The Community for Technology Leaders
2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE) (2015)
Gaithersbury, MD, USA
Nov. 2, 2015 to Nov. 5, 2015
ISBN: 978-1-5090-0405-8
TABLE OF CONTENTS

Anomaly detection in computer systems using compressed measurements (Abstract)

Tingshan Huang , ECE Department, Drexel University, Philadelphia, PA 19104, USA
Nagarajan Kandasamy , ECE Department, Drexel University, Philadelphia, PA 19104, USA
Harish Sethu , ECE Department, Drexel University, Philadelphia, PA 19104, USA
pp. 1-11

AtomChase: Directed search towards atomicity violations (Abstract)

Mahdi Eslamimehr , Viewpoints Research Institute
pp. 12-23

Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis (Abstract)

Mostafa Farshchi , School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia
Jean-Guy Schneider , School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia
Ingo Weber , Software Systems Research Group, NICTA, Sydney, Australia
John Grundy , School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia
pp. 24-34

PAID: Prioritizing app issues for developers by tracking user reviews over versions (Abstract)

Cuiyun Gao , Shenzhen Research Institute, The Chinese University of Hong Kong, China
Baoxiang Wang , Dept. of Computer Science and Engineering, The Chinese University of Hong Kong, China
Pinjia He , Dept. of Computer Science and Engineering, The Chinese University of Hong Kong, China
Jieming Zhu , Dept. of Computer Science and Engineering, The Chinese University of Hong Kong, China
Yangfan Zhou , Shenzhen Research Institute, The Chinese University of Hong Kong, China
Michael R. Lyu , Shenzhen Research Institute, The Chinese University of Hong Kong, China
pp. 35-45

Mutation-based test-case prioritization in software evolution (Abstract)

Yiling Lou , Key Laboratory of High Confidence Software Technologies (Peking University), MoE, China, Institute of Software, School of EECS, Peking University, China
Dan Hao , Key Laboratory of High Confidence Software Technologies (Peking University), MoE, China, Institute of Software, School of EECS, Peking University, China
Lu Zhang , Key Laboratory of High Confidence Software Technologies (Peking University), MoE, China, Institute of Software, School of EECS, Peking University, China
pp. 46-57

A similarity-based approach for test case prioritization using historical failure data (Abstract)

Tanzeem Bin Noor , Department of Computer Science, University of Manitoba, Winnipeg, Canada
Hadi Hemmati , Department of Computer Science, University of Manitoba, Winnipeg, Canada
pp. 58-68

Exciting FPGA cryptographic Trojans using combinatorial testing (Abstract)

Paris Kitsos , Computer and Informatics Engineering Department, TEI of Western Greece, Greece
Dimitris E. Simos , SBA Research, Vienna, Austria
Jose Torres-Jimenez , CINVESTAV-Tamaulipas, Ciudad Victoria, Tamaulipas, Mexico
Artemios G. Voyiatzis , SBA Research, Vienna, Austria
pp. 69-76

Model generation to support model-based testing applied on the NASA DAT Web-application — An experience report (Abstract)

Christoph Schulze , Fraunhofer Center for Experimental Software Engineering, College Park, Maryland, USA
Mikael Lindvall , Fraunhofer Center for Experimental Software Engineering, College Park, Maryland, USA
Sigurthor Bjorgvinsson , Fraunhofer Center for Experimental Software Engineering, College Park, Maryland, USA
Robert Wiegand , NASA Goddard Space Flight Center, Greenbelt, Maryland, USA
pp. 77-87

Discovering model transformation pre-conditions using automatically generated test models (Abstract)

Jean-Marie Mottu , Universite de Nantes, LINA, Nantes, France
Sagar Sen Simula , Research Laboratory, PB 134, 1325 Lysaker, Norway
Juan Cadavid , CEA, LIST, Gif-sur-Yvette, France
Benoit Baudry , INRIA, Rennes, France
pp. 88-99

WAP: Unreasonable distributions of execution time under reasonable conditions (Abstract)

David Flater , National Institute of Standards and Technology, Gaithersburg, MD 20899
pp. 100-105

WAP: What activates a bug? A refinement of the Laprie terminology model (Abstract)

Peter Troger , Faculty of Computer Science, TU Chemnitz, Germany
Lena Feinbube , Hasso Plattner Institute, University of Potsdam, Germany
Matthias Werner , Faculty of Computer Science, TU Chemnitz, Germany
pp. 106-111

