Sustainable security for the internet of things using artificial intelligence architectures
C Iwendi, SU Rehman, AR Javed, S Khan… - ACM Transactions on …, 2021 - dl.acm.org
In this digital age, human dependency on technology in various fields has been increasing
tremendously. Torrential amounts of different electronic products are being manufactured …
tremendously. Torrential amounts of different electronic products are being manufactured …
Precise learn-to-rank fault localization using dynamic and static features of target programs
Finding the root cause of a bug requires a significant effort from developers. Automated fault
localization techniques seek to reduce this cost by computing the suspiciousness scores (ie …
localization techniques seek to reduce this cost by computing the suspiciousness scores (ie …
Quality requirements elicitation by ideation of product quality risks with design thinking
A Poth, A Riel - 2020 IEEE 28th International Requirements …, 2020 - ieeexplore.ieee.org
Systematic requirements elicitation leads to higher quality products and reduces product
risks. In Quality Engineering and Management, product risk mitigation is a key objective …
risks. In Quality Engineering and Management, product risk mitigation is a key objective …
Research artifacts in software engineering publications: Status and trends
M Liu, X Huang, W He, Y **e, JM Zhang, X **g… - Journal of Systems and …, 2024 - Elsevier
Abstract The Software Engineering (SE) community has been embracing the open science
policy and encouraging researchers to disclose artifacts in their publications. However, the …
policy and encouraging researchers to disclose artifacts in their publications. However, the …
POWER: Program option-aware fuzzer for high bug detection ability
Most programs with command-line interface (CLI) have dozens of command-line options
(eg,-l,-F,-R for ls) to alternate the operation of the programs. Thus, depending on the option …
(eg,-l,-F,-R for ls) to alternate the operation of the programs. Thus, depending on the option …
Music: Mutation analysis tool with high configurability and extensibility
Although mutation analysis is important for various software analysis tasks, there exist few
practical mutation tools for C programs. We have developed MUSIC (MUtation analySIs tool …
practical mutation tools for C programs. We have developed MUSIC (MUtation analySIs tool …
Target-driven compositional concolic testing with function summary refinement for effective bug detection
Concolic testing is popular in unit testing because it can detect bugs quickly in a relatively
small search space. But, in system-level testing, it suffers from the symbolic path explosion …
small search space. But, in system-level testing, it suffers from the symbolic path explosion …
Concolic testing for high test coverage and reduced human effort in automotive industry
The importance of automotive software has been rapidly increasing because software now
controls many components in motor vehicles such as window controller, smart-key system …
controls many components in motor vehicles such as window controller, smart-key system …
Concolic testing with adaptively changing search heuristics
We present Chameleon, a new approach for adaptively changing search heuristics during
concolic testing. Search heuristics play a central role in concolic testing as they mitigate the …
concolic testing. Search heuristics play a central role in concolic testing as they mitigate the …
Scalable path search for automated test case generation
E Ma, X Fu, X Wang - Electronics, 2022 - mdpi.com
Test case generation is an important task during software testing. In this paper, we present a
new test-case generation framework for C programs. This approach combines dataflow …
new test-case generation framework for C programs. This approach combines dataflow …