Dependable Software Engineering. Theories, Tools, and Applications 9th International Symposium, SETTA 2023, Nanjing, China, November 27–29, 2023, Proceedings

This book constitutes the proceedings of the 9th International Symposium on Dependable Software Engineering, SETTA 2023, held in Nanjing, China, during November 27-29, 2023. The 24 full papers presented in this volume were carefully reviewed and selected from 78 submissions. They deal with latest re...

Full description

Bibliographic Details
Other Authors: Hermanns, Holger (Editor), Sun, Jun (Editor), Bu, Lei (Editor)
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2024, 2024
Edition:1st ed. 2024
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • String Constraints with Regex-Counting and String-Length Solved More Efficiently
  • Reachability Based Uniform Controllability to Target Set with Evolution Function
  • Enhancing Branch and Bound for Robustness Verification of Neural Networks via An Effective Branching Strategy
  • Graph-Based Log Anomaly Detection via Adversarial Training
  • Formal Verification based Synthesis for Behavior Trees
  • SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries
  • Session Types with Multiple Senders Single Receiver
  • Understanding the Reproducibility Issues of Monkey for GUI Testing
  • Multi-Dimensional Abstraction and Decomposition for Separation of Concerns
  • Solving SMT Over Non-Linear Real Arithmetic via Numerical Sampling and Symbolic Verification
  • Leveraging TLA+ Specifications to Improve the Reliability of the ZooKeeper Coordination Service
  • Modeling Regex Operators for Solving Regex Crossword Puzzles
  • Software Vulnerability Detection Using an Enhanced Generalization Strategy
  • HeatC: a Variable-Grained Coverage Criterion for Deep Learning Systems
  • Formalization of Lambda Calculus with Explicit Names as a Nominal Reasoning Framework
  • Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications
  • Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance
  • An Abstract Domain of Linear Templates with Disjunctive Right-Hand-Side Intervals
  • Deducing Matching Strings for Real-World Regular Expressions
  • Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis
  • Cheat-FlipIt: an Approach to Modeling and Perception of a Deceptive Opponent
  • Making an eBPF Virtual Machine Faster on Microcontrollers: Verified Optimization and Proof Simplification
  • Optimized Solutions for Highly Contended Transactional Workloads
  • DeepTD: Diversity-Guided Deep Neural Network Test Generation