Using normalized compression distance to measure the evolutionary stability of software systems (Abstract)

David Threm , University of Arkansas Little Rock, Little Rock, AR USA
Liguo Yu , Indiana University South Bend, South Bend, IN USA
S. Ramaswamy , ABB Inc, Cleveland, OH USA
S D Sudarsan , ABB Corporate Research, Bangalore, India
pp. 112-120

Towards comprehensive software reliability evaluation in open source software (Abstract)

Hiroyuki Okamura , Department of Information Engineering, Graduate School of Engineering, Hiroshima University, 1-4-1 Kagamiyama, Higashi-Hiroshima 739-8527 Japan
Tadashi Dohi , Department of Information Engineering, Graduate School of Engineering, Hiroshima University, 1-4-1 Kagamiyama, Higashi-Hiroshima 739-8527 Japan
pp. 121-129

Conservative claims about the probability of perfection of software-based systems (Abstract)

Xingyu Zhao , Centre for Software Reliability, City University, London, U.K.
Bev Littlewood , Centre for Software Reliability, City University, London, U.K.
Andrey Povyakalo , Centre for Software Reliability, City University, London, U.K.
David Wright , Centre for Software Reliability, City University, London, U.K.
pp. 130-140

Experience report: An application-specific checkpointing technique for minimizing checkpoint corruption (Abstract)

Guanpeng Li , Department of Electrical and Computer Engineering, University of British Columbia (UBC), Vancouver, Canada
Karthik Pattabiraman , Department of Electrical and Computer Engineering, University of British Columbia (UBC), Vancouver, Canada
Chen-Yong Cher , IBM T.J. Watson Research Center, New York, USA
Pradip Bose , IBM T.J. Watson Research Center, New York, USA
pp. 141-152

Experience report: Memory accesses for avionic applications and operating systems on a multi-core platform (Abstract)

Andreas Lofwenmark , Avionics Equipment, Saab Aeronautics, Linköping, Sweden
Simin Nadjm-Tehrani , Department of Computer and Information Science, Linköping University, Linköping, Sweden
pp. 153-160

A safe generic adaptation mechanism for smart cars (Abstract)

Alejandra Ruiz , ICT-European Software Institute Division Tecnalia, Derio, Spain
Garazi Juez , ICT-European Software Institute Division Tecnalia, Derio, Spain
Philipp Schleiss , Fraunhofer ESK, Hansastr. 32, 80686 Munich, Munich, Germany
Gereon Weiss , Fraunhofer ESK, Hansastr. 32, 80686 Munich, Munich, Germany
pp. 161-171

Automated resource release in device drivers (Abstract)

Jia-Ju Bai , National Laboratory for Information Science and Technology, Tsinghua University, Beijing, 100084, China
Yu-Ping Wang , National Laboratory for Information Science and Technology, Tsinghua University, Beijing, 100084, China
Hu-Qiu Liu , National Laboratory for Information Science and Technology, Tsinghua University, Beijing, 100084, China
Shi-Min Hu , National Laboratory for Information Science and Technology, Tsinghua University, Beijing, 100084, China
pp. 172-182

Contrasting exception handling code across languages: An experience report involving 50 open source projects (Abstract)

Benjamin Jakobus , OPUS Research Group, Informatics Department, Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil
Eiji Adachi Barbosa , OPUS Research Group, Informatics Department, Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil
Alessandro Garcia , OPUS Research Group, Informatics Department, Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil
Carlos Jose Pereira de Lucena , Informatics Department, Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil
pp. 183-193

Experience report: How do techniques, programs, and tests impact automated program repair? (Abstract)

Xianglong Kong , School of Computer Science and Engineering, Southeast University, 211189, China
Lingming Zhang , Department of Computer Science, University of Texas at Dallas, 75080, USA
W. Eric Wong , Department of Computer Science, University of Texas at Dallas, 75080, USA
Bixin Li , School of Computer Science and Engineering, Southeast University, 211189, China
pp. 194-204

Studying the influence of standard compiler optimizations on symbolic execution (Abstract)

Shiyu Dong , Department of Electrical and Computer Engineering, University of Texas at Austin, 78712, USA
Oswaldo Olivo , Department of Computer Science, University of Texas at Austin, 78712, USA
Lingming Zhang , Department of Computer Science, University of Texas at Dallas, 75080, USA
Sarfraz Khurshid , Department of Electrical and Computer Engineering, University of Texas at Austin, 78712, USA
pp. 205-215

