ACM SIGSOFT Intl. Symposium on Software Testing and Analysis, ISSTA 2015


The information below was collected semi-automatically. The authors have not yet been given the opportunity to verify the data.
[?] We ask all authors to verify the information we have about their papers, in particular the location of any supporting artifacts. We send out emails to authors asking them to update or verify this information incrementally, one conference at a time. For conferences where these emails have yet to be sent out we present the information in gray text.
Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Systematic execution of Android test suites in adverse conditions

Christoffer Quist Adamsen, Gianluca Mezzetti, Anders Møller

Systematic execution of Android test suites in adverse conditions

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Proactive detection of inadequate diagnostic messages for software configuration errors

Sai Zhang, Michael D. Ernst

Proactive detection of inadequate diagnostic messages for software configuration errors

Details
Discussion Comments: 0
Verification: Authors have not verified information

ConcBugAssist: constraint solving for diagnosis and repair of concurrency bugs

Sepideh Khoshnood, Markus Kusano, Chao Wang

ConcBugAssist: constraint solving for diagnosis and repair of concurrency bugs

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Reliability assessment for distributed systems via communication abstraction and refinement

Lin Gui, Jun Sun, Yang Liu, Jin Song Dong

Reliability assessment for distributed systems via communication abstraction and refinement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimizing selection of competing features via feedback-directed evolutionary algorithms

Tian Huat Tan, Yinxing Xue, Manman Chen, Jun Sun, Yang Liu, Jin Song Dong

Optimizing selection of competing features via feedback-directed evolutionary algorithms

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Automating performance bottleneck detection using search-based application profiling

Du Shen, Qi Luo, Denys Poshyvanyk, Mark Grechanik

Automating performance bottleneck detection using search-based application profiling

Details
Discussion Comments: 0
Verification: Authors have not verified information

When truth is efficient: analysing concurrency

Ganesh Narayanaswamy

When truth is efficient: analysing concurrency

Details
Discussion Comments: 0
Verification: Author has not verified information

Making your crashes work for you (doctoral symposium)

Peter Ohmann

Making your crashes work for you (doctoral symposium)

Details
Discussion Comments: 0
Verification: Author has not verified information

Scalable and precise taint analysis for Android

Wei Huang, Yao Dong, Ana Milanova, Julian Dolby

Scalable and precise taint analysis for Android

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Cost-aware combinatorial interaction testing (doctoral symposium)

Gülsen Demiröz

Cost-aware combinatorial interaction testing (doctoral symposium)

Details
Discussion Comments: 0
Verification: Author has not verified information

Collaborative testing across shared software components (doctoral symposium)

Teng Long

Collaborative testing across shared software components (doctoral symposium)

Details
Discussion Comments: 0
Verification: Author has not verified information

Calculation coverage testing in scientific applications

Yoshiki Sato, Shumpei Hozumi, Shigeru Chiba

Calculation coverage testing in scientific applications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Reusing constraint proofs in program analysis

Andrea Aquino, Francesco A. Bianchi, Meixian Chen, Giovanni Denaro, Mauro Pezzè

Reusing constraint proofs in program analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic detection of inter-application communication vulnerabilities in Android

Roee Hay, Omer Tripp, Marco Pistoia

Dynamic detection of inter-application communication vulnerabilities in Android

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Scalable program analysis through proof caching (doctoral symposium)

Andrea Aquino

Scalable program analysis through proof caching (doctoral symposium)

Details
Discussion Comments: 0
Verification: Author has not verified information

TSTL: a language and tool for testing (demo)

Alex Groce, Jervis Pinto, Pooria Azimi, Pranjal Mittal

TSTL: a language and tool for testing (demo)

Details
Discussion Comments: 0
Verification: Authors have not verified information

RTCM: a natural language based, automated, and practical test case generation framework

Tao Yue, Shaukat Ali, Man Zhang

RTCM: a natural language based, automated, and practical test case generation framework

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatic generation of system test cases from use case specifications

Chunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand, Muhammad Zohaib Z. Iqbal

Automatic generation of system test cases from use case specifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

CanaryAdvisor: a statistical-based tool for canary testing (demo)

Alexander Tarvo, Peter F. Sweeney, Nick Mitchell, V. T. Rajan, Matthew Arnold, Ioana Baldini

CanaryAdvisor: a statistical-based tool for canary testing (demo)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical regression test selection with dynamic file dependencies

Milos Gligoric, Lamyaa Eloussi, Darko Marinov

Practical regression test selection with dynamic file dependencies

Details
Discussion Comments: 0
Verification: Authors have not verified information

Randomized stress-testing of link-time optimizers

Vu Le, Chengnian Sun, Zhendong Su

Randomized stress-testing of link-time optimizers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Feedback-controlled random test generation

