Testing Software and Systems Valentina Casola, Alessandra de Benedictis, Massimiliano Rak |
Front Matter |
Model-Based Testing
|
Using Model Learning for the Generation of Mock Components Sébastien Salva, Elliott Blot |
3-19 |
Interrogating Virtual Agents: In Quest of Security Vulnerabilities Josip Bozic, Franz Wotawa |
20-34 |
Giving a Model-Based Testing Language a Formal Semantics via Partial MAX-SAT Bernhard Aichernig, Christian Burghard |
35-51 |
Learning Abstracted Non-deterministic Finite State Machines Andrea Pferscher, Bernhard Aichernig |
52-69 |
Security Testing
|
APPregator: A Large-Scale Platform for Mobile Security Analysis Luca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo |
73-88 |
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities Arcangelo Castiglione, Francesco Palmieri, Mariangela Petraglia, Raffaele Pizzolante |
89-103 |
About the Robustness and Looseness of Yara Rules Gerardo Canfora, Mimmo Carapella, Andrea Vecchio, Laura Nardi, Antonio Pirozzi, Corrado Visaggio |
104-120 |
Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server Marta Catillo, Antonio Pecchia, Umberto Villano |
121-134 |
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks Alexandra-Elena Mocanu (mihaita), Bogdan-Costel Mocanu, Christian Esposito, Florin Pop |
135-149 |
Enabling Next-Generation Cyber Ranges with Mobile Security Components Enrico Russo, Luca Verderame, Alessio Merlo |
150-165 |
Testing Methods and Applications
|
A Technique for Parallel GUI Testing of Android Applications Porfirio Tramontana, Nicola Amatucci, Anna Fasolino |
169-185 |
Trigger Alarm: A Smart NFC Sniffer for High-Precision Measurements Martin Erb, Christian Steger, Martin Troyer, Josef Preishuber-Pflügl |
186-200 |
Methods for Live Testing of Cloud Services Oussama Jebbar, Ferhat Khendek, Maria Toeroe |
201-216 |
Testing Methods and Automation
|
Automated Transition Coverage in Behavioural Conformance Testing Lina Marsso, Radu Mateescu, Wendelin Serwe |
219-235 |
An Executable Mechanised Formalisation of an Adaptive State Counting Algorithm Robert Sachtleben |
236-254 |
Automatic Fairness Testing of Machine Learning Models Arnab Sharma, Heike Wehrheim |
255-271 |
Inspecting Code Churns to Prioritize Test Cases Francesco Altiero, Anna Corazza, Sergio Di Martino, Adriano Peron, Luigi Starace |
272-285 |
Short Contributions
|
Using an SMT Solver for Checking the Completeness of FSM-Based Tests Evgenii Vinarskii, Andrey Laputenko, Nina Yevtushenko |
289-295 |
Hacking Goals: A Goal-Centric Attack Classification Framework Francesco Caturano, Gaetano Perrone, Simon Romano |
296-301 |
A Comparative Study on Combinatorial and Random Testing for Highly Configurable Systems Hao Jin, Takashi Kitamura, Eun-Hye Choi, Tatsuhiro Tsuchiya |
302-309 |
Architecture Based on Keyword Driven Testing with Domain Specific Language for a Testing System Ricardo Pereira, Miguel Brito, Ricardo Machado |
310-316 |