Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Detecting and understanding real-world differential performance bugs in machine learning libraries
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 189–199https://doi.org/10.1145/3395363.3404540Programming errors that degrade the performance of systems are widespread, yet there is very little tool support for finding and diagnosing these bugs. We present a method and a tool based on differential performance analysis---we find inputs for which ...
- short-paperJuly 2020
Test recommendation system based on slicing coverage filtering
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 573–576https://doi.org/10.1145/3395363.3404370Software testing plays a crucial role in software lifecycle. As a basic approach of software testing, unit testing is one of the necessary skills for software practitioners. Since testers are required to understand the inner code of the software under ...
- short-paperJuly 2020
ProFL: a fault localization framework for Prolog
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 561–564https://doi.org/10.1145/3395363.3404367Prolog is a declarative, first-order logic that has been used in a variety of domains to implement heavily rules-based systems. However, it is challenging to write a Prolog program correctly. Fortunately, the SWI-Prolog environment supports a unit ...
- short-paperJuly 2020
Echidna: effective, usable, and fast fuzzing for smart contracts
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 557–560https://doi.org/10.1145/3395363.3404366Ethereum smart contracts---autonomous programs that run on a blockchain---often control transactions of financial and intellectual property. Because of the critical role they play, smart contracts need complete, comprehensive, and effective test ...
- short-paperJuly 2020
TauJud: test augmentation of machine learning in judicial documents
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 549–552https://doi.org/10.1145/3395363.3404364The booming of big data makes the adoption of machine learning ubiquitous in the legal field. As we all know, a large amount of test data can better reflect the performance of the model, so the test data must be naturally expanded. In order to solve the ...
-
- short-paperJuly 2020
Crowdsourced requirements generation for automatic testing via knowledge graph
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 545–548https://doi.org/10.1145/3395363.3404363Crowdsourced testing provides an effective way to deal with the problem of Android system fragmentation, as well as the application scenario diversity faced by Android testing. The generation of test requirements is a significant part of crowdsourced ...
- short-paperJuly 2020
ObjSim: lightweight automatic patch prioritization via object similarity
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 541–544https://doi.org/10.1145/3395363.3404362In the context of test case based automatic program repair (APR), patches that pass all the test cases but fail to fix the bug are called overfitted patches. Currently, patches generated by APR tools get inspected manually by the users to find and adopt ...
- research-articleJuly 2020
Automatic support for the identification of infeasible testing requirements
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 587–591https://doi.org/10.1145/3395363.3402646Software testing activity is imperative to improve software quality. However, finding a set of test cases satisfies a given test criterion, is not a trivial task because the overall input domain is very large, and different test sets can be derived, ...
- research-articleJuly 2020
Automated mobile apps testing from visual perspective
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 577–581https://doi.org/10.1145/3395363.3402644The current implementation of automated mobile apps testing generally relies on internal program information, such as reading code or GUI layout files, capturing event streams. This paper proposes an approach of automated mobile apps testing from a ...
- research-articleJuly 2020
Escaping dependency hell: finding build dependency errors with the unified dependency graph
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 463–474https://doi.org/10.1145/3395363.3397388Modern software projects rely on build systems and build scripts to assemble executable artifacts correctly and efficiently. However, developing build scripts is error-prone. Dependency-related errors in build scripts, mainly including missing ...
- research-articleJuly 2020
Feasible and stressful trajectory generation for mobile robots
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 349–362https://doi.org/10.1145/3395363.3397387While executing nominal tests on mobile robots is required for their validation, such tests may overlook faults that arise under trajectories that accentuate certain aspects of the robot's behavior. Uncovering such stressful trajectories is challenging ...
- research-articleJuly 2020
Learning to detect table clones in spreadsheets
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 528–540https://doi.org/10.1145/3395363.3397384In order to speed up spreadsheet development productivity, end users can create a spreadsheet table by copying and modifying an existing one. These two tables share the similar computational semantics, and form a table clone. End users may modify the ...
- research-articleJuly 2020
Empirically revisiting and enhancing IR-based test-case prioritization
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 324–336https://doi.org/10.1145/3395363.3397383Test-case prioritization (TCP) aims to detect regression bugs faster via reordering the tests run. While TCP has been studied for over 20 years, it was almost always evaluated using seeded faults/mutants as opposed to using real test failures. In this ...
- research-articleJuly 2020
Testing high performance numerical simulation programs: experience, lessons learned, and open issues
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 502–515https://doi.org/10.1145/3395363.3397382High performance numerical simulation programs are widely used to simulate actual physical processes on high performance computers for the analysis of various physical and engineering problems. They are usually regarded as non-testable due to their high ...
- research-articleJuly 2020
Discovering discrepancies in numerical libraries
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 488–501https://doi.org/10.1145/3395363.3397380Numerical libraries constitute the building blocks for software applications that perform numerical calculations. Thus, it is paramount that such libraries provide accurate and consistent results. To that end, this paper addresses the problem of finding ...
- research-articleJuly 2020
Data loss detector: automatically revealing data loss bugs in Android apps
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 141–152https://doi.org/10.1145/3395363.3397379Android apps must work correctly even if their execution is interrupted by external events. For instance, an app must work properly even if a phone call is received, or after its layout is redrawn because the smartphone has been rotated. Since these ...
- research-articleJuly 2020
DeepSQLi: deep semantic learning for testing SQL injection
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 286–297https://doi.org/10.1145/3395363.3397375Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from ...
- research-articleJuly 2020
Differential regression testing for REST APIs
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 312–323https://doi.org/10.1145/3395363.3397374Cloud services are programmatically accessed through REST APIs. Since REST APIs are constantly evolving, an important problem is how to prevent breaking changes of APIs, while supporting several different versions. To find such breaking changes in an ...
- research-articleJuly 2020
WEIZZ: automatic grey-box fuzzing for structured binary formats
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1–13https://doi.org/10.1145/3395363.3397372Fuzzing technologies have evolved at a fast pace in recent years, revealing bugs in programs with ever increasing depth and speed. Applications working with complex formats are however more difficult to take on, as inputs need to meet certain format-...
How far we have come: testing decompilation correctness of C decompilers
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 475–487https://doi.org/10.1145/3395363.3397370A C decompiler converts an executable (the output from a C compiler) into source code. The recovered C source code, once recompiled, will produce an executable with the same functionality as the original executable. With over twenty years of development,...