


default search action
35th ISSRE 2024: Tsukuba, Japan
- 35th IEEE International Symposium on Software Reliability Engineering, ISSRE 2024, Tsukuba, Japan, October 28-31, 2024. IEEE 2024, ISBN 979-8-3503-5388-4

- Lei Cui, Yiran Zhu, Junnan Yin, Zhiyu Hao, Wei Wang, Peng Liu, Ziqi Yang, Xiaochun Yun:

APIBeh: Learning Behavior Inclination of APIs for Malware Classification. 1-12 - Ziang Liu, Xin Liu, Yingli Zhang, Zihao Zhang, Song Li, Weina Niu, Qingguo Zhou, Rui Zhou, Xiaokang Zhou:

LiScopeLens: An Open-Source License Incompatibility Analysis Tool Based on Scope Representation of License Terms. 13-24 - Yuan Yuan, Tongqing Zhou, Xiuhong Tan, Yongqian Sun, Yuqi Li, Zhixing Li, Zhiping Cai, Tiejun Li:

Exploring Hierarchical Patterns for Alert Aggregation in Supercomputers. 25-36 - Tommaso Puccetti

, Andrea Ceccarelli
:
Detection Latencies of Anomaly Detectors - An Overlooked Perspective? 37-48 - Changhua Pei, Zihan Liu, Jianhui Li, Erhan Zhang, Le Zhang, Haiming Zhang, Wei Chen, Dan Pei, Gaogang Xie:

Self-Evolutionary Group-wise Log Parsing Based on Large Language Model. 49-60 - Haotian Si, Jianhui Li, Changhua Pei, Hang Cui, Jingwen Yang, Yongqian Sun, Shenglin Zhang, Jingjing Li, Haiming Zhang, Jing Han, Dan Pei, Gaogang Xie:

TimeSeriesBench: An Industrial-Grade Benchmark for Time Series Anomaly Detection Models. 61-72 - Zichao Xia

, Yuting Chen, Pengbo Nie, Zihan Wang:
Detecting Numerical Deviations in Deep Learning Models Introduced by the TVM Compiler. 73-83 - Shaojie Yang

, Haoran Xu, Fangliang Xu, Yongjun Wang:
S2Vul: Vulnerability Analysis Based on Self-supervised Information Integration. 84-95 - Shree Hari Bittugondanahalli Indra Kumar, Lilia Rodrigues Sampaio, André Martin, Andrey Brito, Christof Fetzer:

A Comprehensive Study on the Impact of Vulnerable Dependencies on Open-Source Software. 96-107 - Wei Chang, Chunyang Ye, Hui Zhou:

Fine-Tuning Pre-trained Model with Optimizable Prompt Learning for Code Vulnerability Detection. 108-119 - Mei Han, Lulu Wang, Jianming Chang, Bixin Li, Chunguang Zhang:

Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes. 120-131 - Minghua He

, Tong Jia, Chiming Duan
, Huaqian Cai, Ying Li, Gang Huang:
LLMeLog: An Approach for Anomaly Detection based on LLM-enriched Log Events. 132-143 - Pei Xiao, Tong Jia, Chiming Duan

, Huaqian Cai, Ying Li, Gang Huang:
LogCAE: An Approach for Log-based Anomaly Detection with Active Learning and Contrastive Learning. 144-155 - Jinyuan Wang, Tong Li, Runzi Zhang, Zifang Tang, Di Wu, Zhen Yang:

VCRLog: Variable Contents Relationship Perception for Log-based Anomaly Detection. 156-167 - Wanhao Zhang, Qianli Zhang, Enyu Yu, Yuxiang Ren, Yeqing Meng, Mingxi Qiu, Jilong Wang:

Leveraging RAG-Enhanced Large Language Model for Semi-Supervised Log Anomaly Detection. 168-179 - Pietro Liguori

, Cristina Improta
, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Enhancing AI-based Generation of Software Exploits with Contextual Information. 180-191 - Shuang Li, Rui Li, Shishuai Yang, Wenrui Diao:

Android's Cat-and-Mouse Game: Understanding Evasion Techniques against Dynamic Analysis. 192-203 - Minghui Li

