Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISSREW
ISSREW 2020
Generate Citations
2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
Oct. 12 2020 to Oct. 15 2020
Coimbra, Portugal
ISBN: 978-1-7281-7735-9
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 2-2
Copyright Page
Freely available from IEEE.
pp. 3-3
Table of Contents
Freely available from IEEE.
pp. 4-13
Message from the General Chairs
Freely available from IEEE.
pp. 14-15
Message from the Industry Track Chairs
Freely available from IEEE.
pp. 16-16
ISSRE Industry Track Committees
Freely available from IEEE.
pp. 17-17
Message from the Doctoral Symposium Chairs
Freely available from IEEE.
pp. 18-18
ISSRE 2020 Doctoral Symposium Committees
Freely available from IEEE.
pp. 19-19
ISSRE 2020 Doctoral Symposium Keynote: How to Get Your Paper Rejected
Full-text access may be available. Sign in or learn about subscription options.
pp. xxvi-xxvii
by
Jeff Offutt
Message from the Fast Abstracts Track Chairs
Freely available from IEEE.
pp. 22-22
Fast Abstracts Track Committees
Freely available from IEEE.
pp. 23-23
Message from the GAUSS 2020 Workshop Chairs
Freely available from IEEE.
pp. 24-25
GAUSS 2020 Workshop Committees
Freely available from IEEE.
pp. 26-26
Testing and Debugging Autonomous Driving: Experiences with Path Planner and Future Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. xxxiii-xxxiv
by
Fuyuki Ishikawa
Message from the WoSAR 2020 Workshop Chairs
Freely available from IEEE.
pp. 29-29
WoSAR 2020 Workshop Committees
Freely available from IEEE.
pp. 30-31
WoSAR 2020 Workshop Keynotes
Freely available from IEEE.
pp. 32-34
Message from the RSDA 2020 Workshop Chairs
Freely available from IEEE.
pp. 35-35
RSDA 2020 Workshop Committees
Freely available from IEEE.
pp. 36-36
RSDA 2020 Workshop Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-37
Message from the WoSoCer 2020 Workshop Chairs
Freely available from IEEE.
pp. 38-38
WoSoCer 2020 Workshop Committees
Freely available from IEEE.
pp. 39-39
How do Ordinary Coding Errors Contribute to Security Vulnerabilities?
Full-text access may be available. Sign in or learn about subscription options.
pp. xlvi-xlvi
by
D. Richard Kuhn
Message from the SHIFT + IWSF 2020 Workshop Chairs
Freely available from IEEE.
pp. 41-42
SHIFT + IWSF 2020 Workshop Committees
Freely available from IEEE.
pp. 43-43
Fuzzing C++ class interfaces for generating and running tests with libFuzzer
Full-text access may be available. Sign in or learn about subscription options.
pp. l-lii
by
Zoltan Porkolab
K-Detector: Identifying Duplicate Crash Failures in Large-Scale Software Delivery
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Hao Yang
,
Yang Xu
,
Yong Li
,
Hyun-Deok Choi
BP-IDS: Using business process specification to leverage intrusion detection in critical infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
João Lima
,
Filipe Apolinário
,
Nelson Escravana
,
Carlos Ribeiro
ADF2T: an Active Disk Failure Forecasting and Tolerance Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Hongzhang Yang
,
Yahui Yang
,
Zhengguang Chen
,
Zongzhao Li
,
Yaofeng Tu
When Failure is (Not) an Option: Reliability Models for Microservices Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Lalita J. Jagadeesan
,
Veena B. Mendiratta
CRESCO Framework and Checker: Automatic generation of Reflective UML State Machine’s C++ Code and Checker
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-30
by
Miren Illarramendi
,
Leire Etxeberria
,
Felix Larrinaga
,
Goiuria Sagardui
Applying Modular Decomposition in Simulink
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Monika Jaskolka
,
Stephen Scott
,
Vera Pantelic
,
Alan Wassyng
,
Mark Lawford
Multi-label Classification of Commit Messages using Transfer Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-42
by
Muhammad Usman Sarwar
,
Sarim Zafar
,
Mohamed Wiem Mkaouer
,
Gursimran Singh Walia
,
Muhammad Zubair Malik
Using Semantic Analysis and Graph Mining Approaches to Support Software Fault Fixation
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-48
by
Maninder Singh
,
Gursimran S. Walia
A Human Error Based Approach to Understanding Programmer-Induced Software Vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-54
by
Vaibhav Anu
,
Kazi Zakia Sultana
,
Bharath K. Samanthula
Independent Verification and Validation for the Space Industry: Guide Evolution Experience
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-60
by
Nuno Silva
,
Xavier Ferreira
,
Jesper Troelsen
,
Tomasz Kacmajor
A Process to Support Safety Analysis for a System-of-Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-66
by
Stephan Baumgart
,
Joakim Fröberg
,
Sasikumar Punnekkat
Time-Series-Based Clustering for Failure Analysis in Hardware-in-the-Loop Setups: An Automotive Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-72
by
Claudius V. Jordan
,
Florian Hauer
,
Philipp Foth
,
Alexander Pretschner
Instrumenting Compiler Pipeline to Synthesise Traceable Runtime Memory Layouts in Mixed-critical Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-78
by
Nermin Kajtazović
,
Peter Hödl
,
Georg Macher
Static and Verifiable Memory Partitioning for Safety-Critical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-84
