Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ASE
ASE 2020
Generate Citations
2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)
Sept. 21 2020 to Sept. 25 2020
Melbourne
ISBN: 978-1-4503-6768-4
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
Table of Contents
Freely available from IEEE.
pp. v-xxi
Message from the Chairs
Freely available from IEEE.
pp. xxii-xxii
Organizing Committee
Freely available from IEEE.
pp. xxvii-xxix
Programme Committee - Research Track
Freely available from IEEE.
pp. xxx-xxxix
Platinum Sponsor
Freely available from IEEE.
pp. 1-1
Safety and Robustness for Deep Learning with Provable Guarantees
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Marta Kwiatkowska
Is Software Engineering Research Addressing Software Engineering Problems? (Keynote)
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-5
by
Gail C. Murphy
Accelerating All-SAT Computation with Short Blocking Clauses
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-17
by
Yueling Zhang
,
Geguang Pu
,
Jun Sun
A Predictive Analysis for Detecting Deadlock in MPI Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-28
by
Yu Huang
,
Benjamin Ogles
,
Eric Mercer
Learning to Handle Exceptions
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-41
by
Jian Zhang
,
Xu Wang
,
Hongyu Zhang
,
Hailong Sun
,
Yanjun Pu
,
Xudong Liu
BUILDFAST: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-53
by
Bihuan Chen
,
Linlin Chen
,
Chen Zhang
,
Xin Peng
LEGION: Best-First Concolic Testing
Freely available from IEEE.
pp. 54-65
by
Dongge Liu
,
Gidon Ernst
,
Toby Murray
,
Benjamin I.P. Rubinstein
Plug the Database & Play With Automatic Testing: Improving System Testing by Exploiting Persistent Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-77
by
Diego Clerissi
,
Giovanni Denaro
,
Marco Mobilio
,
Leonardo Mariani
Enhanced Compiler Bug Isolation via Memoized Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-89
by
Junjie Chen
,
Haoyang Ma
,
Lingming Zhang
M3: Semantic API Migrations
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-102
by
Bruce Collie
,
Philip Ginsbach
,
Jackson Woodruff
,
Ajitha Rajan
,
Michael F.P. O'Boyle
The Impact of Generic Data Structures: Decoding the Role of Lists in the Linux Kernel
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-114
by
Nic Volanschi
,
Julia Lawall
Pending Constraints in Symbolic Execution for Better Exploration and Seeding
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-126
by
Timotej Kapus
,
Frank Busse
,
Cristian Cadar
Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-137
by
Sungho Lee
,
Hyogun Lee
,
Sukyoung Ryu
Assessing and Restoring Reproducibility of Jupyter Notebooks
Freely available from IEEE.
pp. 138-149
by
Jiawei Wang
,
Tzu-Yang KUO
,
Li Li
,
Andreas Zeller
Verified from Scratch: Program Analysis for Learners' Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-162
by
Andreas Stahlbauer
,
Christoph Frädrich
,
Gordon Fraser
Interval Change-Point Detection for Runtime Probabilistic Model Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-174
by
Xingyu Zhao
,
Radu Calinescu
,
Simos Gerasimou
,
Valentin Robu
,
David Flynn
UNCHARTIT: An Interactive Framework for Program Recovery from Charts
Freely available from IEEE.
pp. 175-186
by
Daniel Ramos
,
Jorge Pereira
,
Inês Lynce
,
Vasco Manquinho
,
Ruben Martins
Demystifying Diehard Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-198
by
Hao Zhou
,
Haoyu Wang
,
Yajin Zhou
,
Xiapu Luo
,
Yutian Tang
,
Lei Xue
,
Ting Wang
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-210
by
Hao Zhou
,
Ting Chen
,
Haoyu Wang
,
Le Yu
,
Xiapu Luo
,
Ting Wang
,
Wei Zhang
Good Things Come In Threes: Improving Search-based Crash Reproduction With Helper Objectives
Freely available from IEEE.
