Table of Contents
Total Page:16
File Type:pdf, Size:1020Kb
2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C) QRS-C 2020 Table of Contents Message from the Steering Committee Chairs and General Chairs xviii Message from the Program Chairs xix Organizing Committee xx Program Committee xxii Steering Committee xxv List of Additional Reviewers xxvi Chairs of Workshops Co-Located with QRS 2020 xxvii ICCLC-Committee xxix Automated and Intelligent Software Testing Metamorphic Relations Identification on Chebyshev Rational Approximation Method in the Nuclide Depletion Calculation Program 1 Meng Li (University of South China, China; CNNC Key Laboratory on High Trusted Computing, China), Lijun Wang (University of South China, China), Shiyu Yan (University of South China, China; CNNC Key Laboratory on High Trusted Computing, China), Xiaohua Yang (University of South China, China; CNNC Key Laboratory on High Trusted Computing, China), Jie Liu (University of South China, China), and Yapin Wan (University of South China, China) Online Prediction of Server Crash Based on Running Data 7 Zou Zhuoliang (Beihang University, China) and Ai Jun (Beihang University, China) Efficiency Metrics and Test Case Design for Test Automation 15 Davrondzhon Gafurov (Norsk Helsenett SF) and Arne Erik Hurum (Norsk Helsenett SF) Agent-Based Software Testing: A Definition and Systematic Mapping Study 24 Pavithra Perumal Kumaresen (Mälardalen University), Mirgita Frasheri (Mälardalen University), and Eduard Enoiu (Mälardalen University) Intelligent Radar Software Defect Prediction Approach and Its Application 32 Xi Liu (Nanjing Research Institute of Electronics Technology), Haifeng Li (Beihang University), and Xuyang Xie (Castle (Beijing) Technology Co., Ltd.) v Graph-Based Vulnerability Detection via Extracting Features from Sliced Code 38 Peng Wu (National University of Defense Technology), Liangze Yin (National University of Defense Technology), Xiang Du (National University of Defense Technology), Liyuan Jia (National University of Defense Technology), and Wei Dong (National University of Defense Technology) Vulnerability Analysis through Interface-Based Checker Design 46 Xiang Du (National University of Defense Technology), Liangze Yin (National University of Defense Technology), Peng Wu (National University of Defense Technology), Liyuan Jia (National University of Defense Technology), and Wei Dong (National University of Defense Technology) Coverage Guided Multiple Base Choice Testing 53 Tugkan Tuglular (Izmir Institute of Technology, Turkey) and Onur Leblebici (Univera, Inc., Turkey) Calculating Minimal Failure-Causing Schema Based on Relational Tree Model Method 61 Qian Ji (PICC Property and Casualty Company Limited Jiangsu Branch), Chiya Xu (Nanjing University of Posts and Telecommunications), and Ziyuan Wang (Nanjing University of Posts and Telecommunications) UI Components Recognition System Based on Image Understanding 65 Xiaolei Sun (Wuhu Institute of Technology), Tongyu Li (Nanjing Mooctest Inc.), and Jianfeng Xu (Nanjing Mooctest Inc.) Specification, Testing, and Verification for Error Prevention and Detection Improving Spectrum-Based Fault Localization Using Quality Assessment and Optimization of a Test Suite 72 Chang Liu (Chinese Aeronautical Radio Electronics Research Institute), Chunyan Ma (Northwestern Polytechnical University), and Tao Zhang (Northwestern Polytechnical University) Parallel Stratified Random Testing for Concurrent Programs 79 Canh Minh Do (JAIST, Japan) and Kazuhiro Ogata (JAIST, Japan) Trace-Based Error Prevention and Detection of Consistency Maintenance via Bidirectional Graph Transformations 87 Soichiro Hidaka (Hosei University, Japan) Parallelizing Flow-Sensitive Demand-Driven Points-to Analysis 91 Haibo Yu (Kyushu Sangyo University, Japan), Qiang Sun (Huawei Technologies, China), Kejun Xiao (Shanghai Palline Data Technology, China), Yuting Chen (Shanghai Jiao Tong University, China), Tsunenori Mine (Kyushu University, Japan), and Jianjun Zhao (Kyushu University, Japan) Specification-Based Test Case Generation with Constrained Genetic Programming 98 Yuji Sato (Hosei University) Range Partition Testing: Principle and Technique 104 Shaoying Liu (Hiroshima University) vi Blockchain and Smart Contracts Modeling and Analyzing Smart Contracts Using Predicate Transition Nets 108 Xudong He (Florida International University) Timely Publication of Transaction Records in a Private Blockchain 116 Rui Ming (University of Massachusetts Dartmouth, USA) and Haiping Xu (University of Massachusetts Dartmouth, USA) Blockchain-Based Solutions for IoT: A Tertiary Study 124 Qianwen Xu (Nanjing University, China), Xiudi Chen (Nanjing University, China), Shanshan Li (Nanjing University, China), He Zhang (Nanjing University, China), Muhammad Ali Babar (University of Adelaide, Australia), and Nguyen Khoi Tran (University of Adelaide, Australia) Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions 132 Oliver Kattwinkel (Bonn-Rhein-Sieg University of Applied Sciences, Germany) and Michael Rademacher (Bonn-Rhein-Sieg University of Applied Sciences, Germany) Blockchain-Based Slice Orchestration for Enabling Cross-Slice Communication at the Network Edge 140 Konstantinos Papadakis-Vlachopapadopoulos (National Technical University of Athens), Ioannis Dimolitsas (National Technical University of Athens), Dimitrios Dechouniotis (National Technical University of Athens), Eirini Eleni Tsiropoulou (University of New Mexico), Ioanna Roussaki (National Technical University of Athens), and Symeon Papavassiliou (National Technical University of Athens) Mining Power Misestimation in PoW Blockchain 148 Sang-Yoon Chang (University of Colorado Colorado Springs, USA) Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Inter-Planetary File System 153 Dongcheng Li (University of Texas at Dallas), W. Eric Wong (University of Texas at Dallas), Man Zhao (China University of Geosciences (Wuhan)), and Qiang Hou (China University of Geosciences (Wuhan)) Cyber Forensics in Software Engineering A Practical Solution Against Business Email Compromise (BEC) Attack Using Invoice Checksum 160 Songpon Teerakanok (Ritsumeikan University, Japan), Hiroaki Yasuki (Ritsumeikan University, Japan), and Tetsutaro Uehara (Ritsumeikan University, Japan) STAMP S&S: Safety & Security Scenario for Specification and Standard in the Society of AI/IoT 168 Tomoko Kaneko (National Institute of Informatics), Nobukazu Yoshioka (National Institute of Informatics), and Ryoichi Sasaki (Tokyo Denki University) vii Time-Aware Multi-resolutional Approach to Re-identifying Location Histories by Using Social Networks 176 Takuto Ohka (University of Electro-Communications), Shun Matsumoto (University of Electro-Communications), Masatsugu Ichino (University of Electro-Communications), and Hiroshi Yoshiura (University of Electro-Communications) Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other Organizations 184 Haruki Kobayashi (Tokyo Denki University), Taiichi Saito (Tokyo Denki University), and Ryoichi Sasaki (Tokyo Denki University) Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function 190 Ryoichi Sasaki (Tokyo Denki University) Data Quality for Intelligent Systems Evaluating Interaction Content in Online Learning Using Deep Learning for Quality Classification 198 Lei Wu (Central China Normal University) and Di Wu (Central China Normal University) SemOIR: An Ontology-Based Semantic Information Retrieval System 204 Mingwei Tang (Nanjing Audit University), Jiangping Chen (University of North Texas), and Haihua Chen (University of North Texas) Mining Author Identifiers for PubMed by Linking to Open Bibliographic Databases 209 Li Zhang (Wuhan University, China), Yong Huang (Wuhan University, China), Qikai Cheng (Wuhan University, China), and Wei Lu (Wuhan University, China) Result Diversification in Clinical Case Reports Retrieval Based on Main Finding 213 Mengqi Luo (Wuhan University), Fengchang Yu (Wuhan University), and Haihua Chen (University of North Texas) Electrical and Autonomous Vehicle Software Survey of State-of-Art Autonomous Driving Technologies with Deep Learning 221 Yu Huang (Black Sesame Technology Inc.) and Yue Chen (Futurewei Technology Inc.) Enable an Open Software Defined Mobility Ecosystem Through VEC-OF 229 Sanchu Han (Futurewei Technologies Inc.), Yong He (Futurewei Technologies Inc.), and Yin Ding (Futurewei Technologies Inc.) Driver's Perception Model in Driving Assist 237 Renzhi Tang (ShanghaiTech University) and Zhihao Jiang (ShanghaiTech University) viii A Study on Testing Autonomous Driving Systems 241 Xudong Zhang (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Yan Cai (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences), and Zijiang Yang (GuardStrike Inc.) Interpretation Area-Guided Detection of Adversarial Samples 245 JiaLi Wei (Xi'an Jiaotong University, China), Ming Fan (Xi'an Jiaotong University, China), Xi Xu (Xi'an Jiaotong University, China), Ang Jia (Xi'an Jiaotong University, China), Zhou Xu (Chongqing University, China), and Lei Xue (The Hong Kong Polytechnic University, China) Formal Verification of CAN Bus in Cyber Physical System 249 Rui Wang (Capital Normal University), Yong Guan (Capital Normal University), Xiaojuan Li (Capital Normal University),