Contents: [Article 13] aToucan: An Automated Framework to Derive UML Analysis Models from Use Case Models (Tao Yue, Lionel C. Briand, Yvan Labiche) [Article 14] Documenting Design-Pattern Instances: A Family of Experiments on Source-Code Comprehensibility (Giuseppe Scanniello, Carmine Gravino, Michele Risi, Genoveffa Tortora, Gabriella Dodero) [Article 15] Deciding Type-Based Partial-Order C…
Table of Contents: [Article 13] Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems (Hyojeong Lee, Jeff Seibert, Dylan Fistrovic, Charles Killian, Cristina Nita-Rotaru) [Article 14] Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation (Ziming Zhao, Gail-Joon Ahn, Hongxin Hu) [Article 15] Dynamic Provable Data Possession …
Table of Contents: [Article 1] A Large-Scale Evaluation of High-Impact Password Strength Meters (Xavier De Carné De Carnavalet, Mohammad Mannan) [Article 2] Misbehavior in Bitcoin: A Study of Double-Spending and Accountability (Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Čapkun) [Article 3] vVote: A Verifiable Voting System (Chris Culnane, Peter Y. A. Ryan, S…
Contents: [Article 7] Residual Investigation: Predictive and Precise Bug Detection [Article 8] A Large-Scale Evaluation of Automated unit Test Generation Using EvoSuite [Article 9] Conditional Commitments: Reasoning and Model Checkingrn[Article 10] A Unified Test Case Prioritization Approach [Article 11] Formal verification of Software Countermeasures Against Side-Channel Attacks [Article …