Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-030-99429-7guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Fundamental Approaches to Software Engineering: 25th International Conference, FASE 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings
2022 Proceeding
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
International Conference on Fundamental Approaches to Software EngineeringMunich, Germany4 April 2022
ISBN:
978-3-030-99428-0
Published:
04 April 2022

Reflects downloads up to 15 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
front-matter
Open Access
Front Matter
Pages i–xiv
back-matter
Open Access
Back Matter
Article
Open Access
Front Matter
Page 1
Article
Open Access
Information-flow Interfaces
Abstract

Contract-based design is a promising methodology for taming the complexity of developing sophisticated systems. A formal contract distinguishes between assumptions, which are constraints that the designer of a component puts on the environments in ...

Article
Open Access
A Survey-driven Feature Model for Software Traceability Approaches
Abstract

Traceability is the capability to represent, understand and analyze the relationships between software artefacts. Traceability is at the core of many software engineering activities. This is a blessing in disguise as traceability research is ...

Article
Open Access
Construction of Verifier Combinations Based on Off-the-Shelf Verifiers
Abstract

Software verifiers have different strengths and weaknesses, depending on properties of the verification task. It is well-known that combinations of verifiers via portfolio and selection approaches can help to combine the strengths. In this paper, ...

Article
Open Access
On the Detection of Doped Software by Falsification
Abstract

Software doping is a phenomenon that refers to the presence of hidden software functionality, whose existence is only in the interest of the manufacturer. The most prominent example is the diesel emissions scandal. There is a need for methods that ...

Article
Open Access
Estimating Worst-case Resource Usage by Resource-usage-aware Fuzzing
Abstract

Worst-case resource usage provides a useful guidance in the design, configuration and deployment of software, especially when it runs under a context with limited amount of resources. Static resource-bound analysis can provide sound upper bounds ...

Article
Open Access
Quantitative Program Sketching using Lifted Static Analysis
Abstract

We present a novel approach for resolving numerical program sketches under Boolean and quantitative objectives. The input is a program sketch, which represents a partial program with missing numerical parameters (holes). The aim is to ...

Article
Open Access
SixthSense: Debugging Convergence Problems in Probabilistic Programs via Program Representation Learning
Abstract

Probabilistic programming aims to open the power of Bayesian reasoning to software developers and scientists, but identification of problems during inference and debugging are left entirely to the developers and typically require significant ...

Article
Open Access
Finding Semantic Bugs Fast
Abstract

Finding semantic bugs in code is difficult and requires precious expert time. Lacking comprehensive formal specifications, deductive verification is not an option. We propose an incremental specification procedure: With the help of automatic ...

Article
Open Access
SMC4PEP: Stochastic Model Checking of Product Engineering Processes
Abstract

Product Engineering Processes (PEPs) are used for describing complex product developments in big enterprises such as automotive and avionics industries. The Business Process Model Notation (BPMN) is a widely used language to encode interactions ...

Article
Open Access
Symbolic Predictive Cache Analysis for Out-of-Order Execution
Abstract

We propose a trace-based symbolic method for analyzing cache side channels of a program under a CPU-level optimization called out-of-order execution (OOE). The method is predictive in that it takes the in-order execution trace as input and then ...

Article
Open Access
PEQtest: Testing Functional Equivalence
Abstract

Refactoring a program without changing the program’s functional behavior is challenging. To prevent that behavioral changes remain undetected, one may apply approaches that compare the functional behavior of original and refactored programs. ...

Article
Open Access
An Institutional Approach to Communicating UML State Machines
Abstract

We present a new approach on how to provide institution-based semantics for communicating UML state machines in form of a hybrid modal logic MD. A theoroidal comorphism maps MD into the CASL institution. This allows for symbolic reasoning on ...

Article
Open Access
Semantic Code Search in Software Repositories using Neural Machine Translation
Abstract

Nowadays, software development is accelerated through the reuse of code snippets found online in question-answering platforms and software repositories. In order to be efficient, this process requires forming an appropriate query and identifying ...

Article
Open Access
AequeVox: Automated Fairness Testing of Speech Recognition Systems
Abstract

Automatic Speech Recognition (ASR) systems have become ubiquitous. They can be found in a variety of form factors and are increasingly important in our daily lives. As such, ensuring that these systems are equitable to different subgroups of the ...

Article
Open Access
SMT-Based Planning Synthesis for Distributed System Reconfigurations
Abstract

Large distributed systems with an emphasis on adaptability are now considered a necessity in many domains, yet reconfiguration of these systems is still largely carried out in an ad hoc fashion, a process that is both inefficient and error-prone. ...

Article
Open Access
Semantic Clone Detection via Probabilistic Software Modeling
Abstract

Semantic clone detection is the process of finding program elements with similar or equal runtime behavior. For example, detecting the semantic equality between the recursive and iterative implementation of the factorial computation. Semantic ...

Article
Open Access
QMaxUSE: A Query-based Verification Tool for UML Class Diagrams with OCL Invariants
Abstract

Verifying whether a UML class diagram annotated with Object Constraint Language (OCL) constraints is consistent involves finding valid instances that provably meet its structural and OCL constraints. Recently, many tools and techniques have been ...

Article
Open Access
Front Matter
Page 319
Article
Open Access
Advances in Automatic Software Testing: Test-Comp 2022
Abstract

Test-Comp 2022 is the 4th edition of the Competition on Software Testing. Research competitions are a means to provide annual comparative evaluations. Test-Comp focusses on fully automatic software test generators for C programs. The results of ...

Article
Open Access
FuSeBMC v4: Smart Seed Generation for Hybrid Fuzzing: (Competition Contribution)
Abstract

FuSeBMC is a test generator for finding security vulnerabilities in C programs. In Test-Comp 2021, we described a previous version that incrementally injected labels to guide Bounded Model Checking (BMC) and Evolutionary Fuzzing engines to produce ...

Article
Open Access
VeriFuzz: Good Seeds for Fuzzing (Competition Contribution)
Abstract

We present VeriFuzz 1.2 with two new enhancements: (1) unroll the given program to a short depth and use BMC to produce incomplete test inputs, which are extended into complete inputs, and (2) if BMC fails for this short unrolling, automatically ...

Contributors
  • University of Oslo
  • Johannes Kepler University Linz

Index Terms

  1. Fundamental Approaches to Software Engineering: 25th International Conference, FASE 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings
          Index terms have been assigned to the content through auto-classification.

          Recommendations