Default Cover Image

2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)

Oct. 12 2020 to Oct. 15 2020

Coimbra, Portugal

ISBN: 978-1-7281-7735-9

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 2-2
Copyright PageFreely available from IEEE.pp. 3-3
Table of ContentsFreely available from IEEE.pp. 4-13
Message from the General ChairsFreely available from IEEE.pp. 14-15
Message from the Industry Track ChairsFreely available from IEEE.pp. 16-16
ISSRE Industry Track CommitteesFreely available from IEEE.pp. 17-17
Message from the Doctoral Symposium ChairsFreely available from IEEE.pp. 18-18
ISSRE 2020 Doctoral Symposium CommitteesFreely available from IEEE.pp. 19-19
ISSRE 2020 Doctoral Symposium Keynote: How to Get Your Paper RejectedFull-text access may be available. Sign in or learn about subscription options.pp. xxvi-xxvii
Message from the Fast Abstracts Track ChairsFreely available from IEEE.pp. 22-22
Fast Abstracts Track CommitteesFreely available from IEEE.pp. 23-23
Message from the GAUSS 2020 Workshop ChairsFreely available from IEEE.pp. 24-25
GAUSS 2020 Workshop CommitteesFreely available from IEEE.pp. 26-26
Testing and Debugging Autonomous Driving: Experiences with Path Planner and Future ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. xxxiii-xxxiv
Message from the WoSAR 2020 Workshop ChairsFreely available from IEEE.pp. 29-29
WoSAR 2020 Workshop CommitteesFreely available from IEEE.pp. 30-31
WoSAR 2020 Workshop KeynotesFreely available from IEEE.pp. 32-34
Message from the RSDA 2020 Workshop ChairsFreely available from IEEE.pp. 35-35
RSDA 2020 Workshop CommitteesFreely available from IEEE.pp. 36-36
RSDA 2020 Workshop KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. 37-37
Message from the WoSoCer 2020 Workshop ChairsFreely available from IEEE.pp. 38-38
WoSoCer 2020 Workshop CommitteesFreely available from IEEE.pp. 39-39
How do Ordinary Coding Errors Contribute to Security Vulnerabilities?Full-text access may be available. Sign in or learn about subscription options.pp. xlvi-xlvi
Message from the SHIFT + IWSF 2020 Workshop ChairsFreely available from IEEE.pp. 41-42
SHIFT + IWSF 2020 Workshop CommitteesFreely available from IEEE.pp. 43-43
Fuzzing C++ class interfaces for generating and running tests with libFuzzerFull-text access may be available. Sign in or learn about subscription options.pp. l-lii
K-Detector: Identifying Duplicate Crash Failures in Large-Scale Software DeliveryFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
ADF2T: an Active Disk Failure Forecasting and Tolerance SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
When Failure is (Not) an Option: Reliability Models for Microservices ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
Applying Modular Decomposition in SimulinkFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Using Semantic Analysis and Graph Mining Approaches to Support Software Fault FixationFull-text access may be available. Sign in or learn about subscription options.pp. 43-48
A Human Error Based Approach to Understanding Programmer-Induced Software VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 49-54
Independent Verification and Validation for the Space Industry: Guide Evolution ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 55-60
A Process to Support Safety Analysis for a System-of-SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 61-66
Static and Verifiable Memory Partitioning for Safety-Critical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 79-84
RSX: Reproduction Scenario Extraction Technique for Business Application Workloads in DBMSFull-text access may be available. Sign in or learn about subscription options.pp. 91-96
ConstBin: A Tool for Automatic Fixing of Unreproducible BuildsFull-text access may be available. Sign in or learn about subscription options.pp. 97-102
An improved fuzzing approach based on adaptive random testingFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Challenges Faced with Application Performance Monitoring (APM) when Migrating to the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 153-154
Migrating Large Deep Learning Models to Serverless ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 111-116
eAPT: enhancing APT with a mirror site resolverFull-text access may be available. Sign in or learn about subscription options.pp. 117-122
Techniques and Tools for Advanced Software Vulnerability DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 123-126
Reliability Evaluation of ML systems, the oracle problemFull-text access may be available. Sign in or learn about subscription options.pp. 127-130
Improving the Security of Microservice Systems by Detecting and Tolerating IntrusionsFull-text access may be available. Sign in or learn about subscription options.pp. 131-134
Towards safety monitoring of ML-based perception tasks of autonomous systemsFull-text access may be available. Sign in or learn about subscription options.pp. 135-138
A Fault Localization and Debugging Support Framework driven by Bug Tracking DataFull-text access may be available. Sign in or learn about subscription options.pp. 139-142
Engineering Resilience: Predicting The Change Impact on Performance and Availability of Reconfigurable SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 143-146