by
Jean Guyomarc’h
,
Jean-Baptiste Hervé
Systematic Software Testing of Critical Embedded Digital Devices in Nuclear Power Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-90
by
Athira Varma Jayakumar
,
Smitha Gautham
,
Richard Kuhn
,
Brandon Simons
,
Aidan Collins
,
Thomas Dirsch
,
Raghu Kacker
,
Carl Elks
RSX: Reproduction Scenario Extraction Technique for Business Application Workloads in DBMS
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-96
by
Seunghwan Baek
,
Jisoo Song
,
Changyun Seo
ConstBin: A Tool for Automatic Fixing of Unreproducible Builds
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-102
by
Hongjun He
,
Jicheng Cao
,
Lesheng Du
,
Hao Li
,
Shilong Wang
,
Shengyu Cheng
An improved fuzzing approach based on adaptive random testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-108
by
Jinfu Chen
,
Jingyi Chen
,
Dong Guo
,
Dave Towey
Challenges Faced with Application Performance Monitoring (APM) when Migrating to the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-154
by
Vidroha Debroy
,
Alireza Mansoori
,
James Haleblian
,
Mark Wilkens
Migrating Large Deep Learning Models to Serverless Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-116
by
Dheeraj Chahal
,
Ravi Ojha
,
Manju Ramesh
,
Rekha Singhal
eAPT: enhancing APT with a mirror site resolver
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-122
by
Gilhee Lee
,
Taegeun Moon
,
Min Jang
,
Hyoungshick Kim
Techniques and Tools for Advanced Software Vulnerability Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-126
by
José D’Abruzzo Pereira
Reliability Evaluation of ML systems, the oracle problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-130
by
Antonio Guerriero
Improving the Security of Microservice Systems by Detecting and Tolerating Intrusions
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-134
by
José Flora
Towards safety monitoring of ML-based perception tasks of autonomous systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-138
by
Raul S. Ferreira
A Fault Localization and Debugging Support Framework driven by Bug Tracking Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-142
by
Thomas Hirsch
Engineering Resilience: Predicting The Change Impact on Performance and Availability of Reconfigurable Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-146
by
Alireza Hakamian
Using Metamorphic Testing to Evaluate DNN Coverage Criteria
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-148
by
Jinyi Zhou
,
Kun Qiu
,
Zheng Zheng
,
Tsong Yueh Chen
,
Pak-Lok Poon
SIDE: Security-aware Integrated Development Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-150
by
Naghmeh Ivaki
,
Nuno Antunes
Applying Machine Learning with Chaos Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-152
by
Juan Hernández-Serrato
,
Alejandro Velasco
,
Yury Nifio
,
Mario Linares-Vásquez
Multi-Language Web Vulnerability Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-154
by
Alexandra Figueiredo
,
Tatjana Lide
,
Miguel Correia
Modelling CI/CD Pipeline Through Agent-Based Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-156
by
Qianying Liao
Automated Tool for Revising Masking MC/DC Test Suite
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-158
by
Chen Zhenxiang
,
Hironori Washizaki
,
Yoshiaki Fukazawa
Test-First for Abstracted Behavior of Software Using Extended Finite State Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-160
by
Tomohiko Takagi
,
Koichiro Sakata
Model-based Quantitative Fault Tree Analysis based on FIDES Reliability Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-162
by
Nataliya Yakymets
,
Morayo Adedjouma
Unit Lemmas for Detecting Requirement and Specification Flaws
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-164
by
Ashlie B. Hocking
,
Jonathan C. Rowanhill
,
Ben L. Di Vito
TDABD: Test-Driven-Assurance-Based Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-166
by
Jonathan C. Rowanhill
,
Ashlie B. Hocking
,
William Hawkins
Should we “safely” handle the uncertainties at runtime? - A rather seldom asked question
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-168
by
Nishanth Laxman
,
Peter Liggesmeyer
Similarity Calculation of Executable Using Intel Pin Instrumentation Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-170
by
Madhuparna Bhowmik
,
Madhumitha Nara
,
Biju R Mohan
Root cause prediction based on bug reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-176
by
Thomas Hirsch
,
Birgit Hofer
Multi-Level Execution Trace Based Lock Contention Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-182
by
Majid Rezazadeh
,
Naser Ezzati-Jivan
,
Evan Galea
,
Michel R. Dagenais
AHPCap: A Framework for Automated Hardware Profiling and Capture of Mobile Application States
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-188
by
Rodger William Byrd
,
Taniza Sultana
,
Kristen R. Walcott
Domain Metric Driven Decomposition of Data-Intensive Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-196
by
Matteo Camilli
,
Carmine Colarusso
,
Barbara Russo
,
Eugenio Zimeo
Towards the synthesis of context-aware choreographies
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-200
by
Gianluca Filippone
,
Marco Autili