pp. 211-223
by
Pouria Derakhshanfar
,
Xavier Devroey
,
Andy Zaidman
,
Arie van Deursen
,
Annibale Panichella
Subdomain-Based Generality-Aware Debloating
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-236
by
Qi Xin
,
Myeongsoo Kim
,
Qirun Zhang
,
Alessandro Orso
Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-249
by
Yiqun T. Chen
,
Rahul Gopinath
,
Anita Tadakamalla
,
Michael D. Ernst
,
Reid Holmes
,
Gordon Fraser
,
Paul Ammann
,
René Just
Synthesis of Infinite-State Systems with Random Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-261
by
Andreas Katis
,
Grigory Fedyukovich
,
Jeffrey Chen
,
David Greve
,
Sanjai Rayadurgam
,
Michael W. Whalen
Demystifying Loops in Smart Contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-274
by
Benjamin Mariano
,
Yanju Chen
,
Yu Feng
,
Shuvendu K. Lahiri
,
Isil Dillig
Patching as Translation: the Data and the Metaphor
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-286
by
Yangruibo Ding
,
Baishakhi Ray
,
Premkumar Devanbu
,
Vincent J. Hellendoorn
DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests
Freely available from IEEE.
pp. 287-298
by
Devjeet Roy
,
Ziyi Zhang
,
Maggie Ma
,
Venera Arnaoudova
,
Annibale Panichella
,
Sebastiano Panichella
,
Danielle Gonzalez
,
Mehdi Mirakhorli
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-311
by
Mohammad Jafar Mashhadi
,
Hadi Hemmati
Representing and Reasoning about Dynamic Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-323
by
Jesse Bartels
,
Jon Stephens
,
Saumya Debray
ER Catcher: A Static Analysis Framework for Accurate and Scalable Event-Race Detection in Android
Freely available from IEEE.
pp. 324-335
by
Navid Salehnamadi
,
Abdulaziz Alshayban
,
Iftekhar Ahmed
,
Sam Malek
A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open Forum
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-348
by
Mingyang Li
,
Lin Shi
,
Ye Yang
,
Qing Wang
Retrieve and Refine: Exemplar-based Neural Comment Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-360
by
Bolin Wei
,
Yongmin Li
,
Ge Li
,
Xin Xia
,
Zhi Jin
Where Shall We Log? Studying and Suggesting Logging Locations in Code Blocks
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-372
by
Zhenhao Li
,
Tse-Hsun Chen
,
Weiyi Shang
How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-384
by
Junjie Chen
,
Shu Zhang
,
Xiaoting He
,
Qingwei Lin
,
Hongyu Zhang
,
Dan Hao
,
Yu Kang
,
Feng Gao
,
Zhangwei Xu
,
Yingnong Dang
,
Dongmei Zhang
Stay Professional and Efficient: Automatically Generate Titles for Your Bug Reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-397
by
Songqiang Chen
,
Xiaoyuan Xie
,
Bangguo Yin
,
Yuanxiang Ji
,
Lin Chen
,
Baowen Xu
Owl Eyes: Spotting UI Display Issues via Visual Understanding
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-409
by
Zhe Liu
,
Chunyang Chen
,
Junjie Wang
,
Yuekai Huang
,
Jun Hu
,
Qing Wang
Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-422
by
Weijun Shen
,
Yanhui Li
,
Lin Chen
,
Yuanlei Han
,
Yuming Zhou
,
Baowen Xu
Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-435
by
Xiaoning Du
,
Yi Li
,
Xiaofei Xie
,
Lei Ma
,
Yang Liu
,
Jianjun Zhao
MockSniffer: Characterizing and Recommending Mocking Decisions for Unit Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-447
by
Hengcheng Zhu
,
Lili Wei
,
Ming Wen
,
Yepang Liu
,
Shing-Chi Cheung
,
Qin Sheng
,
Cui Zhou
Defect Prediction Guided Search-Based Software Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-460
by
Anjana Perera
,
Aldeida Aleti
,
Marcel Böhme
,
Burak Turhan
API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-472
by
Xiaoxue Ren
,
Xinyuan Ye
,
Zhenchang Xing
,
Xin Xia
,
Xiwei Xu
,
Liming Zhu
,
Jianling Sun
Multi-task Learning based Pre-trained Language Model for Code Completion
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-485
by
Fang Liu
,
Ge Li
,
Yunfei Zhao
,
Zhi Jin
Audee: Automated Testing for Deep Learning Frameworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-498
by
Qianyu Guo
,
Xiaofei Xie
,
Yi Li
,
Xiaoyu Zhang
,
Yang Liu
,
Xiaohong Li
,
Chao Shen
Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 499-510
by
Guoliang Dong
,
Jingyi Wang
,
Jun Sun
,
Yang Zhang
,
Xinyu Wang
,
Ting Dai
,
Jin Song Dong
,
Xingen Wang
Continuous Compliance
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-523
by
Martin Kellogg
,
Martin Schäf
,
Serdar Tasiran
,
Michael D. Ernst
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations
Full-text access may be available. Sign in or learn about subscription options.
