Sustainable security for the internet of things using artificial intelligence architectures

C Iwendi, SU Rehman, AR Javed, S Khan… - ACM Transactions on …, 2021 - dl.acm.org
In this digital age, human dependency on technology in various fields has been increasing
tremendously. Torrential amounts of different electronic products are being manufactured …

Precise learn-to-rank fault localization using dynamic and static features of target programs

Y Kim, S Mun, S Yoo, M Kim - ACM Transactions on Software …, 2019 - dl.acm.org
Finding the root cause of a bug requires a significant effort from developers. Automated fault
localization techniques seek to reduce this cost by computing the suspiciousness scores (ie …

Quality requirements elicitation by ideation of product quality risks with design thinking

A Poth, A Riel - 2020 IEEE 28th International Requirements …, 2020 - ieeexplore.ieee.org
Systematic requirements elicitation leads to higher quality products and reduces product
risks. In Quality Engineering and Management, product risk mitigation is a key objective …

Research artifacts in software engineering publications: Status and trends

M Liu, X Huang, W He, Y **e, JM Zhang, X **g… - Journal of Systems and …, 2024 - Elsevier
Abstract The Software Engineering (SE) community has been embracing the open science
policy and encouraging researchers to disclose artifacts in their publications. However, the …

POWER: Program option-aware fuzzer for high bug detection ability

A Lee, I Ariq, Y Kim, M Kim - 2022 IEEE Conference on …, 2022 - ieeexplore.ieee.org
Most programs with command-line interface (CLI) have dozens of command-line options
(eg,-l,-F,-R for ls) to alternate the operation of the programs. Thus, depending on the option …

Music: Mutation analysis tool with high configurability and extensibility

DL Phan, Y Kim, M Kim - 2018 IEEE international conference on …, 2018 - ieeexplore.ieee.org
Although mutation analysis is important for various software analysis tasks, there exist few
practical mutation tools for C programs. We have developed MUSIC (MUtation analySIs tool …

Target-driven compositional concolic testing with function summary refinement for effective bug detection

Y Kim, S Hong, M Kim - Proceedings of the 2019 27th ACM Joint …, 2019 - dl.acm.org
Concolic testing is popular in unit testing because it can detect bugs quickly in a relatively
small search space. But, in system-level testing, it suffers from the symbolic path explosion …

Concolic testing for high test coverage and reduced human effort in automotive industry

Y Kim, D Lee, J Baek, M Kim - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
The importance of automotive software has been rapidly increasing because software now
controls many components in motor vehicles such as window controller, smart-key system …

Concolic testing with adaptively changing search heuristics

S Cha, H Oh - Proceedings of the 2019 27th ACM Joint Meeting on …, 2019 - dl.acm.org
We present Chameleon, a new approach for adaptively changing search heuristics during
concolic testing. Search heuristics play a central role in concolic testing as they mitigate the …

Scalable path search for automated test case generation

E Ma, X Fu, X Wang - Electronics, 2022 - mdpi.com
Test case generation is an important task during software testing. In this paper, we present a
new test-case generation framework for C programs. This approach combines dataflow …