


default search action
34th ISSRE 2023: Florence, Italy
- 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, Florence, Italy, October 9-12, 2023. IEEE 2023, ISBN 979-8-3503-1594-3

- Xutan Peng, Yipeng Zhang, Jingfeng Yang, Mark Stevenson:

On the Vulnerabilities of Text-to-SQL Models. 1-12 - Zhaoyang Yu, Changhua Pei, Shenglin Zhang, Xidao Wen, Jianhui Li, Gaogang Xie, Dan Pei:

AutoKAD: Empowering KPI Anomaly Detection with Label-Free Deployment. 13-23 - Yang Chen, Jianfeng Jiang, Shoumeng Yan, Hui Xu:

Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint Analysis. 24-35 - Jinyang Liu

, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Cong Feng, Zengyin Yang, Michael R. Lyu:
Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services. 36-45 - Chiming Duan

, Tong Jia, Huaqian Cai, Ying Li, Gang Huang:
AFALog: A General Augmentation Framework for Log-based Anomaly Detection with Active Learning. 46-56 - Dongwen Li, Shenglin Zhang, Yongqian Sun, Yang Guo

, Zeyu Che, Shiqi Chen, Zhenyu Zhong, Minghan Liang, Minyi Shao
, Mingjie Li, Shuyang Liu, Yuzhi Zhang, Dan Pei:
An Empirical Analysis of Anomaly Detection Methods for Multivariate Time Series. 57-68 - Shenglin Zhang, Zhongjie Pan, Heng Liu, Pengxiang Jin, Yongqian Sun, Qianyu Ouyang, Jiaju Wang, Xueying Jia, Yuzhi Zhang, Hui Yang, Yongqiang Zou, Dan Pei:

Efficient and Robust Trace Anomaly Detection for Large-Scale Microservice Systems. 69-79 - Philipp Straubinger, Gordon Fraser:

A Survey on What Developers Think About Testing. 80-90 - Pedro Henrique Kuroishi, José Carlos Maldonado, Auri Marcelo Rizzo Vincenzi

:
Towards the Implementation of a Mobile Application Testing Infrastructure at Von Braun Labs. 91-101 - Kush Jain, Goutamkumar Tulajappa Kalburgi, Claire Le Goues

, Alex Groce:
Mind the Gap: The Difference Between Coverage and Mutation Score Can Guide Testing Efforts. 102-113 - João Paulo Diniz, Fischer Ferreira

, Fabiano Cutigi Ferrari, Eduardo Figueiredo:
Do Mutations of Strongly Subsuming Second-Order Mutants Really Mask Each Other? 114-124 - Andrea Ceccarelli

, Tommaso Zoppi:
Intrusion detection without attack knowledge: generating out-of-distribution tabular data. 125-136 - José D'Abruzzo Pereira, Marco Vieira

:
An Approach to Characterize the Security of Open-Source Functions using LSP. 137-147 - Jiawei Huang, Hao Han, Fengyuan Xu, Bing Chen:

SAPPX: Securing COTS Binaries with Automatic Program Partitioning for Intel SGX. 148-159 - Fanlang Zeng

, Zhuoruo Zhang, Rui Chang, Chenyang Yu, Zijun Zhang, Yongwang Zhao:
Lark: Verified Cross-Domain Access Control for Trusted Execution Environments. 160-171 - Wenjing Wang, Shida Lu, Jianhui Luo, Chengrong Wu:

DeepUserLog: Deep Anomaly Detection on User Log Using Semantic Analysis and Key-Value Data. 172-182 - Xingjian Zhang, Yinqin Zhao, Chang Liu, Long Wang, Xin Yang, Yefei Hou, Zhongwen Lan, Xining Hu, Beibei Miao, Ming Yang

, Xiangyi Jing, Sijie Li:
fKPISelect: Fault-Injection Based Automated KPI Selection for Practical Multivariate Anomaly Detection. 183-194 - Xiaoda Xie, Songlei Jian, Chenlin Huang, Fengyuan Yu, Yunjia Deng:

LogRep: Log-based Anomaly Detection by Representing both Semantic and Numeric Information in Raw Messages. 194-206 - Shiming He, Ying Lei, Ying Zhang, Kun Xie, Pradip Kumar Sharma

:
Parameter-Efficient Log Anomaly Detection based on Pre-training model and LORA. 207-217 - Adam G. Emerson, Allison Sullivan:

Crucible: Graphical Test Cases for Alloy Models. 218-227 - Miriam Ugarte Querejeta, Eunkyoung Jee, Lingjun Liu, Pablo Valle, Aitor Arrieta, Miren Illarramendi Rezabal:

Search-based Test Case Selection for PLC Systems using Functional Block Diagram Programs. 228-239 - Lin Yang, Junjie Chen, Hanmo You, Jiachen Han, Jiajun Jiang, Zhe Sun, Xinqi Lin, Fang Liang, Yuning Kang:

Can Code Representation Boost IR-Based Test Case Prioritization? 240-251 - Maojin Li, Yan Lei, Huan Xie, Jiaguo Wang, Chunyan Liu, Zhengxiong Deng:

