首页 > 最新文献

2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
Evidence arguments for using formal methods in software certification 在软件认证中使用形式化方法的论据
E. Denney, Ganesh J. Pai
We describe a generic approach for automatically integrating the output generated from a formal method/tool into a software safety assurance case, as an evidence argument, by (a) encoding the underlying reasoning as a safety case pattern, and (b) instantiating it using the data produced from the method/tool. We believe this approach not only improves the trustworthiness of the evidence generated from a formal method/tool, by explicitly presenting the reasoning and mechanisms underlying its genesis, but also provides a way to gauge the suitability of the evidence in the context of the wider assurance case. We illustrate our work by application to a real example-an unmanned aircraft system - where we invoke a formal code analysis tool from its autopilot software safety case, automatically transform the verification output into an evidence argument, and then integrate it into the former.
我们描述了一种通用方法,用于自动将形式化方法/工具生成的输出集成到软件安全保证案例中,作为证据论证,通过(a)将底层推理编码为安全案例模式,以及(b)使用从方法/工具产生的数据实例化它。我们认为,这种方法不仅通过明确地呈现其起源背后的推理和机制,提高了从正式方法/工具生成的证据的可信度,而且还提供了一种在更广泛的保证案例背景下衡量证据适用性的方法。我们通过应用于一个真实的例子来说明我们的工作-一个无人驾驶飞机系统-我们从其自动驾驶软件安全案例中调用正式代码分析工具,自动将验证输出转换为证据论证,然后将其集成到前者中。
{"title":"Evidence arguments for using formal methods in software certification","authors":"E. Denney, Ganesh J. Pai","doi":"10.1109/ISSREW.2013.6688924","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688924","url":null,"abstract":"We describe a generic approach for automatically integrating the output generated from a formal method/tool into a software safety assurance case, as an evidence argument, by (a) encoding the underlying reasoning as a safety case pattern, and (b) instantiating it using the data produced from the method/tool. We believe this approach not only improves the trustworthiness of the evidence generated from a formal method/tool, by explicitly presenting the reasoning and mechanisms underlying its genesis, but also provides a way to gauge the suitability of the evidence in the context of the wider assurance case. We illustrate our work by application to a real example-an unmanned aircraft system - where we invoke a formal code analysis tool from its autopilot software safety case, automatically transform the verification output into an evidence argument, and then integrate it into the former.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Dependability of open systems 开放系统的可靠性
Y. Yokote, Tatsumi Nagayama
This presentation demonstrates an innovative way to build a target system maintaining its dependability in an open system environment, where the boundary of the target system is blurred in the sense that interaction with its surrounding environment is always altered due to several environmental changes such as business objectives, stakeholders' requirements, regulations, and performance requirements. What we call open systems is inherently providing such a nature, and recent IT systems particularly including cloud-based services are categorized in it.
本演示演示了一种在开放系统环境中构建目标系统以保持其可靠性的创新方法,在开放系统环境中,目标系统的边界是模糊的,因为与周围环境的交互总是由于若干环境变化(如业务目标、利益相关者的需求、法规和性能需求)而改变。我们所说的开放系统本质上就是提供这样一种性质,最近的IT系统,特别是包括基于云的服务,都属于这种性质。
{"title":"Dependability of open systems","authors":"Y. Yokote, Tatsumi Nagayama","doi":"10.1109/ISSREW.2013.6688859","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688859","url":null,"abstract":"This presentation demonstrates an innovative way to build a target system maintaining its dependability in an open system environment, where the boundary of the target system is blurred in the sense that interaction with its surrounding environment is always altered due to several environmental changes such as business objectives, stakeholders' requirements, regulations, and performance requirements. What we call open systems is inherently providing such a nature, and recent IT systems particularly including cloud-based services are categorized in it.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An empirical study on clustering for isolating bugs in fault localization 基于聚类的故障定位缺陷隔离实证研究
Yanqin Huang, Junhua Wu, Yang Feng, Zhenyu Chen, Zhihong Zhao
Spectrum-based Fault Localization (SBFL) techniques use risk evaluation formulas to calculate each statement's likelihood of having a bug based on test results. SBFL can not only be used in statement level, but also can be used with other program entities such as branches, functions and so on. Most previous studies have been conducted under the assumption of a single bug. However, software always contains multi-bugs in practice. A natural idea of debugging is to isolate bugs and then use SBFL techniques to locate one bug for each group. In this paper, we conduct an empirical study on clustering for isolating bugs in fault localization. We analyze the effects of six fault localization techniques and two cluster algorithms. The main observations are: (1) ER5 (Wong1) achieves the best results of fault localization with clustering; (2) K-means outperforms hierarchical clustering for isolating bugs in fault localization.
