Log-Based Behavioral Differencing. 282-293 - Muhammad Sohaib Ayub, Waqas ur Rehman, Junaid Haroon Siddiqui:
Experience Report: Verifying MPI Java Programs Using Software Model Checking. 294-304
Testing
- Hoda Khalil, Yvan Labiche:
On FSM-Based Testing: An Empirical Study: Complete Round-Trip Versus Transition Trees. 305-315 - Miao Xie, Qing Wang, Guowei Yang, Mingshu Li:
COCOON: Crowdsourced Testing Quality Maximization Under Context Coverage Constraint. 316-327 - Taejoon Byun, Vaibhav Sharma, Sanjai Rayadurgam, Stephen McCamant, Mats Per Erik Heimdahl:
Toward Rigorous Object-Code Coverage Criteria. 328-338
Machine Learning for Reliability and Security
- Dennis Appelt, Annibale Panichella, Lionel C. Briand:
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks. 339-350 - Christophe Bertero, Matthieu Roy, Carla Sauvanaud, Gilles Trédan:
Experience Report: Log Mining Using Natural Language Processing and Application to Anomaly Detection. 351-360 - Pablo Loyola, Yutaka Matsuo:
Learning Feature Representations from Change Dependency Graphs for Defect Prediction. 361-372
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.