Opening and Welcome
Keynote: Strong type systems, weak defenses? - The problem with function parameters and implicit conversions
Invited Keynote by Assoc. Prof. Dr. Zoltán Porkoláb, Eötvös Loránd University (ELTE), Budapest, Hungary & Ericsson Hungary Ltd.
Paper: KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity
Jinfu Chen (Jiangsu University), Yuechao Gu (Jiangsu University), Saihua Cai (Jiangsu University), Haibo Chen (Jiangsu University) and Jingyi Chen (Jiangsu University)
Coffee break
Paper: Input/Output Check Bugs Taxonomy - Injection in Spotlight
Irena Bojanova (NIST), Carlos Eduardo Cardoso Galhardo (INMETRO) and Sara Moshtari (RIT)
Keynote: Constrained IoT Devices: A global approach (hardware/software) to secure embedded applications
Invited Keynote by Professor David Hely (The Grenoble Institute of Technology)
Coffee break
Panel discussion
Closing