ACM SIGSOFT Intl. Symposium on Software Testing and Analysis, ISSTA 2018


The information below was collected semi-automatically. The authors have not yet been given the opportunity to verify the data.
[?] We ask all authors to verify the information we have about their papers, in particular the location of any supporting artifacts. We send out emails to authors asking them to update or verify this information incrementally, one conference at a time. For conferences where these emails have yet to be sent out we present the information in gray text.
Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Eliminating timing side-channel leaks using program repair

Meng Wu, Shengjian Guo, Patrick Schaumont, Chao Wang

Eliminating timing side-channel leaks using program repair

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

OASIs: oracle assessment and improvement tool

Gunel Jahangirova, David Clark, Mark Harman, Paolo Tonella

OASIs: oracle assessment and improvement tool

Details
Discussion Comments: 0
Verification: Authors have not verified information

Advances in the ANaConDA framework for dynamic analysis and testing of concurrent C/C++ programs

Jan Fiedor, Monika Muzikovská, Ales Smrcka, Ondrej Vasícek, Tomás Vojnar

Advances in the ANaConDA framework for dynamic analysis and testing of concurrent C/C++ programs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bench4BL: reproducibility study on the performance of IR-based bug localization

Jaekwon Lee, Dongsun Kim, Tegawendé F. Bissyandé, Woosung Jung, Yves Le Traon

Bench4BL: reproducibility study on the performance of IR-based bug localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Shooting from the heap: ultra-scalable static analysis with heap snapshots

Neville Grech, George Fourtounis, Adrian Francalanza, Yannis Smaragdakis

Shooting from the heap: ultra-scalable static analysis with heap snapshots

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Compiler fuzzing through deep learning

Chris Cummins, Pavlos Petoumenos, Alastair Murray, Hugh Leather

Compiler fuzzing through deep learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Shaping program repair space with existing patches and similar code

Jiajun Jiang, Yingfei Xiong, Hongyu Zhang, Qing Gao, Xiangqun Chen

Shaping program repair space with existing patches and similar code

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Tests from traces: automated unit test extraction for R

Filip Krikava, Jan Vitek

Tests from traces: automated unit test extraction for R

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

PerfFuzz: automatically generating pathological inputs

Caroline Lemieux, Rohan Padhye, Koushik Sen, Dawn Song

PerfFuzz: automatically generating pathological inputs

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical study on TensorFlow program bugs

Yuhao Zhang, Yifan Chen, Shing-Chi Cheung, Yingfei Xiong, Lu Zhang

An empirical study on TensorFlow program bugs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Making data-driven porting decisions with Tuscan

Kareem Khazem, Earl T. Barr, Petr Hosek

Making data-driven porting decisions with Tuscan

Details
Discussion Comments: 0
Verification: Authors have not verified information

Safe and sound program analysis with Flix

Magnus Madsen, Ondrej Lhoták

Safe and sound program analysis with Flix

Details
Discussion Comments: 0
Verification: Authors have not verified information

Symbolic path cost analysis for side-channel detection

Tegan Brennan, Seemanta Saha, Tevfik Bultan, Corina S. Pasareanu

Symbolic path cost analysis for side-channel detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Repositioning of static analysis alarms

Tukaram Muske, Rohith Talluri, Alexander Serebrenik

Repositioning of static analysis alarms

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Remove RATs from your code: automated optimization of resource inefficient database writes for mobile applications

Yingjun Lyu, Ding Li, William G. J. Halfond

Remove RATs from your code: automated optimization of resource inefficient database writes for mobile applications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Test case prioritization for acceptance testing of cyber physical systems: a multi-objective search-based approach

Seung Yeob Shin, Shiva Nejati, Mehrdad Sabetzadeh, Lionel C. Briand, Frank Zimmer

Test case prioritization for acceptance testing of cyber physical systems: a multi-objective search-based approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical detection of concurrency issues at coding time

Luc Bläser

Practical detection of concurrency issues at coding time

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Author has not verified information

Exploiting community structure for floating-point precision tuning

Hui Guo, Cindy Rubio-González

Exploiting community structure for floating-point precision tuning

Details
Discussion Comments: 0
Verification: Authors have not verified information

CiD: automating the detection of API-related compatibility issues in Android apps

Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein

CiD: automating the detection of API-related compatibility issues in Android apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Search-based detection of deviation failures in the migration of legacy spreadsheet applications

