


default search action
QRS 2018: Lisbon, Portugal
- 2018 IEEE International Conference on Software Quality, Reliability and Security, QRS 2018, Lisbon, Portugal, July 16-20, 2018. IEEE 2018, ISBN 978-1-5386-7757-5

Session I-A: Fault Diagnosis I
- Teng Wang

, Xiaodong Liu, Shanshan Li, Xiangke Liao, Wang Li, Qing Liao:
MisconfDoctor: Diagnosing Misconfiguration via Log-Based Configuration Testing. 1-12 - Xinyue Feng, Qiusong Yang, Lin Shi

, Qing Wang:
BehaviorKI: Behavior Pattern Based Runtime Integrity Checking for Operating System Kernel. 13-24 - Md. Shariful Islam, Korosh Koochekian Sabor, Abdelaziz Trabelsi, Wahab Hamou-Lhadj

, Luay Alawneh
:
MASKED: A MapReduce Solution for the Kappa-Pruned Ensemble-Based Anomaly Detection System. 25-34 - Roberto Pietrantuono

, Stefano Russo
:
Probabilistic Sampling-Based Testing for Accelerated Reliability Assessment. 35-46
Session I-B: Formal Methods
- Yongjian Li, Jialun Cao, Kaiqiang Duan:

An Automatic Parameterized Verification of FLASH Cache Coherence Protocol. 47-58 - Rong Wang

, Shaoying Liu:
TBFV-SE: Testing-Based Formal Verification with Symbolic Execution. 59-66 - Nianyu Li, Di Bai, Yiming Peng, Zhuoqun Yang, Wenpin Jiao:

Verifying Stochastic Behaviors of Decentralized Self-Adaptive Systems: A Formal Modeling and Simulation Based Approach. 67-74 - Atif Mashkoor, Alexander Egyed:

Analysis of Experiences with the Engineering of a Medical Device Using State-Based Formal Methods. 75-82
Session I-C: Quality Prediction
- Naohiko Tsuda, Hironori Washizaki, Yoshiaki Fukazawa, Yuichiro Yasuda, Shunsuke Sugimura:

Machine Learning to Evaluate Evolvability Defects: Code Metrics Thresholds for a Given Context. 83-94 - Caesar Jude Clemente, Fehmi Jaafar, Yasir Malik:

Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms? 95-102 - Zhuo Sun, Reng Zeng, Xudong He:

A Method for Predicting Two-Variable Atomicity Violations. 103-110 - Xian Zhang, Kerong Ben, Jie Zeng:

Cross-Entropy: A New Metric for Software Defect Prediction. 111-122
Session I-D: Security and Privacy I
- Miguel Guerra, Benjamin Taubmann, Hans P. Reiser

, Sileshi Demesie Yalew, Miguel Correia:
Introspection for ARM TrustZone with the ITZ Library. 123-134 - Claudia Morgado, Gisele Busichia Baioco

, Tânia Basso, Regina Moraes
:
A Security Model for Access Control in Graph-Oriented Databases. 135-142 - Kai Mindermann, Philipp Keck, Stefan Wagner

:
How Usable Are Rust Cryptography APIs? 143-154 - Shu-Hao Chang, Sanoop Mallissery

, Chih-Hao Hsieh, Yu-Sung Wu:
Hypervisor-Based Sensitive Data Leakage Detector. 155-162
Session II-A: Fault Diagnosis II
- Jun Inoue, Fumio Kanehiro, Mitsuharu Morisawa

, Akira Mori:
Detecting Errors in a Humanoid Robot. 163-170 - Yi Qin, Huiyan Wang, Chang Xu, Xiaoxing Ma, Jian Lu:

SynEva: Evaluating ML Programs by Mirror Program Synthesis. 171-182 - Andreas Schörgenhumer, Mario Kahlhofer

, Hanspeter Mössenböck
, Paul Grünbacher
:
Using Crash Frequency Analysis to Identify Error-Prone Software Technologies in Multi-System Monitoring. 183-190 - Frederico Cerveira

, Imre Kocsis
, Raul Barbosa
, Henrique Madeira, András Pataricza:
Exploratory Data Analysis of Fault Injection Campaigns. 191-202
Session II-B: Software Maintenance
- Mark Grechanik

, Chi Wu Mao, Ankush Baisal, David Rosenblum, B. M. Mainul Hossain:
Differencing Graphical User Interfaces. 203-214 - Nana Chang, Linzhang Wang, Yu Pei

, Subrota K. Mondal, Xuandong Li:
Change-Based Test Script Maintenance for Android Apps. 215-225 - Celia Chen, Lin Shi

, Michael Shoga, Qing Wang, Barry W. Boehm:
How Do Defects Hurt Qualities? An Empirical Study on Characterizing a Software Maintainability Ontology in Open Source Software. 226-237 - Can Zhu, Xiaofang Zhang, Yang Feng, Lin Chen:

An Empirical Study of the Impact of Code Smell on File Changes. 238-248
Session II-C: Quality Improvement
- Johannes Bräuer, Reinhold Plösch, Christian Körner, Matthias Saft:

On the Suitability of a Portfolio-Based Design Improvement Approach. 249-256 - Byron DeVries, Betty H. C. Cheng

:
Automatic Detection of Feature Interactions Using Symbolic Analysis and Evolutionary Computation. 257-268 - Randa Elamin, Rasha Osman

:
Implementing Traceability Repositories as Graph Databases for Software Quality Improvement. 269-276 - Yan Zhu

, Ruyun Yu, Yao Qin, Di Ma
, William Cheng-Chung Chu:
Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy. 277-288
Session III-A: Mutation Testing
- Qianqian Zhu, Andy Zaidman:

Mutation Testing for Physical Computing. 289-300 - Faezeh Siavashi, Dragos Truscan

, Juri Vain
:
Vulnerability Assessment of Web Services with Model-Based Mutation Testing. 301-312 - Dawei Cheng, Chun Cao, Chang Xu, Xiaoxing Ma:

Manifesting Bugs in Machine Learning Code: An Explorative Study with Mutation Testing. 313-324 - James Jerson Ortiz Vega

, Gilles Perrouin
, Moussa Amrani, Pierre-Yves Schobbens
:
Model-Based Mutation Operators for Timed Systems: A Taxonomy and Research Agenda. 325-332
Session III-B: Software Analysis
- Weiqiang Zhang, Zhenyu Chen, Bin Luo:

Does Socio-Technical Congruence Have an Effect on Continuous Integration Build Failures? An Empirical Study on 10 GitHub Projects. 333-343 - Katerina Goseva-Popstojanova

, Jacob Tyo:
Identification of Security Related Bug Reports via Text Mining Using Supervised and Unsupervised Classification. 344-355 - Naoures Ghrairi, Segla Kpodjedo, Amine Barrak

, Fábio Petrillo, Foutse Khomh:
The State of Practice on Virtual Reality (VR) Applications: An Exploratory Study on Github and Stack Overflow. 356-366
Session III-D: Security and Privacy II
- Armstrong Nhlabatsi, Jin B. Hong

, Dong Seong Kim
, Rachael Fernandez, Noora Fetais
, Khaled M. Khan
:
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. 367-374 - Max Plauth

, Fredrik Teschke, Daniel Richter, Andreas Polze:
Hardening Application Security Using Intel SGX. 375-380
Session IV-A: Performance and Safety
- Isnaldo Francisco De Melo Jr., Abderrahmane Benbachir, Michel R. Dagenais:

Performance Analysis Using Automatic Grouping. 381-387 - Peng Zhang, Yuxiang Gao, Xiang Shi:

QuantCloud: A Software with Automated Parallel Python for Quantitative Finance Applications. 388-396 - Chang Rao, Jin Guo, Nan Li, Yu Lei, Yadong Zhang, Yao Li:

Safety-Critical System Modeling in Model-Based Testing with Hazard and Operability Analysis. 397-404
Session V-A: Software Testing I
- Samer Khamaiseh

, Patrick Chapman, Dianxiang Xu:
Model-Based Testing of Obligatory ABAC Systems. 405-413 - Sara Ericsson, Eduard Enoiu:

Combinatorial Modeling and Test Case Generation for Industrial Control Software Using ACTS. 414-425 - Golnaz Gharachorlu, Nick Sumner:

Avoiding the Familiar to Speed Up Test Case Reduction. 426-437 - Hasan Sözer, Ozan Gürler, Orhan Yilmaz:

Towards a Testing Framework with Visual Feedback for Actor-Based Systems. 438-445
Session VI-A: Software Testing II
- Loreto Gonzalez-Hernandez

, Birgitta Lindström, Jeff Offutt, Sten F. Andler, Pasqualina Potena, Markus Bohlin:
Using Mutant Stubbornness to Create Minimal and Prioritized Test Sets. 446-457 - Arpit Christi, Alex Groce:

Target Selection for Test-Based Resource Adaptation. 458-469 - Daniel Flemström, Eduard Enoiu, Wasif Afzal, Daniel Sundmark, Thomas Gustafsson, Avenir Kobetski:

From Natural Language Requirements to Passive Test Cases Using Guarded Assertions. 470-481
Session VII-A: Program Analysis and Repair
- Wafa Hasanain, Yvan Labiche, Sigrid Eldh

:
An Analysis of Complex Industrial Test Code Using Clone Analysis. 482-489 - Ekincan Ufuktepe

, Tugkan Tuglular
:
A Program Slicing-Based Bayesian Network Model for Change Impact Analysis. 490-499 - Yun Guo, Nan Li, Jeff Offutt, Amihai Motro:

Automatically Repairing SQL Faults. 500-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