,
Massimo Tivoli
Towards Anomaly Detectors that Learn Continuously
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-208
by
Andrea Stocco
,
Paolo Tonella
Standing on the Shoulders of Software Product Line Research for Testing Systems of Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-214
by
Antonia Bertolino
,
Francesca Lonetti
,
Vânia de Oliveira Neves
Declarative Dashboard Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-218
by
Alessandro Tundo
,
Chiara Castelnovo
,
Marco Mobilio
,
Oliviero Riganelli
,
Leonardo Mariani
A Reconfiguration Approach for Open Adaptive Systems-of-Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-222
by
Björn Wudka
,
Carsten Thomas
,
Lennart Siefke
,
Volker Sommer
Towards Declarative Decentralised Application Management in the Fog
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-230
by
Antonio Brogi
,
Stefano Forti
,
Carlos Guerrero
,
Isaac Lera
Vulnerability Analysis as Trustworthiness Evidence in Security Benchmarking: A Case Study on Xen
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-236
by
Charles F. Gonçalves
,
Nuno Antunes
Evaluating the Accuracy of Password Strength Meters using Off-The-Shelf Guessing Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-242
by
David Pereira
,
João F. Ferreira
,
Alexandra Mendes
EARNEST: A challenge-based intrusion prevention system for CAN messages
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-248
by
Gianpiero Costantino
,
Ilaria Matteucci
,
Domenico Morales
Considering Reliability of Deep Learning Function to Boost Data Suitability and Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-254
by
Lydia Gauerhof
,
Yuki Hagiwara
,
Christoph Schorn
,
Mario Trapp
Evaluating Deep Learning Classification Reliability in Android Malware Family Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-260
by
Giacomo Iadarola
,
Fabio Martinelli
,
Francesco Mercaldo
,
Antonella Santone
A flexible simulation-based framework for model-based/data-driven dependability evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-266
by
Carlo Abate
,
Lelio Campanile
,
Stefano Marrone
Resilience, Survivability, and Elasticity: A Taxonomy for Change Impact Quantification of Reconfigurable Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-274
by
Alireza Hakamian
,
Floriment Klinaku
,
André van Hoorn
,
Steffen Becker
Ensuring Dataset Quality for Machine Learning Certification
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-282
by
S. Picard
,
C. Chapdelaine
,
C. Cappi
,
L. Gardes
,
E. Jenn
,
B. Lefevre
,
T. Soumarmon
New Wine in an Old Bottle: N-Version Programming for Machine Learning Components
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-286
by
Arpan Gujarati
,
Sathish Gopalakrishnan
,
Karthik Pattabiraman
Towards Automated Evidence Generation for Rapid and Continuous Software Certification
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-294
by
Joanna C. S. Santos
,
Ali Shokri
,
Mehdi Mirakhorli
Checkable Safety Cases: Enabling Automated Consistency Checks between Safety Work Products
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-302
by
Carmen Cârlan
,
Daniel PetriŞor
,
Barbara Gallina
,
Hannes Schoenhaar
Safety-Critical Software - Quantification of Test Results
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-310
by
Johan Sundell
,
Kristina Lundqvist
,
Håkan Forsberg
Generating test cases to evaluate and improve processes of safety-critical systems development
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-318
by
Lilian Barros
,
Celso Hirata
,
Johnny Marques
,
Ana Maria Ambrosio
Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-320
by
Alberto Avritzer
,
Domenico Cotroneo
,
Yennun Huang
,
Kishor Trivedi
Chapter 3: Software Rejuvenation: Key Concepts and Granularity
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-322
by
Vasilis P. Koutras
,
Agapios N. Platis
SAR Handbook Chapter: Measurements-based aging analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-324
by
Javier Alonso
,
Kalyan Vaidyanathan
,
Roberto Pietrantuono
Markov chains and Petri nets for software rejuvenation systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-326
by
Fumio Machida
,
Paulo R. M. Maciel
Chapter 8: Software Aging Monitoring and Rejuvenation for the Assessment of High Availability Systems - Extended Abstract
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-327
by
Alberto Avritzer
,
Michael Grottke
,
Daniel Sadoc Menasché
SAR Handbook Chapter: Experimental Tools for Software Aging Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
Roberto Natella
,
Artur Andrzejak
Detecting Struct Member-Related Memory Leaks Using Error Code Analysis in Linux Kernel
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-335
by
Keita Suzuki
,
Takafumi Kubota
,
Kenji Kono
How Robust is the Optimal Software Rejuvenation Timing?
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Junjun Zheng
,
Hiroyuki Okamura
,
Tadashi Dohi
Software Aging in Image Classification Systems on Cloud and Edge
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-348
by
Ermeson Andrade
,
Fumio Machida
,
Roberto Pietrantuono
,
Domenico Cotroneo
Author Index
Freely available from IEEE.
pp. 349-351
Showing 99 out of 99