pp. 524-535
by
Lili Quan
,
Qianyu Guo
,
Hongxu Chen
,
Xiaofei Xie
,
Xiaohong Li
,
Yang Liu
,
Jing Hu
CoFI: Consistency-Guided Fault Injection for Cloud Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 536-547
by
Haicheng Chen
,
Wensheng Dou
,
Dong Wang
,
Feng Qin
ChemTest: An Automated Software Testing Framework for an Emerging Paradigm
Freely available from IEEE.
pp. 548-560
by
Michael C. Gerten
,
James I. Lathrop
,
Myra B. Cohen
,
Titus H. Klinge
Automatic Extraction of Cause-Effect-Relations from Requirements Artifacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 561-572
by
Julian Frattini
,
Maximilian Junker
,
Michael Unterkalmsteiner
,
Daniel Mendez
BiLO-CPDP: Bi-Level Programming for Automated Model Discovery in Cross-Project Defect Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 573-584
by
Ke Li
,
Zilin Xiang
,
Tao Chen
,
Kay Chen Tan
Automating Just-In-Time Comment Updating
Full-text access may be available. Sign in or learn about subscription options.
pp. 585-597
by
Zhongxin Liu
,
Xin Xia
,
Meng Yan
,
Shanping Li
Automated Implementation of Windows-related Security-Configuration Guides
Full-text access may be available. Sign in or learn about subscription options.
pp. 598-610
by
Patrick Stöckle
,
Bernd Grobauer
,
Alexander Pretschner
Identifying Software Performance Changes Across Variants and Versions
Full-text access may be available. Sign in or learn about subscription options.
pp. 611-622
by
Stefan Mühlbauer
,
Sven Apel
,
Norbert Siegmund
CP-Detector: Using Configuration-related Performance Properties to Expose Performance Bugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 623-634
by
Haochen He
,
Zhouyang Jia
,
Shanshan Li
,
Erci Xu
,
Tingting Yu
,
Yue Yu
,
Ji Wang
,
Xiangke Liao
Just-In-Time Reactive Synthesis
Full-text access may be available. Sign in or learn about subscription options.
pp. 635-646
by
Shahar Maoz
,
Ilia Shevrin
JISET: JavaScript IR-based Semantics Extraction Toolchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 647-658
by
Jihyeok Park
,
Jihee Park
,
Seungmin An
,
Sukyoung Ryu
FlashRegex: Deducing Anti-ReDoS Regexes from Examples
Full-text access may be available. Sign in or learn about subscription options.
pp. 659-671
by
Yeting Li
,
Zhiwu Xu
,
Jialun Cao
,
Haiming Chen
,
Tingjian Ge
,
Shing-Chi Cheung
,
Haoren Zhao
Inferring and Applying Def-Use Like Configuration Couplings in Deployment Descriptors
Full-text access may be available. Sign in or learn about subscription options.