, Yang Li
, Hao Han, Xiaopeng Ke, Tongyu Wang, Fengyuan Xu, Liming Fang:
REDLC: Learning-driven Reverse Engineering for Deep Learning Compilers. 204-215 - Shuang Li, Yuntao Cheng, Jinfu Chen

, Jifeng Xuan, Sen He, Weiyi Shang:
Assessing the Performance of AI-Generated Code: A Case Study on GitHub Copilot. 216-227 - Yunze Zhao

, Yuchen Zhang, Dan Chacko, Justin Cappos:
CovSBOM: Enhancing Software Bill of Materials with Integrated Code Coverage Analysis. 228-237 - Shenglin Zhang, Zeyu Che, Zhongjie Pan, Xiaohui Nie, Yongqian Sun, Lemeng Pan, Dan Pei:

LabelEase: A Semi-Automatic Tool for Efficient and Accurate Trace Labeling in Microservices. 238-247 - Anna Schmedding, Lishan Yang, Adwait Jog, Evgenia Smirni

:
Aspis: Lightweight Neural Network Protection Against Soft Errors. 248-259 - Keyur Joshi, Chiao Hsieh

, Sayan Mitra, Sasa Misailovic:
GAS: Generating Fast & Accurate Surrogate Models for Simulations of Autonomous Vehicle Systems. 260-271 - João Paulo Costa de Araujo, Balahari Vignesh Balu, Eik Reichmann, Jessica Kelly, Stefan Kugele, Núria Mata, Lars Grunske:

Applying Concept-Based Models for Enhanced Safety Argumentation. 272-283 - Torin Viger, Logan Murphy, Simon Diemert, Claudio Menghi

, Jeff Joyce, Alessio Di Sandro
, Marsha Chechik:
AI-Supported Eliminative Argumentation: Practical Experience Generating Defeaters to Increase Confidence in Assurance Cases. 284-294 - Yifan Wang, Jun Xu:

Multi-level Fuzzing for Document File Formats with Intermediate Representations. 295-306 - Tingke Wen

, Yuwei Li, Lu Zhang, Huimin Ma, Zulie Pan:
An Empirical Study on the Distance Metric in Guiding Directed Grey-box Fuzzing. 307-318 - Taiyan Wang, Ruipeng Wang, Yu Chen

, Lu Yu, Zulie Pan, Min Zhang, Huimin Ma, Jinghua Zheng:
Enhancing Black-box Compiler Option Fuzzing with LLM through Command Feedback. 319-330 - Zhenye Fan

, Guixin Ye, Tianmin Hu, Zhanyong Tang:
History-driven Compiler Fuzzing via Assembling and Scheduling Bug-triggering Code Segments. 331-342 - Hao Wang, Pu (Luke) Yi, Jeremias Parladorio, Wing Lam, Darko Marinov, Tao Xie:

Hierarchy-Aware Regression Test Prioritization. 343-354 - Tarek Mahmud, Meiru Che, Anne H. H. Ngu, Guowei Yang

:
An Empirical Investigation on Android App Testing Practices. 355-366 - Jun Liu

, Jiwei Yan, Yuanyuan Xie, Jun Yan, Jian Zhang:
Fix the Tests: Augmenting LLMs to Repair Test Cases with Static Collector and Neural Reranker. 367-378 - Patanamon Thongtanunam, Chakkrit Tantithamthavorn:

Code Ownership: The Principles, Differences, and Their Associations with Software Quality. 379-390 - Zhenhe Yao, Haowei Ye, Changhua Pei, Guang Cheng, Guangpei Wang

, Zhiwei Liu, Hongwei Chen, Hang Cui, Zeyan Li, Jianhui Li, Gaogang Xie, Dan Pei:
SparseRCA: Unsupervised Root Cause Analysis in Sparse Microservice Testing Traces. 391-402 - Wenwei Gu, Xinying Sun, Jinyang Liu, Yintong Huo, Zhuangbin Chen, Jianping Zhang, Jiazhen Gu, Yongqiang Yang, Michael R. Lyu:

KPIRoot: Efficient Monitoring Metric-based Root Cause Localization in Large-scale Cloud Systems. 403-414 - Jin Huang, Pengfei Chen, Guangba Yu, Yilun Wang, Haiyu Huang, Zilong He:

FaaSRCA: Full Lifecycle Root Cause Analysis for Serverless Applications. 415-426 - Jian Wang, Shangqing Liu, Xiaofei Xie

, Jingkai Siow, Kui Liu, Yi Li:
Ratchet: Retrieval Augmented Transformer for Program Repair. 427-438 - Seongdeok Seo

, Judy S. Lee, Mijung Kim:
Testing Diverse Geographical Features of Autonomous Driving Systems. 439-450 - Dong Huang, Tsz On Li, Xiaofei Xie, Heming Cui:

Themis: Automatic and Efficient Deep Learning System Testing with Strong Fault Detection Capability. 451-462 - Peng Wang

, Shengyou Hu, Huayao Wu
, Xintao Niu, Changhai Nie, Lin Chen:
A Combinatorial Interaction Testing Method for Multi-Label Image Classifier. 463-474 - Tobias John

, Einar Broch Johnsen, Eduard Kamburjan:
Mutation-Based Integration Testing of Knowledge Graph Applications. 475-486 - Yi Cai, Xiaohui Wan

, Zhihao Liu, Zheng Zheng:
DRLFailureMonitor: A Dynamic Failure Monitoring Approach for Deep Reinforcement Learning System. 487-498 - Haozhe Li, Minghua Ma, Yudong Liu, Pu Zhao, Shuo Li, Ze Li, Murali Chintalapati, Yingnong Dang, Chetan Bansal, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:

Can We Trust Auto-Mitigation? Improving Cloud Failure Prediction with Uncertain Positive Learning. 499-510 - Junjie Huang, Zhihan Jiang, Jinyang Liu, Yintong Huo, Jiazhen Gu, Zhuangbin Chen, Cong Feng, Hui Dong, Zengyin Yang, Michael R. Lyu:

Demystifying and Extracting Fault-indicating Information from Logs for Failure Diagnosis. 511-522 - Zexin Wang, Jianhui Li, Minghua Ma, Ze Li, Yu Kang

, Chaoyun Zhang, Chetan Bansal, Murali Chintalapati, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang, Changhua Pei, Gaogang Xie:
Large Language Models Can Provide Accurate and Interpretable Incident Triage. 523-534 - Wenting Dong, Huibiao Zhu, Sini Chen, Ning Ge:

A Security Verification Framework for the LoRaWAN Protocol with Application in the Manufacturing Industry. 535-546 - Kai Liang, Zhengxiong Luo

, Yanyang Zhao, Wenlong Zhang, Ronghua Shi, Yu Jiang, Heyuan Shi, Chao Hu:
MDIplier: Protocol Format Recovery via Hierarchical Inference. 547-557 - Shishuai Yang, Guangdong Bai

, Ruoyan Lin, Jialong Guo, Wenrui Diao:
Beyond the Horizon: Exploring Cross-Market Security Discrepancies in Parallel Android Apps. 558-569 - Ziming Chen, Yue Li, Jianbo Gao, Jiashuo Zhang, Ke Wang, Jian-bin Hu, Zhi Guan, Zhong Chen:

Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes. 570-581 - Cheng Wang, Tengfei Tu, Sujuan Qin, Guangjun Wu, Fei Gao, Mingchao Wan:

Understanding Atomics and Memory Ordering Issues in Real-World Rust Software. 582-592 - Leonardo Paroli, Tommaso Botarelli

, Laura Carnevali, Enrico Vicario:
A Compositional Approach to Coordinated Software Rejuvenation of Component-Based Systems. 593-604 - Andrea Cappelletti, Mark Grechanik:

Feedback-Directed Cross-Layer Optimization of Cloud-Based Functional Actor Applications. 605-616 - Delong Li, Jiayu Zeng, Liangda Fang, Chaonan Wang, Lin Cui, Quanlong Guan:

Exact Computation of Network Reliability with Sentential Decision Diagrams. 617-628

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