Kohsuke Yatoh, Kazunori Sakamoto, Fuyuki Ishikawa, Shinichi Honiden

Feedback-controlled random test generation

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Enhancing reuse of constraint solutions to improve symbolic execution

Xiangyang Jia, Carlo Ghezzi, Shi Ying

Enhancing reuse of constraint solutions to improve symbolic execution

Details
Discussion Comments: 0
Verification: Authors have not verified information

Test-case generation for runtime analysis and vice versa: verification of aircraft separation assurance

Marko Dimjasevic, Dimitra Giannakopoulou

Test-case generation for runtime analysis and vice versa: verification of aircraft separation assurance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Preventing data errors with continuous testing

Kivanç Muslu, Yuriy Brun, Alexandra Meliou

Preventing data errors with continuous testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated unit test generation during software development: a controlled experiment and think-aloud observations

José Miguel Rojas, Gordon Fraser, Andrea Arcuri

Automated unit test generation during software development: a controlled experiment and think-aloud observations

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Empirical evaluation of pareto efficient multi-objective regression test case prioritisation

Michael G. Epitropakis, Shin Yoo, Mark Harman, Edmund K. Burke

Empirical evaluation of pareto efficient multi-objective regression test case prioritisation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Experience report: an empirical study of PHP security mechanism usage

Johannes Dahse, Thorsten Holz

Experience report: an empirical study of PHP security mechanism usage

Details
Discussion Comments: 0
Verification: Authors have not verified information

SAMC: a fast model checker for finding heisenbugs in distributed systems (demo)

Tanakorn Leesatapornwongsa, Haryadi S. Gunawi

SAMC: a fast model checker for finding heisenbugs in distributed systems (demo)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reliable testing: detecting state-polluting tests to prevent test dependency

Alex Gyori, August Shi, Farah Hariri, Darko Marinov

Reliable testing: detecting state-polluting tests to prevent test dependency

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detection and classification of malicious JavaScript via attack behavior modelling

Yinxing Xue, Junjie Wang, Yang Liu, Hao Xiao, Jun Sun, Mahinthan Chandramohan

Detection and classification of malicious JavaScript via attack behavior modelling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatic fault injection for driver robustness testing

Kai Cong, Li Lei, Zhenkun Yang, Fei Xie

Automatic fault injection for driver robustness testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated software transplantation

Earl T. Barr, Mark Harman, Yue Jia, Alexandru Marginean, Justyna Petke

Automated software transplantation

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

An analysis of patch plausibility and correctness for generate-and-validate patch generation systems

Zichao Qi, Fan Long, Sara Achour, Martin C. Rinard

An analysis of patch plausibility and correctness for generate-and-validate patch generation systems

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

WuKong: a scalable and accurate two-phase approach to Android app clone detection

Haoyu Wang, Yao Guo, Ziang Ma, Xiangqun Chen

WuKong: a scalable and accurate two-phase approach to Android app clone detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Evaluating the usefulness of IR-based fault localization techniques

Qianqian Wang, Chris Parnin, Alessandro Orso

Evaluating the usefulness of IR-based fault localization techniques

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pegasus: automatic barrier inference for stable multithreaded systems

Monika Dhok, Rashmi Mudduluru, Murali Krishna Ramanathan

Pegasus: automatic barrier inference for stable multithreaded systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic taint tracking for Java with phosphor (demo)

Jonathan Bell, Gail E. Kaiser

Dynamic taint tracking for Java with phosphor (demo)

Details
Discussion Comments: 0
Verification: Authors have not verified information

S-looper: automatic summarization for multipath string loops

Xiaofei Xie, Yang Liu, Wei Le, Xiaohong Li, Hongxu Chen

S-looper: automatic summarization for multipath string loops

Details
Discussion Comments: 0
Verification: Authors have not verified information

DLint: dynamically checking bad coding practices in JavaScript

Liang Gong, Michael Pradel, Manu Sridharan, Koushik Sen

DLint: dynamically checking bad coding practices in JavaScript

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE

Xiaoyin Wang, Lingming Zhang, Philip Tanofsky

Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mining change history for test-plan generation (doctoral symposium)

Thomas Rolfsnes

Mining change history for test-plan generation (doctoral symposium)

Details
Discussion Comments: 0
Verification: Author has not verified information

Modelgen: mining explicit information flow specifications from concrete executions

Lazaro Clapp, Saswat Anand, Alex Aiken

Modelgen: mining explicit information flow specifications from concrete executions

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

BrowserAudit: automated testing of browser security features

Charlie Hothersall-Thomas, Sergio Maffeis, Chris Novakovic

BrowserAudit: automated testing of browser security features

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information