Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterMay 2018
Testing web-based applications with the <u>v</u>oice <u>c</u>ontrolled <u>a</u>ccessibility and <u>t</u>esting tool (VCAT)
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 208–209https://doi.org/10.1145/3183440.3195099Many web applications and software engineering tools such as test generators are not accessible for users who do not use traditional input devices such as mouse and keyboard. To address this shortcoming of current applications, this work leverages recent ...
- posterMay 2018
Beyond spatial and temporal memory safety
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 189–190https://doi.org/10.1145/3183440.3195090The unsafe features of C often lead to memory errors that can result in vulnerabilities. Dynamic analysis tools are widely used to detect such errors at runtime and enforce memory safety. It is widely believed that memory safety exactly consists of ...
- posterMay 2018
Efficiently finding minimal failing input in MapReduce programs
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 177–178https://doi.org/10.1145/3183440.3195084Debugging of distributed computing model programs like MapReduce is a difficult task. That's why prior studies only focus on finding and fixing bugs in early stages of program development. Delta debugging tries to find minimal failing input in sequential ...
- posterMay 2018
Deciding weak monitorability for runtime verification
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 163–164https://doi.org/10.1145/3183440.3195077An important problem in runtime verification is monitorability. If a property is not monitorable, then it is meaningless to check it at runtime, as no satisfaction or violation will be reported in finite steps. In this paper, we revisit the classic ...
- posterMay 2018
An initial characterization of bug-injecting development sessions
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 129–130https://doi.org/10.1145/3183440.3195069Even experienced developers rigorously testing their code and using state of the art tools and practices, inject every now and then bugs into the code. There is a huge amount of literature about the characterization of such bugs including the ...
-
- posterMay 2018
Defect prediction metrics for infrastructure as code scripts in DevOps
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 414–415https://doi.org/10.1145/3183440.3195034Use of infrastructure as code (IaC) scripts helps software teams manage their configuration and infrastructure automatically. Information technology (IT) organizations use IaC scripts to create and manage automated deployment pipelines to deliver ...
- posterMay 2018
Memory and resource leak defects in Java Projects: an empirical study
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 410–411https://doi.org/10.1145/3183440.3195032Despite many software engineering efforts and programming language support, resource and memory leaks remain a troublesome issue in managed languages such as Java. Understanding the properties of leak-related issues, such as their type distribution, how ...
- posterMay 2018
The buggy side of code refactoring: understanding the relationship between refactorings and bugs
- Isabella Ferreira,
- Eduardo Fernandes,
- Diego Cedrim,
- Anderson Uchôa,
- Ana Carla Bibiano,
- Alessandro Garcia,
- João Lucas Correia,
- Filipe Santos,
- Gabriel Nunes,
- Caio Barbosa,
- Baldoino Fonseca,
- Rafael de Mello
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 406–407https://doi.org/10.1145/3183440.3195030Code refactoring is widely practiced by software developers. There is an explicit assumption that code refactoring improves the structural quality of a software project, thereby also reducing its bug proneness. However, refactoring is often applied with ...
- posterMay 2018
A qualitative reasoning approach to spectrum-based fault localization
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 372–373https://doi.org/10.1145/3183440.3195015As spectrum-based fault localization (SFL) reasons about coverage rather than source code, it allows for a lightweight, language agnostic way of pinpointing faults in software. However, SFL misses certain faults, such as errors of omission, and may fail ...
- posterMay 2018
Improving bug localization with report quality dynamics and query reformulation
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 348–349https://doi.org/10.1145/3183440.3195003Recent findings from a user study suggest that IR-based bug localization techniques do not perform well if the bug report lacks rich structured information such as relevant program entity names. On the contrary excessive structured information such as ...
- posterMay 2018
Efficient iterative deepening for bounded exhaustive generation of complex structures
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 346–347https://doi.org/10.1145/3183440.3195002The time required to generate valid structurally complex inputs grows exponentially with the input size. It makes it hard to predict, for a given structure, the most feasible input size that is completely explorable within a time budget. Iterative ...
- posterMay 2018
Efficient and deterministic replay for web-enabled Android apps
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 329–330https://doi.org/10.1145/3183440.3194994Mobile apps are adopting web techniques for improved development agility. In this paper, we propose TimelyRep to help mobile developers debug and test their web-enabled Android apps. TimelyRep provides efficient deterministic record-and-replay as a ...
- posterMay 2018
Benchmarking microservice systems for software engineering research
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 323–324https://doi.org/10.1145/3183440.3194991Despite the prevalence and importance of microservices in industry, there exists limited research on microservices, partly due to lacking a benchmark system that reflects the characteristics of industrial microservice systems. To fill this gap, we ...
- posterMay 2018
Designing bug detection rules for fewer false alarms
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 315–316https://doi.org/10.1145/3183440.3194987One of the challenging issues of the existing static analysis tools is the high false alarm rate. To address the false alarm issue, we design bug detection rules by learning from a large number of real bugs from open-source projects from GitHub. ...
- posterMay 2018
CUTER: ClUstering-based test suite reduction
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 306–307https://doi.org/10.1145/3183440.3194983Test Suite Reduction (TSR) approaches speed up regression testing by removing redundant test cases. TSR approaches can be classified as adequate or inadequate. Adequate approaches reduce test suites so that they completely preserve the test requirements (...
- posterMay 2018
MOBS: multi-operator observation-based slicing using lexical approximation of program dependence
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 302–303https://doi.org/10.1145/3183440.3194981Observation-Based Slicing (ORBS) is a recently introduced program slicing technique based on direct observation of program semantics. Previous ORBS implementations slice a program by iteratively deleting adjacent lines of code. This paper introduces two ...
- posterMay 2018
Runtime verification of memory safety via source transformation
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 264–265https://doi.org/10.1145/3183440.3194962The unsafe features of C often lead to memory errors that can result in vulnerabilities. Many runtime verification tools are widely used to detect memory errors. However, existing tools lack DO-178C compliance, show limited performance, and demonstrate ...
- posterMay 2018
A novel variable-centric fault localization technique
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 252–253https://doi.org/10.1145/3183440.3194956Fault localization is one of the most important debugging tasks. Therefore, many techniques have already been developed to improve the efficiency. Among them, the spectrum-based fault localization technique is the most popular, and it has been the ...
- posterMay 2018
Are information retrieval-based bug localization techniques trustworthy?
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 248–249https://doi.org/10.1145/3183440.3194954Information retrieval-based bug localization techniques are evaluated using datasets with an oracle. However, datasets can contain non-buggy files, which affect the reliability of these techniques. To investigate the impact of non-buggy files, we show ...
- posterMay 2018
An experimental analysis of fault detection capabilities of covering array constructors
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 246–247https://doi.org/10.1145/3183440.3194953Combinatorial Interaction Testing (CIT) aims at constructing an effective test suite, such as a Covering Array (CA), that can detect faults that are caused by the interaction of parameters. In this paper, we report on some empirical studies conducted to ...