Mohammad Moein Almasi, Hadi Hemmati, Gordon Fraser, Phil McMinn, Janis Benefelds

Search-based detection of deviation failures in the migration of legacy spreadsheet applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatically translating bug reports into test cases for mobile apps

Mattia Fazzini, Martin Prammer, Marcelo d'Amorim, Alessandro Orso

Automatically translating bug reports into test cases for mobile apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Badger: complexity analysis with fuzzing and symbolic execution

Yannic Noller, Rody Kersten, Corina S. Pasareanu

Badger: complexity analysis with fuzzing and symbolic execution

Details
Discussion Comments: 0
Verification: Authors have not verified information

piCoq: parallel regression proving for large-scale verification projects

Karl Palmskog, Ahmet Çelik, Milos Gligoric

piCoq: parallel regression proving for large-scale verification projects

Details
Discussion Comments: 0
Verification: Authors have not verified information

LAND: a user-friendly and customizable test generation tool for Android apps

Jiwei Yan, Linjie Pan, Yaqi Li, Jun Yan, Jian Zhang

LAND: a user-friendly and customizable test generation tool for Android apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mutode: generic JavaScript and Node.js mutation testing tool

Diego Rodríguez-Baquero, Mario Linares Vásquez

Mutode: generic JavaScript and Node.js mutation testing tool

Details
Discussion Comments: 0
Verification: Authors have not verified information

Test input generation with Java PathFinder: then and now (invited talk abstract)

Sarfraz Khurshid, Corina S. Pasareanu, Willem Visser

Test input generation with Java PathFinder: then and now (invited talk abstract)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analyzing the analyzers: FlowDroid/IccTA, AmanDroid, and DroidSafe

Lina Qiu, Yingying Wang, Julia Rubin

Analyzing the analyzers: FlowDroid/IccTA, AmanDroid, and DroidSafe

Details
Discussion Comments: 0
Verification: Authors have not verified information

Evaluating test-suite reduction in real software evolution

August Shi, Alex Gyori, Suleman Mahmood, Peiyuan Zhao, Darko Marinov

Evaluating test-suite reduction in real software evolution

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lightweight verification of array indexing

Martin Kellogg, Vlastimil Dort, Suzanne Millstein, Michael D. Ernst

Lightweight verification of array indexing

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Automated test mapping and coverage for network topologies

Per Erik Strandberg, Thomas J. Ostrand, Elaine J. Weyuker, Daniel Sundmark, Wasif Afzal

Automated test mapping and coverage for network topologies

Details
Discussion Comments: 0
Verification: Authors have not verified information

Test migration for efficient large-scale assessment of mobile app coding assignments

Farnaz Behrang, Alessandro Orso

Test migration for efficient large-scale assessment of mobile app coding assignments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Managing concurrent testing of data race with ComRaDe

Jian Gao, Xin Yang, Yu Jiang, Han Liu, Weiliang Ying, Wanting Sun, Ming Gu

Managing concurrent testing of data race with ComRaDe

Details
Discussion Comments: 0
Verification: Authors have not verified information

Comparing developer-provided to user-provided tests for fault localization and automated program repair

René Just, Chris Parnin, Ian Drosos, Michael D. Ernst

Comparing developer-provided to user-provided tests for fault localization and automated program repair

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Static analysis of Java dynamic proxies

George Fourtounis, George Kastrinis, Yannis Smaragdakis

Static analysis of Java dynamic proxies

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Identifying implementation bugs in machine learning based image classifiers using metamorphic testing

Anurag Dwarakanath, Manish Ahuja, Samarth Sikand, Raghotham M. Rao, R. P. Jagadeesh Chandra Bose, Neville Dubash, Sanjay Podder

Identifying implementation bugs in machine learning based image classifiers using metamorphic testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

MalViz: an interactive visualization tool for tracing malware

Vinh The Nguyen, Akbar Siami Namin, Tommy Dang

MalViz: an interactive visualization tool for tracing malware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deep specification mining

Tien-Duy B. Le, David Lo

Deep specification mining

Details
Discussion Comments: 0
Verification: Authors have not verified information

Translating code comments to procedure specifications

Arianna Blasi, Alberto Goffi, Konstantin Kuznetsov, Alessandra Gorla, Michael D. Ernst, Mauro Pezzè, Sergio Delgado Castellanos

Translating code comments to procedure specifications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information