P. Abate, R. Di-cosmo, L. Gesbert, F. Le-fessant, R. Treinen et al., Mining component repositories for installability issues, Proceeding of the 12th Working Conference on Mining Software Repositories, pp.24-33, 2015.

L. An, F. Khomh, and Y. G. Guéhéneuc, An empirical study of crash-inducing commits in Mozilla Firefox, Software Quality Journal, vol.26, issue.2, pp.553-584, 2018.

A. Technica,

T. H. Chen, M. Nagappan, E. Shihab, and A. E. Hassan, An empirical study of dormant bugs, Proceedings of the 11th Working Conference on Mining Software Repositories, pp.82-91, 2014.

D. Felsing, S. Grebing, V. Klebanov, P. Rümmer, and M. Ulbrich, Automating regression verification, Proceedings of the 29th ACM/IEEE international conference on Automated software engineering, pp.349-360, 2014.

F. Gao, L. Wang, and X. Li, BovInspector: automatic inspection and repair of buffer overflow vulnerabilities, Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, pp.786-791, 2016.

H. V. Garcia and E. Shihab, Characterizing and Predicting Blocking Bugs in Open Source Projects Categories and Subject Descriptors, Proceedings of the 11th Working Conference on Mining Software Repositories, pp.72-81, 2014.

M. Gegick, P. Rotella, and T. Xie, Identifying security bug reports via text mining: An industrial case study, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, pp.11-20, 2010.

. Github,

A. Github,

B. Jiang, Y. Liu, and W. K. Chan, ContractFuzzer: fuzzing smart contracts for vulnerability detection, Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp.259-269, 2018.

O. Kafali, J. Jones, M. Petruso, L. Williams, and M. P. Singh, How Good Is a Security Policy against Real Breaches? A HIPAA Case Study, Proceedings of the 39th International Conference on Software Engineering, pp.530-540, 2017.

Y. Kashiwa, H. Yoshiyuki, Y. Kukita, and M. Ohira, A pilot study of diversity in high impact bugs, Proceedings of the 30th International Conference on Software Maintenance and Evolution, pp.536-540, 2014.

W. Ma, L. Chen, X. Zhang, Y. Zhou, and B. Xu, How do developers fix cross-project correlated bugs? A case study on the GitHub scientific python ecosystem, Proceedings of IEEE/ACM 39th International Conference on Software Engineering, pp.381-392, 2017.

B. Mathis, V. Avdiienko, E. O. Soremekun, M. Bohme, and A. Zeller, Detecting information flow by mutating input data, Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, pp.263-273, 2017.

N. Meng, S. Nagy, D. Yao, W. Zhuang, and G. A. Argoty, Proceedings of the 40th International Conference on Software Engineering, pp.372-383, 2018.

I. Molyneaux, The Art of Application Performance Testing: Help for Programmers and Quality Assurance, 2009.

J. P. Near and D. Jackson, Finding security bugs in web applications using a catalog of access control patterns, Proceedings of the 38th International Conference on Software Engineering, pp.947-958, 2016.

T. H. Nguyen, M. Nagappan, A. E. Hassan, M. Nasser, and P. Flora, An industrial case study of automatically identifying performance regression-causes, Proceedings of the 11th Working Conference on Mining Software Repositories, pp.232-241, 2014.

A. Nistor, P. C. Chang, C. Radoi, and S. Lu, CARAMEL: Detecting and fixing performance problems that have non-intrusive fixes, Proceedings of the 37th International Conference on Software Engineering, vol.1, pp.902-912, 2015.

A. Nistor, T. Jiang, and L. Tan, Discovering, reporting, and fixing performance bugs, Proceedings of the 10th Working Conference on Mining Software Repositories, pp.237-246, 2013.

N. Nurmuliani, D. Zowghi, and S. Williams, Using card sorting technique to classify requirements change, Proceedings of 12th International Requirements Engineering Conference, pp.224-232, 2014.

V. T. Pham, W. B. Ng, K. Rubinov, and A. Roychoudhury, Hercules: Reproducing crashes in real-world application binaries, Proceedings of the 37th International Conference on Software Engineering, vol.1, pp.891-901, 2015.

H. Seo and S. Kim, Predicting recurring crash stacks, Proceedings of the 27th International Conference on Automated Software Engineering, p.180, 2012.

H. Seo, C. Sadowski, S. Elbaum, E. Aftandilian, and R. Bowdidge, Programmers' build errors: a case study (at google), Proceedings of the 36th International Conference on Software Engineering, pp.724-734, 2014.

H. Shafiq and Z. Arshad, Automated Debugging and Bug Fixing Solutions: A Systematic Literature Review and Classification, 2014.

L. K. Shar, H. Beng-kuan-tan, and L. C. Briand, Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis, Proceedings of the 35th International Conference on Software Engineering, pp.642-651, 2013.

E. Shihab, A. Mockus, Y. Kamei, B. Adams, and A. E. Hassan, High-impact defects: A study of breakage and surprise defects, Proceedings of the 19th ACM SIG-SOFT symposium and the 13th European conference on Foundations of software engineering, pp.300-310, 2011.

M. Sullivan and R. Chillarege, Software defects and their impact on system availability-a study of field failures in operating systems, Proceeding of the Fault-Tolerant Computing: The Twenty-First International Symposium, pp.2-9, 1991.

L. Tan, C. Liu, Z. Li, X. Wang, Y. Zhou et al., Bug characteristics in open source software, Empirical Software Engineering, vol.19, issue.6, pp.1665-1705, 2014.

S. H. Tan, Z. Dong, X. Gao, and A. Roychoudhury, Repairing Crashes in Android Apps, Proceedings of the 40th International Conference on Software Engineering, pp.187-198, 2018.

S. H. Tan and A. Roychoudhury, Relifix: Automated repair of software regressions, Proceedings of the 37th International Conference on Software Engineering, vol.1, pp.471-482, 2015.

S. Zaman, B. Adams, and A. E. Hassan, Security Versus Performance Bugs: A Case Study on Firefox, Proceedings of the 8th Working Conference on Mining Software Repositories, pp.93-102, 2011.

X. Zhao, X. Xia, P. S. Kochhar, D. Lo, and S. Li, An empirical study of bugs in build process, Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp.1187-1189, 2014.