Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISSRE
ISSRE 2017
Generate Citations
2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE)
Oct. 23 2017 to Oct. 26 2017
Toulouse, France
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-viii
Message from the General Chair
Freely available from IEEE.
pp. ix-x
Message from the Program Co-Chairs
Freely available from IEEE.
pp. xi-xi
Organizing Committee
Freely available from IEEE.
pp. xii-xiii
Program Committee Members
Freely available from IEEE.
pp. xiv-xv
Subreviewers
Freely available from IEEE.
pp. xvi-xvi
Keynote abstracts
Full-text access may be available. Sign in or learn about subscription options.
pp. xvii-xviii
Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Antonio Ken Iannillo
,
Roberto Natella
,
Domenico Cotroneo
,
Cristina Nita-Rotaru
Reflection Analysis for Java: Uncovering More Reflective Targets Precisely
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-23
by
Jie Liu
,
Yue Li
,
Tian Tan
,
Jingling Xue
GEMS: An Extract Method Refactoring Recommender
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-34
by
Sihan Xu
,
Aishwarya Sivaraman
,
Siau-Cheng Khoo
,
Jing Xu
A Generalized Bivariate Modeling Framework of Fault Detection and Correction Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-45
by
Hiroyuki Okamura
,
Tadashi Dohi
A Stochastic Modeling Approach for an Efficient Dependability Evaluation of Large Systems with Non-anonymous Interconnected Components
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-55
by
Giulio Masetti
,
Felicita Di Giandomenico
,
Silvano Chiaradonna
Understanding the Impacts of Influencing Factors on Time to a DataRace Software Failure
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-66
by
Kun Qiu
,
Zheng Zheng
,
Kishor S. Trivedi
,
Beibei Yin
An Exploratory Study of Field Failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-77
by
Luca Gazzola
,
Leonardo Mariani
,
Fabrizio Pastore
,
Mauro Pezzè
Learning from Imbalanced Data for Predicting the Number of Software Defects
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-89
by
Xiao Yu
,
Jin Liu
,
Zijiang Yang
,
Xiangyang Jia
,
Qi Ling
,
Sizhe Ye
A Fault Correlation Approach to Detect Performance Anomalies in Virtual Network Function Chains
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-100
by
Domenico Cotroneo
,
Roberto Natella
,
Stefano Rosiello
Experience Report: Fault Triggers in Linux Operating System: from Evolution Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-111
by
Guanping Xiao
,
Zheng Zheng
,
Beibei Yin
,
Kishor S. Trivedi
,
Xiaoting Du
,
Kaiyuan Cai
Simultaneous Fault Models for the Generation of Efficient Error Detection Mechanisms
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-123
by
Matthew Leeke
Which Packages Would be Affected by This Bug Report?
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-135
by
Qiao Huang
,
David Lo
,
Xin Xia
,
Qingye Wang
,
Shanping Li
Experience Report: On the Impact of Software Faults in the Privileged Virtual Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-145
by
Frederico Cerveira
,
Raul Barbosa
,
Henrique Madeira
WAP: SAT-Based Computation of Minimal Cut Sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Weilin Luo
,
Ou Wei
Experience Report: Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-163
by
Katerina Goseva-Popstojanova
,
Jacob Tyo
WAP: Does Reviewer Age Affect Code Review Performance?
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Yukasa Murakami
,
Masateru Tsunoda
,
Hidetake Uwano
Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-181
by
Alexandre Braga
,
Ricardo Dahab
,
Nuno Antunes
,
Nuno Laranjeiro
,
Marco Vieira
Interactive Runtime Verification — When Interactive Debugging Meets Runtime Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-193
by
Raphaël Jakse
,
Yliès Falcone
,
Jean-François Méhaut
,
Kevin Pouget
Formal Development of Policing Functions for Intelligent Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-204
by
Chris Bogdiukiewicz
,
Michael Butler
,
Thai Son Hoang
,
Martin Paxton
,
James Snook
,
Xanthippe Waldron
,
Toby Wilkinson
Experience Report: Study of Vulnerabilities of Enterprise Operating Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-215
by
Anatoliy Gorbenko
,
Alexander Romanovsky
,
Olga Tarasyuk
,
Oleksandr Biloborodov
Software Metrics as Indicators of Security Vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-227
by
Nádia Medeiros
,
Naghmeh Ivaki
,
Pedro Costa
,
Marco Vieira
Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-239
by
Peter Popov
Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-249
by
Aad Van Moorsel
,
Matthew Forshaw
,
Francisco Rocha
Perman: Fine-Grained Permission Management for Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-259
by
Jiaojiao Fu
,
Yangfan Zhou
,
Huan Liu
,
Yu Kang
,
Xin Wang
AQAT: The Architecture Quality Assurance Tool for Critical Embedded Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-270
by
Andreas Johnsen
,
Kristina Lundqvist
,
Kaj Hänninen
,
Paul Pettersson
Experience Report: Evaluating Fault Detection Effectiveness and Resource Efficiency of the Architecture Quality Assurance Framework and Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-281
by
Andreas Johnsen
,
Kristina Lundqvist
,
Kaj Hänninen
,
Paul Pettersson
,
Martin Torelm
Experience Report: Log-Based Behavioral Differencing
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-293
by
Maayan Goldstein
,
Danny Raz
,
Itai Segall
Experience Report: Verifying MPI Java Programs Using Software Model Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-304
by
Muhammad Sohaib Ayub
,
Waqas Ur Rehman
,
Junaid Haroon Siddiqui
On FSM-Based Testing: An Empirical Study: Complete Round-Trip Versus Transition Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-315
by
Hoda Khalil
,
Yvan Labiche
COCOON: Crowdsourced Testing Quality Maximization Under Context Coverage Constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-327
by
Miao Xie
,
Qing Wang
,
Guowei Yang
,
Mingshu Li
Toward Rigorous Object-Code Coverage Criteria
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-338
by
Taejoon Byun
,
Vaibhav Sharma
,
Sanjai Rayadurgam
,
Stephen McCamant
,
Mats P. E. Heimdahl
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-350
by
Dennis Appelt
,
Annibale Panichella
,
Lionel Briand
Experience Report: Log Mining Using Natural Language Processing and Application to Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-360
by
Christophe Bertero
,
Matthieu Roy
,
Carla Sauvanaud
,
Gilles Tredan
Learning Feature Representations from Change Dependency Graphs for Defect Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-372
by
Pablo Loyola
,
Yutaka Matsuo
Author index
Freely available from IEEE.
pp. 373-374
[Publisher's information]
Freely available from IEEE.
pp. 376-376
Showing 46 out of 46