Using Metamorphic Testing to Evaluate DNN Coverage CriteriaFull-text access may be available. Sign in or learn about subscription options.pp. 147-148
SIDE: Security-aware Integrated Development EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 149-150
Applying Machine Learning with Chaos EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 151-152
Multi-Language Web Vulnerability DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 153-154
Modelling CI/CD Pipeline Through Agent-Based SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 155-156
Automated Tool for Revising Masking MC/DC Test SuiteFull-text access may be available. Sign in or learn about subscription options.pp. 157-158
Test-First for Abstracted Behavior of Software Using Extended Finite State MachineFull-text access may be available. Sign in or learn about subscription options.pp. 159-160
Model-based Quantitative Fault Tree Analysis based on FIDES Reliability PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 161-162
Unit Lemmas for Detecting Requirement and Specification FlawsFull-text access may be available. Sign in or learn about subscription options.pp. 163-164
TDABD: Test-Driven-Assurance-Based DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 165-166
Should we “safely” handle the uncertainties at runtime? - A rather seldom asked questionFull-text access may be available. Sign in or learn about subscription options.pp. 167-168
Similarity Calculation of Executable Using Intel Pin Instrumentation FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 169-170
Root cause prediction based on bug reportsFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
Multi-Level Execution Trace Based Lock Contention AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 177-182
AHPCap: A Framework for Automated Hardware Profiling and Capture of Mobile Application StatesFull-text access may be available. Sign in or learn about subscription options.pp. 183-188
Domain Metric Driven Decomposition of Data-Intensive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 189-196
Towards the synthesis of context-aware choreographiesFull-text access may be available. Sign in or learn about subscription options.pp. 197-200
Towards Anomaly Detectors that Learn ContinuouslyFull-text access may be available. Sign in or learn about subscription options.pp. 201-208
Declarative Dashboard GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 215-218
A Reconfiguration Approach for Open Adaptive Systems-of-SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 219-222
Towards Declarative Decentralised Application Management in the FogFull-text access may be available. Sign in or learn about subscription options.pp. 223-230
Vulnerability Analysis as Trustworthiness Evidence in Security Benchmarking: A Case Study on XenFull-text access may be available. Sign in or learn about subscription options.pp. 231-236
Evaluating the Accuracy of Password Strength Meters using Off-The-Shelf Guessing AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
EARNEST: A challenge-based intrusion prevention system for CAN messagesFull-text access may be available. Sign in or learn about subscription options.pp. 243-248
A flexible simulation-based framework for model-based/data-driven dependability evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 261-266
Ensuring Dataset Quality for Machine Learning CertificationFull-text access may be available. Sign in or learn about subscription options.pp. 275-282
New Wine in an Old Bottle: N-Version Programming for Machine Learning ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 283-286
Towards Automated Evidence Generation for Rapid and Continuous Software CertificationFull-text access may be available. Sign in or learn about subscription options.pp. 287-294
Safety-Critical Software - Quantification of Test ResultsFull-text access may be available. Sign in or learn about subscription options.pp. 303-310
Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended AbstractFull-text access may be available. Sign in or learn about subscription options.pp. 319-320
Chapter 3: Software Rejuvenation: Key Concepts and GranularityFull-text access may be available. Sign in or learn about subscription options.pp. 321-322
SAR Handbook Chapter: Measurements-based aging analysisFull-text access may be available. Sign in or learn about subscription options.pp. 323-324
Markov chains and Petri nets for software rejuvenation systemsFull-text access may be available. Sign in or learn about subscription options.pp. 325-326
SAR Handbook Chapter: Experimental Tools for Software Aging AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-1
Detecting Struct Member-Related Memory Leaks Using Error Code Analysis in Linux KernelFull-text access may be available. Sign in or learn about subscription options.pp. 329-335
How Robust is the Optimal Software Rejuvenation Timing?Full-text access may be available. Sign in or learn about subscription options.pp. 336-341
Software Aging in Image Classification Systems on Cloud and EdgeFull-text access may be available. Sign in or learn about subscription options.pp. 342-348
Author IndexFreely available from IEEE.pp. 349-351
Showing 99 out of 99