How hard does mutation analysis have to be, anyway? (Abstract)

Rahul Gopinath , Department of EECS, Oregon State University
Amin Alipour , Department of EECS, Oregon State University
Iftekhar Ahmed , Department of EECS, Oregon State University
Carlos Jensen , Department of EECS, Oregon State University
Alex Groce , Department of EECS, Oregon State University
pp. 216-227

Efficient observability-based test generation by dynamic symbolic execution (Abstract)

Dongjiang You , Department of Computer Science and Engineering, University of Minnesota, USA
Sanjai Rayadurgam , Department of Computer Science and Engineering, University of Minnesota, USA
Michael Whalen , Department of Computer Science and Engineering, University of Minnesota, USA
Mats P. E. Heimdahl , Department of Computer Science and Engineering, University of Minnesota, USA
Gregory Gay , Department of Computer Science and Engineering, University of South Carolina, USA
pp. 228-238

Boundary value analysis in automatic white-box test generation (Abstract)

Zhiqiang Zhang , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences
Tianyong Wu , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences
Jian Zhang , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences
pp. 239-249

Experience report: How do structural dependencies influence change propagation? An empirical study (Abstract)

Gustavo Ansaldi Oliva , Department of Computer Science, University of São Paulo (USP) São Paulo, Brazil
Marco Aurelio Gerosa , Department of Computer Science, University of São Paulo (USP) São Paulo, Brazil
pp. 250-260

Experience report: Evaluating the effectiveness of decision trees for detecting code smells (Abstract)

Lucas Amorim , Instituto de Computação, Universidade Federal de Alagoas, Maceió - AL, Brazil, 57072-900
Evandro Costa , Instituto de Computação, Universidade Federal de Alagoas, Maceió - AL, Brazil, 57072-900
Nuno Antunes , CISUC, Department of Informatics Engineering, University of Coimbra, Polo II, 3030-290 Coimbra - Portugal
Baldoino Fonseca , Instituto de Computação, Universidade Federal de Alagoas, Maceió - AL, Brazil, 57072-900
Marcio Ribeiro , Instituto de Computação, Universidade Federal de Alagoas, Maceió - AL, Brazil, 57072-900
pp. 261-269

Efficient elimination of false positives using static analysis (Abstract)

Tukaram Muske , Tata Research Development and Design Centre, Pune, India
Uday P. Khedker , Indian Institute of Technology, Bombay, India
pp. 270-280

Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-B (Abstract)

Yongwang Zhao , School of Computer Science and Engineering, Beihang Univerisity, Beijing, China
Zhibin Yang , College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China
David Sanan , School of Computer Engineering, Nanyang Technological University, Singapore
Yang Liu , School of Computer Engineering, Nanyang Technological University, Singapore
pp. 281-292

Experience report: Formal verification and testing in the development of embedded software (Abstract)

Andreas Ulrich , Siemens AG, Corporate Technology, Munich, Germany
Anjelika Votintseva , Siemens AG, Corporate Technology, Munich, Germany
pp. 293-302

Specifying and verifying real-time self-adaptive systems (Abstract)

Matteo Camilli , Department of Management, Information and Production Engineering (DIGIP) Università degli Studi di Bergamo, Italy
Angelo Gargantini , Department of Management, Information and Production Engineering (DIGIP) Università degli Studi di Bergamo, Italy
Patrizia Scandurra , Department of Management, Information and Production Engineering (DIGIP) Università degli Studi di Bergamo, Italy
pp. 303-313

Experience report: A field analysis of user-defined security configurations of Android devices (Abstract)

Daniel Vecchiato , Institute of Computing, University of Campinas / Federal University of Mato Grosso, Campinas. Brazil. 13083-852
Eliane Martins , Institute of Computing, University of Campinas, Campinas. Brazil, 13083-852
pp. 314-323

WAP: Digital dependability identities (Abstract)

Daniel Schneider , Fraunhofer IESE, Kaiserslautern, Germany
Mario Trapp , Fraunhofer IESE, Kaiserslautern, Germany
Yiannis Papadopoulos , University of Hull, Hull, United Kingdom
Eric Armengaud , AVL List, Graz, Austria
Marc Zeller , Siemens AG, München, Germany
Kai Hofig , Siemens AG, München, Germany
pp. 324-329

WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns (Abstract)

Michael Grottke , Friedrich-Alexander-Universität Erlangen-Nurnberg, Germany
Alberto Avritzer , Siemens Corporation, Corporate Technology, USA
Daniel S. Menasche , Universidade Federal do Rio de Janeiro, Brazil
Javier Alonso , University of León, Spain
Leandro Aguiar , Siemens Corporation, Corporate Technology, USA
Sara G. Alvarez , University of León, Spain
pp. 330-335

Enhancing privacy protection in fault replication systems (Abstract)

Joao Matos , INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal
Joao Garcia , INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal
Paolo Romano , INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal
pp. 336-347

SpyAware: Investigating the privacy leakage signatures in app execution traces (Abstract)

Hui Xu , Dept. of Computer Science, The Chinese University of Hong Kong
Yangfan Zhou , MoE Key Laboratory of High Confidence Software Technologies (CUHK Sub-Lab)
Cuiyun Gao , Dept. of Computer Science, The Chinese University of Hong Kong
Yu Kang , Dept. of Computer Science, The Chinese University of Hong Kong
Michael R. Lyu , Dept. of Computer Science, The Chinese University of Hong Kong
pp. 348-358

Experience report: Can software testing education lead to more reliable code? (Abstract)

Otavio Augusto Lazzarini Lemos , Science and Technology Department - Federal University of São Paulo at S. J. dos Campos - Brazil
Fabiano Cutigi Ferrari , Computing Department - Federal University of São Carlos - Brazil
Fabio Fagundes Silveira , Science and Technology Department - Federal University of São Paulo at S. J. dos Campos - Brazil
Alessandro Garcia , Informatics Department - Pontifical Catholic University of Rio de Janeiro - Brazil
pp. 359-369

Experience report: An industrial experience report on test outsourcing practices (Abstract)

Xin Xia , College of Computer Science and Technology, Zhejiang University, Hangzhou, China
David Lo , School of Information Systems, Singapore Management University, Singapore
Pavneet Singh Kochhar , School of Information Systems, Singapore Management University, Singapore
Zhenchang Xing , School of Computer Engineering, Nanyang Technological University, Singapore
Xinyu Wang , College of Computer Science and Technology, Zhejiang University, Hangzhou, China
Shanping Li , College of Computer Science and Technology, Zhejiang University, Hangzhou, China
pp. 370-380

Software reliability growth model based on Bohrbugs and Mandelbugs (Abstract)

Martin L. Shooman , Martin L. Shooman and Associates, Glen Cove, NY Prof. Emeritus, Polytechnic Institute of NYU, Brooklyn, NY
pp. 381-386

WAP: Cognitive aspects in unit testing: The hunting game and the hunter's perspective (Abstract)

Marllos P. Prado , University of Victoria, Victoria B.C., Canada
Eric Verbeek , University of Victoria, Victoria B.C., Canada
Margaret-Anne Storey , University of Victoria, Victoria B.C., Canada
Auri M. R. Vincenzi , Universidade Federal de São Carlos, São Carlos SP, Brazil
pp. 387-392

UPMOA: An improved search algorithm to support user-preference multi-objective optimization (Abstract)

Shuai Wang , Certus Software V&V Center, Simula Research Laboratory, Oslo, Norway
Shaukat Ali , Certus Software V&V Center, Simula Research Laboratory, Oslo, Norway
Tao Yue , Certus Software V&V Center, Simula Research Laboratory, Oslo, Norway
Marius Liaaen , Cisco Systems, Oslo, Norway
pp. 393-404

Experience report: Mining test results for reasons other than functional correctness (Abstract)

Jeff Anderson , Microsoft, North Dakota State University
Hyunsook Do , University of North Texas
Saeed Salem , North Dakota State University
pp. 405-415

Classifying faulty modules with an extension of the H-index (Abstract)

Sandro Morasca , Dipartimento di Scienze Teoriche e Applicate, Università degli Studi dell'Insubria, 21100 Varese, Italy
pp. 416-426

Should fixing these failures be delegated to automated program repair? (Abstract)

Xuan-Bach D. Le , School of Information Systems, Singapore Management University, Singapore
Tien-Duy B. Le , School of Information Systems, Singapore Management University, Singapore
David Lo , School of Information Systems, Singapore Management University, Singapore
pp. 427-437

