By Topic

2011 IEEE 22nd International Symposium on Software Reliability Engineering

Nov. 29 2011-Dec. 2 2011

Filter Results

Displaying Results 1 - 25 of 38
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (650 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2011, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Word from the Program Committee Chair

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s):x - xvi
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Using Behavioral Profiles to Detect Software Flaws in Network Servers

    Publication Year: 2011, Page(s):1 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (715 KB) | HTML iconHTML

    Some software faults, namely security vulnerabilities, tend to elude conventional testing methods. Since the effects of these faults may not be immediately perceived nor have a direct impact on the server's execution (e.g., a crash), they can remain hidden even if exercised by the test cases. Our detection approach consists in inferring a behavioral profile of a network server that models its corr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diversity for Security: A Study with Off-the-Shelf AntiVirus Engines

    Publication Year: 2011, Page(s):11 - 19
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    We have previously reported [1] the results of an exploratory analysis of the potential gains in detection capability from using diverse AntiVirus products. The analysis was based on 1599 malware samples collected from a distributed honey pot deployment over a period of 178 days. The malware samples were sent to the signature engines of 32 different AntiVirus products hosted by the Virus Total ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Server Side Detection of Content Sniffing Attacks

    Publication Year: 2011, Page(s):20 - 29
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Content sniffing attacks occur if browsers render non-HTML files embedded with malicious HTML contents or JavaScript code as HTML files. The rendering of these embedded contents might cause unwanted effects such as the stealing of sensitive information through the execution of malicious JavaScript code. The primary source of these attacks can be stopped if the uploading of malicious files can be p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model-Driven Engineering Approach to Support the Verification of Compliance to Safety Standards

    Publication Year: 2011, Page(s):30 - 39
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1538 KB) | HTML iconHTML

    Certification of safety-critical systems according to well-recognised standards is the norm in many industries where the failure of such systems can harm people or the environment. Certification bodies examine such systems, based on evidence that the system suppliers provide, to ensure that the relevant safety risks have been sufficiently mitigated. The evidence is aimed at satisfying the requirem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Early Identification of Detector Locations in Dependable Software

    Publication Year: 2011, Page(s):40 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    The dependability properties of a software system are usually assessed and refined towards the end of the software development lifecycle. Problems pertaining to software dependability may necessitate costly system redesign. Hence, early insights into the potential for error propagation within a software system would be beneficial. Further, the refinement of the dependability properties of software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with Assurance Cases for Spacecraft Safing

    Publication Year: 2011, Page(s):50 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Assurance cases are gaining momentum across several industries as a way to assure critical properties of engineered systems. In the space industry, they promise to help assure spacecraft safing, a fallback mode commonly included in spacecraft to respond to critical faults and keep the vehicle safe until ground operators can resolve the problem. We constructed an assurance case for one vehicle, gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Cause-Effect-Chains from Version Histories

    Publication Year: 2011, Page(s):60 - 69
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Software reliability is heavily impacted by soft ware changes. How do these changes relate to each other? By analyzing the impacted method definitions and usages, we determine dependencies between changes, resulting in a change genealogy that captures how earlier changes enable and cause later ones. Model checking this genealogy reveals temporal process patterns that encode key features of the sof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical Evaluation of Complex Input-Output Transformations

    Publication Year: 2011, Page(s):70 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    This paper presents a new, statistical approach to evaluating software products that transform complex inputs into complex outputs. This approach, called multistage stratified input/output (MSIO) sampling, combines automatic clustering of multidimensional I/O data with multistage sampling and manual examination of data elements, in order to accurately and economically estimate summary measures of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uncertainty Propagation through Software Dependability Models

    Publication Year: 2011, Page(s):80 - 89
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Stochastic models are often employed to study dependability of critical systems and assess various hardware and software fault-tolerance techniques. These models take into account the randomness in the events of interest (aleatory uncertainty) and are generally solved at fixed parameter values. However, the parameter values themselves are determined from a finite number of observations and hence h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Interaction Faults Revisited: An Exploratory Study

    Publication Year: 2011, Page(s):90 - 99
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    While a large body of research is dedicated to testing for feature interactions in configurable software, there has been little work that examines what constitutes such a fault at the code level. In consequence, we do not know how prevalent real interaction faults are in practice, what a typical interaction fault looks like in code, how to seed interaction faults, or whether current interaction te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JavaScript Errors in the Wild: An Empirical Study

    Publication Year: 2011, Page(s):100 - 109
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Client-side JavaScript is being widely used in popular web applications to improve functionality, increase responsiveness, and decrease load times. However, it is challenging to build reliable applications using JavaScript. This paper presents an empirical characterization of the error messages printed by JavaScript code in web applications, and attempts to understand their root causes. We find th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiently Running Test Suites Using Abstract Undo Operations

    Publication Year: 2011, Page(s):110 - 119
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    The last decade has seen many advances in test input generation, specifically using systematic approaches that can enumerate many tests. While such approaches have enhanced our ability to find bugs in programs, running large numbers of tests remains a time consuming and expensive task, especially for tests that execute operations on external resources, such as a file system or a network. This pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PACOGEN: Automatic Generation of Pairwise Test Configurations from Feature Models

    Publication Year: 2011, Page(s):120 - 129
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Feature models are commonly used to specify variability in software product lines. Several tools support feature models for variability management at different steps in the development process. However, tool support for test configuration generation is currently limited. This test generation task consists in systematically selecting a set of configurations that represent a relevant sample of the v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Regression Testing Strategy: An Empirical Study

    Publication Year: 2011, Page(s):130 - 139
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    When software systems evolve, different amounts and types of code modifications can be involved in different versions. These factors can affect the costs and benefits of regression testing techniques in different ways, and thus, there may be no single regression testing technique that is the most cost-effective technique to use on every version. To date, many regression testing techniques have bee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact Analysis of Configuration Changes for Test Case Selection

    Publication Year: 2011, Page(s):140 - 149
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Testing configurable systems, which are becoming prevalent, is expensive due to the large number of configurations and test cases. Existing approaches reduce this expense by selecting or prioritizing configurations. However, these approaches redundantly run the full test suite for the selected configurations. To address this redundancy, we propose a test case selection approach by analyzing the im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Directed Test Suite Augmentation Technique

    Publication Year: 2011, Page(s):150 - 159
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Test suite augmentation techniques are used in regression testing to identify code elements affected by changes and to generate test cases to cover those elements. In previous work, we studied two approaches to augmentation, one using a concolic test case generation algorithm and one using a genetic test case generation algorithm. We found that these two approaches behaved quite differently in ter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.