Contrastive Coincidental Correctness Representation Learning. 252-263 - Yujin Zhao, Ling Jiang, Ye Tao, Songlin Zhang, Changlong Wu, Yifan Wu, Tong Jia, Ying Li, Zhonghai Wu:

How to Manage Change-Induced Incidents? Lessons from the Study of Incident Life Cycle. 264-274 - Jiaying Li, Yan Lei, Shanshan Li, Haifang Zhou, Yue Yu, Zhouyang Jia, Yingwei Ma, Teng Wang:

A Two-Stage Framework for Ambiguous Classification in Software Engineering. 275-286 - Yujin Zhao, Ling Jiang, Ye Tao, Songlin Zhang, Changlong Wu, Tong Jia, Xiaosong Huang, Ying Li, Zhonghai Wu:

Identifying Root-Cause Changes for User-Reported Incidents in Online Service Systems. 287-297 - Haozhe Li, Minghua Ma, Yudong Liu, Si Qin

, Bo Qiao, Randolph Yao, Harshwardhan Chaturvedi, Tri Tran, Murali Chintalapati, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
CODEC: Cost-Effective Duration Prediction System for Deadline Scheduling in the Cloud. 298-308 - Shuncheng Tang, Zhenya Zhang, Jixiang Zhou, Yuan Zhou

, Yan-Fu Li, Yinxing Xue:
EvoScenario: Integrating Road Structures into Critical Scenario Generation for Autonomous Driving System Testing. 309-320 - Jixiang Zhou, Shuncheng Tang, Yan Guo, Yan-Fu Li, Yinxing Xue:

From Collision to Verdict: Responsibility Attribution for Autonomous Driving Systems Testing. 321-332 - Qiang Wen, Fumio Machida:

Characterizing Reliability of Three-version Traffic Sign Classifier System through Diversity Metrics. 333-343 - Jubril Gbolahan Adigun, Tom Philip Huck, Matteo Camilli

, Michael Felderer
:
Risk-driven Online Testing and Test Case Diversity Analysis for ML-enabled Critical Systems. 344-354 - Jieming Zhu, Shilin He, Pinjia He, Jinyang Liu

, Michael R. Lyu:
Loghub: A Large Collection of System Log Datasets for AI-driven Log Analytics. 355-366 - Vithor Gomes Ferreira Bertalan, Daniel Aloise

:
Using Transformer Models and Textual Analysis for Log Parsing. 367-378 - Stefan Petrescu, Floris den Hengst

, Alexandru Uta
, Jan S. Rellermeyer
:
Log Parsing Evaluation in the Era of Modern Software Systems. 379-390 - Yintong Huo

, Cheryl Lee, Yuxin Su, Shiwen Shan, Jinyang Liu
, Michael R. Lyu:
EvLog: Identifying Anomalous Logs over Software Evolution. 391-402 - Hui Guo, Ting Su, Xiaoqiang Liu, Siyi Gu, Jingling Sun:

Effectively Finding ICC-related Bugs in Android Apps via Reinforcement Learning. 403-414 - Abhishek Tiwari, Jyoti Prakash, Christian Hammer:

Demand-driven Information Flow Analysis of WebView in Android Hybrid Apps. 415-426 - Shaokun Zhang, Hanwen Lei, Yuanpeng Wang, Ding Li, Yao Guo, Xiangqun Chen:

APIMind: API-driven Assessment of Runtime Description-to-permission Fidelity in Android Apps. 427-438 - Shaokun Zhang, Linna Wu, Yuanchun Li, Ziqi Zhang, Hanwen Lei, Ding Li, Yao Guo, Xiangqun Chen:

ReSPlay: Improving Cross-Platform Record-and-Replay with GUI Sequence Matching. 439-450 - João R. Campos

, Ernesto Costa, Marco Vieira
:
Online Failure Prediction Through Fault Injection and Machine Learning: Methodology and Case Study. 451-461 - Chen Yang, Yuanchun Li, Hao Lu, Jinliang Yuan, Qibo Sun, Shangguang Wang, Mengwei Xu:

Evaluating and Enhancing the Robustness of Federated Learning System against Realistic Data Corruption. 462-473 - Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:

Evaluating the Effect of Common Annotation Faults on Object Detection Techniques. 474-485 - Jiahao Shi, Sihang Jiang, Bo Xu, Yanghua Xiao:

ServerRCA: Root Cause Analysis for Server Failure using Operating System Logs. 486-496 - Haiyang Li

, Qing Gao, Shikun Zhang:
Assessing and Improving Dataset and Evaluation Methodology in Deep Learning for Code Clone Detection. 497-508 - Huashan Lei, Shuai Zhang, Jun Wang, Guanping Xiao

, Yepang Liu, Yulei Sui:
Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study. 509-520 - Hongjing Guo, Chuanqi Tao, Zhiqiu Huang:

Multi-Objective White-Box Test Input Selection for Deep Neural Network Model Enhancement. 521-532 - Zhiyang Zhou, Jie Liu, Wensheng Dou, Shuo Li, Liangyi Kang, Muzi Qu, Dan Ye:

Fixing Robust Out-of-distribution Detection for Deep Neural Networks. 533-544 - Kaitai Zhu, Xingya Wang, Zhenyu Chen, Song Huang, Junhua Wu:

Evaluating Ethereum Reentrancy Detection Tools via Mutation Testing. 545-555 - Lei Yu

, Junyi Lu, Xianglong Liu, Li Yang, Fengjun Zhang, Jiajia Ma:
PSCVFinder: A Prompt-Tuning Based Framework for Smart Contract Vulnerability Detection. 556-567 - Huijuan Zhu, Kaixuan Yang, Liangmin Wang, Zhicheng Xu, Victor S. Sheng:

GraBit: A Sequential Model-Based Framework for Smart Contract Vulnerability Detection. 568-577 - Mengliang Li, Xiaoxue Ren, Han Fu, Zhuo Li, Jianling Sun:

ConvMHSA-SCVD: Enhancing Smart Contract Vulnerability Detection through a Knowledge-Driven and Data-Driven Framework. 578-589 - Chen Zhang, Shuo Feng, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang, Roberto Pietrantuono, Roberto Natella, Domenico Cotroneo:

IFCM: An improved Fuzzy C-means clustering method to handle Class Overlap on Aging-related Software Bug Prediction. 590-600 - Tong Zhou, Chenxi Zhang

, Xin Peng, Zhenghui Yan, Pairui Li, Jianming Liang, Haibing Zheng, Wujie Zheng, Yuetang Deng:
TraceStream: Anomalous Service Localization based on Trace Stream Clustering with Online Feedback. 601-611 - Xinmeng Xia, Yang Feng:

Detecting Interpreter Bugs via Filling Function Calls in Skeletal Program Enumeration. 612-622 - Aayush Garg

, Renzo Degiovanni
, Facundo Molina
, Maxime Cordy, Nazareno Aguirre, Mike Papadakis, Yves Le Traon:
Enabling Efficient Assertion Inference. 623-634 - Ehsan Mashhadi, Hossein Ahmadvand, Hadi Hemmati:

Method-Level Bug Severity Prediction using Source Code Metrics and LLMs. 635-646 - Junyi Lu, Lei Yu

, Xiaojia Li, Li Yang, Chun Zuo:
LLaMA-Reviewer: Advancing Code Review Automation with Large Language Models through Parameter-Efficient Fine-Tuning. 647-658 - Udit Kumar Agarwal, Abraham Chan, Karthik Pattabiraman:

Resilience Assessment of Large Language Models under Transient Hardware Faults. 659-670 - Jie Shi

, Sihang Jiang, Bo Xu, Jiaqing Liang, Yanghua Xiao, Wei Wang:
ShellGPT: Generative Pre-trained Transformer Model for Shell Language Understanding. 671-682 - André Storhaug

, Jingyue Li
, Tianyuan Hu:
Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding. 683-693 - Jiaxian Lin, Tianyu Li, Yang Chen, Guangsheng Wei, Jiadong Lin, Sen Zhang, Hui Xu:

foREST: A Tree-based Black-box Fuzzing Approach for RESTful APIs. 695-705 - Kairui Wang, Yawen Wang

, Junjie Wang, Qing Wang:
Fuzzing with Sequence Diversity Inference for Sequential Decision-making Model Testing. 706-717 - Chunlin Wang, Hongliang Liang:

Value Peripheral Register Values for Fuzzing MCU Firmware. 718-729 - Yafan Huang

, Zhengyang He, Lingda Li, Guanpeng Li:
Characterizing Runtime Performance Variation in Error Detection by Duplicating Instructions. 730-741 - Chukri Soueidi, Yliès Falcone, Sylvain Hallé:

Dynamic Program Analysis with Flexible Instrumentation and Complex Event Processing. 742-751 - Juan Manuel Copia, Facundo Molina

, Nazareno Aguirre, Marcelo F. Frias
, Alessandra Gorla, Pablo Ponzio:
Precise Lazy Initialization for Programs with Complex Heap Inputs. 752-762 - Guancheng Wang, Yiqian Wu, Qihao Zhu, Yingfei Xiong, Xin Zhang

, Lu Zhang:
A Probabilistic Delta Debugging Approach for Abstract Syntax Trees. 763-773 - Hongna Geng, Ming Zhong, Peihua Zhang

, Fang Lv, Xiaobing Feng:
OPTango: Multi-central Representation Learning against Innumerable Compiler Optimization for Binary Diffing. 774-785 - Xin Liu, Yuan Tan, Xuan Hai, Qingchen Yu, Qingguo Zhou:

Hidden-in-Wave: A Novel Idea to Camouflage AI-Synthesized Voices Based on Speaker-Irrelative Features. 786-794 - Nima Shiri Harzevili, Jiho Shin

, Junjie Wang, Song Wang, Nachiappan Nagappan:
Automatic Static Vulnerability Detection for Machine Learning Libraries: Are We There Yet? 795-806

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