Piecing together app behavior from multiple artifacts: A case study (Abstract)

Emily Kowalczyk , Department of Computer Science, University of Maryland, College Park, MD 20742, USA
Atif M. Memon , Department of Computer Science, University of Maryland, College Park, MD 20742, USA
Myra B. Cohen , Department of Computer Science & Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA
pp. 438-449

Detecting inconsistencies in multi-platform mobile apps (Abstract)

Mona Erfani Joorabchi , University of British Columbia, Vancouver, BC, Canada
Mohamed Ali , University of British Columbia, Vancouver, BC, Canada
Ali Mesbah , University of British Columbia, Vancouver, BC, Canada
pp. 450-460

SIG-Droid: Automated system input generation for Android applications (Abstract)

Nariman Mirzaei , Department of Computer Science, George Mason University
Hamid Bagheri , Department of Informatics, University of California, Irvine
Riyadh Mahmood , Department of Computer Science, George Mason University
Sam Malek , Department of Informatics, University of California, Irvine
pp. 461-471

MoIO: Run-time monitoring for I/O protocol violations in storage device drivers (Abstract)

Domenico Cotroneo , Università degli Studi di Napoli Federico II, Naples, Italy
Luigi De Simone , Università degli Studi di Napoli Federico II, Naples, Italy
Francesco Fucci , Università degli Studi di Napoli Federico II, Naples, Italy
Roberto Natella , Università degli Studi di Napoli Federico II, Naples, Italy
pp. 472-483

Detecting latent cross-platform API violations (Abstract)

Jeff Rasley , Brown University, Providence, RI USA 02912
Eleni Gessiou , New York University, New York, NY USA 10003
Tony Ohmann , University of Massachusetts, Amherst, MA USA 01003
Yuriy Brun , University of Massachusetts, Amherst, MA USA 01003
Shriram Krishnamurthi , Brown University, Providence, RI USA 02912
Justin Cappos , New York University, New York, NY USA 10003
pp. 484-495

Discovering specification violations in networked software systems (Abstract)

Robert J. Walls , Computer Science and Engineering, Pennsylvania State University, University Park, PA
Yuriy Bruii , College of Information and Computer Sciences, University of Massachusetts, Amherst Amherst, MA
Marc Liberatore , College of Information and Computer Sciences, University of Massachusetts, Amherst Amherst, MA
Brian Neil Levine , College of Information and Computer Sciences, University of Massachusetts, Amherst Amherst, MA
pp. 496-506

Experience report: How do bug characteristics differ across severity classes: A multi-platform study (Abstract)

Bo Zhou , Department of Computer Science and Engineering, University of California, Riverside
Iulian Neamtiu , Department of Computer Science and Engineering, University of California, Riverside
Rajiv Gupta , Department of Computer Science and Engineering, University of California, Riverside
pp. 507-517

Experience report: A characteristic study on out of memory errors in distributed data-parallel applications (Abstract)

Lijie Xu , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
Wensheng Dou , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
Feng Zhu , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
Chushu Gao , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
Jie Liu , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
Hua Zhong , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
Jun Wei , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
pp. 518-529

Fast reproducing web application errors (Abstract)

Jie Wang , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
Wensheng Dou , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
Chushu Gao , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
Jun Wei , State Key Lab of Computer Science, Institute of Software, Chinese Academy of Sciences
pp. 530-540

An evidential reasoning approach for assessing confidence in safety evidence (Abstract)

Sunil Nair , Institute for Energy Technology, Norway
Neil Walkinshaw , University of Leicester, United Kingdom
Tim Kelly , University of York, United Kingdom
Jose Luis de la Vara , Carlos III University of Madrid, Spain
pp. 541-552

Security slicing for auditing XML, XPath, and SQL injection vulnerabilities (Abstract)

Julian Thome , SnT Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg
Lwin Khin Shar , SnT Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg
Lionel Briand , SnT Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg
pp. 553-564

Pushing the limits on automation in GUI regression testing (Abstract)

Zebao Gao , Department of Computer Science, University of Maryland, College Park
Chunroiig Fang , State Key Laboratory for Novel Software Technology, Naniine University, China
Atif M. Memon , Department of Computer Science, University of Maryland, College Park
pp. 565-575
92 ms
(Ver 3.3 (11022016))