pp. 672-683
by
Chengyuan Wen
,
Yaxuan Zhang
,
Xiao He
,
Na Meng
Mastering Uncertainty in Performance Estimations of Configurable Software Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 684-696
by
Johannes Dorn
,
Sven Apel
,
Norbert Siegmund
Team Discussions and Dynamics During DevOps Tool Adoptions in OSS Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 697-708
by
Likang Yin
,
Vladimir Filkov
TestMC: Testing Model Counters using Differential and Metamorphic Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 709-721
by
Muhammad Usman
,
Wenxi Wang
,
Sarfraz Khurshid
BigFuzz: Efficient Fuzz Testing for Data Analytics Using Framework Abstraction
Freely available from IEEE.
pp. 722-733
by
Qian Zhang
,
Jiyuan Wang
,
Muhammad Ali Gulzar
,
Rohan Padhye
,
Miryung Kim
Scaling Client-Specific Equivalence Checking via Impact Boundary Search
Freely available from IEEE.
pp. 734-745
by
Nick Feng
,
Federico Mora
,
Vincent Hui
,
Marsha Chechik
Code to Comment “Translation”: Data, Metrics, Baselining & Evaluation
Freely available from IEEE.
pp. 746-757
by
David Gros
,
Hariharan Sezhiyan
,
Prem Devanbu
,
Zhou Yu
Exploring the Architectural Impact of Possible Dependencies in Python Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 758-770
by
Wuxia Jin
,
Yuanfang Cai
,
Rick Kazman
,
Gang Zhang
,
Qinghua Zheng
,
Ting Liu
Problems and Opportunities in Training Deep Learning Software Systems: An Analysis of Variance
Full-text access may be available. Sign in or learn about subscription options.
pp. 771-783
by
Hung Viet Pham
,
Shangshu Qian
,
Jiannan Wang
,
Thibaud Lutellier
,
Jonathan Rosenthal
,
Lin Tan
,
Yaoliang Yu
,
Nachiappan Nagappan
NEURODIFF: Scalable Differential Verification of Neural Networks using Fine-Grained Approximation
Full-text access may be available. Sign in or learn about subscription options.
pp. 784-796
by
Brandon Paulsen
,
Jingbo Wang
,
Jiawei Wang
,
Chao Wang
Identifying and Describing Information Seeking Tasks
Freely available from IEEE.
pp. 797-808
by
Chris Satterfield
,
Thomas Fritz
,
Gail C. Murphy
Predicting Code Context Models for Software Development Tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 809-820
by
Zhiyuan Wan
,
Gail C. Murphy
,
Xin Xia
SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 821-833
by
Yueming Wu
,
Deqing Zou
,
Shihan Dou
,
Siru Yang
,
Wei Yang
,
Feng Cheng
,
Hong Liang
,
Hai Jin
Generating Concept based API Element Comparison Using a Knowledge Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 834-845
by
Yang Liu
,
Mingwei Liu
,
Xin Peng
,
Christoph Treude
,
Zhenchang Xing
,
Xiaoxin Zhang
Multiplex Symbolic Execution: Exploring Multiple Paths by Solving Once
Full-text access may be available. Sign in or learn about subscription options.
pp. 846-857
by
Yufeng Zhang
,
Zhenbang Chen
,
Ziqi Shuai
,
Tianqi Zhang
,
Kenli Li
,
Ji Wang
Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 858-870
by
Chijin Zhou
,
Mingzhe Wang
,
Jie Liang
,
Zhe Liu
,
Yu Jiang
Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 871-882
by
Xin Wang
,
Jin Liu
,
Li Li
,
Xiao Chen
,
Xiao Liu
,
Hao Wu
OCoR: An Overlapping-Aware Code Retriever
Full-text access may be available. Sign in or learn about subscription options.
pp. 883-894
by
Qihao Zhu
,
Zeyu Sun
,
Xiran Liang
,
Yingfei Xiong
,
Lu Zhang
Understanding Performance Concerns in the API Documentation of Data Science Libraries
Full-text access may be available. Sign in or learn about subscription options.
pp. 895-906
by
Yida Tao
,
Jiefang Jiang
,
Yepang Liu
,
Zhiwu Xu
,
Shengchao Qin
On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 907-918
by
Samuel Benton
,
Xia Li
,
Yiling Lou
,
Lingming Zhang
Automated Third-Party Library Detection for Android Applications: Are We There Yet?
