Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- invited-talkJuly 2019
From typestate verification to interpretable deep models (invited talk abstract)
ISSTA 2019: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 4–5https://doi.org/10.1145/3293882.3338992The paper ``Effective Typestate Verification in the Presence of Aliasing'' was published in the International Symposium on Software Testing and Analysis (ISSTA) 2006 Proceedings, and has now been selected to receive the ISSTA 2019 Retrospective Impact ...
- research-articleJuly 2019
A cost-effective strategy for software vulnerability prediction based on bellwether analysis
ISSTA 2019: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 424–427https://doi.org/10.1145/3293882.3338985Vulnerability Prediction Models (VPMs) aims to identify vulnerable and non-vulnerable components in large software systems. Consequently, VPMs presents three major drawbacks (i) finding an effective method to identify a representative set of features ...
- research-articleJuly 2019
DeepHunter: a coverage-guided fuzz testing framework for deep neural networks
- Xiaofei Xie,
- Lei Ma,
- Felix Juefei-Xu,
- Minhui Xue,
- Hongxu Chen,
- Yang Liu,
- Jianjun Zhao,
- Bo Li,
- Jianxiong Yin,
- Simon See
ISSTA 2019: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 146–157https://doi.org/10.1145/3293882.3330579The past decade has seen the great potential of applying deep neural network (DNN) based software to safety-critical scenarios, such as autonomous driving. Similar to traditional software, DNNs could exhibit incorrect behaviors, caused by hidden defects,...
Codebase-adaptive detection of security-relevant methods
ISSTA 2019: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 181–191https://doi.org/10.1145/3293882.3330556More and more companies use static analysis to perform regular code reviews to detect security vulnerabilities in their code, configuring them to detect various types of bugs and vulnerabilities such as the SANS top 25 or the OWASP top 10. For such ...