Full-text access may be available. Sign in or learn about subscription options.
pp. 919-930
by
Xian Zhan
,
Lingling Fan
,
Tianming Liu
,
Sen Chen
,
Li Li
,
Haoyu Wang
,
Yifei Xu
,
Xiapu Luo
,
Yang Liu
CCGraph: a PDG-based code clone detector with approximate graph matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 931-942
by
Yue Zou
,
Bihuan Ban
,
Yinxing Xue
,
Yun Xu
Towards Generating Thread-Safe Classes Automatically
Full-text access may be available. Sign in or learn about subscription options.
pp. 943-955
by
Haichi Wang
,
Zan Wang
,
Jun Sun
,
Shuang Liu
,
Ayesha Sadiq
,
Yuan-Fang Li
No Strings Attached: An Empirical Study of String-related Software Bugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 956-967
by
Aryaz Eghbali
,
Michael Pradel
Automated Patch Correctness Assessment: How Far are We?
Full-text access may be available. Sign in or learn about subscription options.
pp. 968-980
by
Shangwen Wang
,
Ming Wen
,
Bo Lin
,
Hongjun Wu
,
Yihao Qin
,
Deqing Zou
,
Xiaoguang Mao
,
Hai Jin
Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair
Full-text access may be available. Sign in or learn about subscription options.
pp. 981-992
by
Haoye Tian
,
Kui Liu
,
Abdoul Kader Kaboré
,
Anil Koyuncu
,
Li Li
,
Jacques Klein
,
Tegawendé F. Bissyandé
Scalable Multiple-View Analysis of Reactive Systems via Bidirectional Model Transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 993-1003
by
Christos Tsigkanos
,
Nianyu Li
,
Zhi Jin
,
Zhenjiang Hu
,
Carlo Ghezzi
Trace-Checking Signal-based Temporal Properties: A Model-Driven Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1004-1015
by
Chaima Boufaied
,
Claudio Menghi
,
Domenico Bianculli
,
Lionel Briand
,
Yago Isasi Parache
Attend and Represent: A Novel View on Algorithm Selection for Software Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1016-1028
by
Cedric Richter
,
Heike Wehrheim
Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1029-1040
by
Yinxing Xue
,
Mingliang Ma
,
Yun Lin
,
Yulei Sui
,
Jiaming Ye
,
Tianyong Peng
Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 1041-1052
by
David Berend
,
Xiaofei Xie
,
Lei Ma
,
Lingjun Zhou
,
Yang Liu
,
Chi Xu
,
Jianjun Zhao
Metamorphic Object Insertion for Testing Object Detection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1053-1065
by
Shuai Wang
,
Zhendong Su
Seven Reasons Why: An In-Depth Study of the Limitations of Random Test Input Generation for Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 1066-1077
by
Farnaz Behrang
,
Alessandro Orso
Test Automation in Open-Source Android Apps: A Large-Scale Empirical Study
Freely available from IEEE.
pp. 1078-1089
by
Jun-Wei Lin
,
Navid Salehnamadi
,
Sam Malek
Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1090-1102
by
Benjamin Gafford
,
Tobias Dürschmid
,
Gabriel A. Moreno
,
Eunsuk Kang
MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 1103-1115
by
Hoang Lam Nguyen
,
Nebras Nassar
,
Timo Kehrer
,
Lars Grunske
Prober: Practically Defending Overflows with Page Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1116-1128
by
Hongyu Liu
,
Ruiqin Tian
,
Tongping Liu
,
Bin Ren
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1129-1140
by
Alan Romano
,
Yunhui Zheng
,
Weihang Wang
Showing 100 out of 165
Load More
Load All