基于谱的故障定位(SBFL)技术使用风险评估公式根据测试结果计算每个语句存在错误的可能性。SBFL不仅可以在语句级使用,还可以与分支、函数等其他程序实体一起使用。以前的大多数研究都是在假设一个bug的情况下进行的。然而,在实际应用中,软件总是包含多种bug。调试的一个自然思路是隔离bug,然后使用sffl技术为每个组定位一个bug。本文对聚类方法在故障定位中隔离故障进行了实证研究。我们分析了六种故障定位技术和两种聚类算法的效果。主要观察结果如下:(1)ER5 (Wong1)聚类方法在故障定位方面效果最好;(2)在故障定位中,K-means在隔离错误方面优于分层聚类。
{"title":"An empirical study on clustering for isolating bugs in fault localization","authors":"Yanqin Huang, Junhua Wu, Yang Feng, Zhenyu Chen, Zhihong Zhao","doi":"10.1109/ISSREW.2013.6688893","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688893","url":null,"abstract":"Spectrum-based Fault Localization (SBFL) techniques use risk evaluation formulas to calculate each statement's likelihood of having a bug based on test results. SBFL can not only be used in statement level, but also can be used with other program entities such as branches, functions and so on. Most previous studies have been conducted under the assumption of a single bug. However, software always contains multi-bugs in practice. A natural idea of debugging is to isolate bugs and then use SBFL techniques to locate one bug for each group. In this paper, we conduct an empirical study on clustering for isolating bugs in fault localization. We analyze the effects of six fault localization techniques and two cluster algorithms. The main observations are: (1) ER5 (Wong1) achieves the best results of fault localization with clustering; (2) K-means outperforms hierarchical clustering for isolating bugs in fault localization.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127102555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Program behavior characterization and clustering: An empirical study for failure clustering 程序行为表征与聚类:故障聚类的实证研究
Danqing Zhang, Jianhui Jiang, Linbo Chen
Failure clustering is considered as an effective method to alleviate the burden in software development and maintenance stage. However, since the overall software fault space is extremely large, the inherent complexity of the “fault-error-failure” chain becomes an obstacle in failure clustering. In this paper, we present a method of program behavior characterization and clustering which is able to examine and cluster failure behaviors of programs based on their normal executions. We first characterize program executions in order to model runtime behaviors. Then the runtime behaviors are clustered by using a typical fuzzy technique. After that, we evaluate two things: the accuracy of runtime behavior modeling, and the equivalence of a cluster in runtime characterization to that in failure clustering. For the SPEC CPU2000 and SPEC CPU2006 suites of benchmarks, the experimental results and analysis show that our method is effective at clustering similar failure behaviors based on their runtime behavior clustering.
故障聚类被认为是减轻软件开发和维护阶段负担的有效方法。然而,由于整个软件故障空间非常大,“故障-错误-故障”链的固有复杂性成为故障聚类的障碍。在本文中,我们提出了一种程序行为表征和聚类的方法,该方法能够根据程序的正常执行来检查和聚类程序的故障行为。我们首先描述程序执行,以便对运行时行为建模。然后采用典型的模糊聚类技术对运行时行为进行聚类。在此之后,我们评估了两件事:运行时行为建模的准确性,以及运行时表征中的集群与故障聚类中的集群的等价性。在SPEC CPU2000和SPEC CPU2006两组基准测试中,实验结果和分析表明,基于运行时行为聚类,我们的方法可以有效地聚类相似的故障行为。
{"title":"Program behavior characterization and clustering: An empirical study for failure clustering","authors":"Danqing Zhang, Jianhui Jiang, Linbo Chen","doi":"10.1109/ISSREW.2013.6688894","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688894","url":null,"abstract":"Failure clustering is considered as an effective method to alleviate the burden in software development and maintenance stage. However, since the overall software fault space is extremely large, the inherent complexity of the “fault-error-failure” chain becomes an obstacle in failure clustering. In this paper, we present a method of program behavior characterization and clustering which is able to examine and cluster failure behaviors of programs based on their normal executions. We first characterize program executions in order to model runtime behaviors. Then the runtime behaviors are clustered by using a typical fuzzy technique. After that, we evaluate two things: the accuracy of runtime behavior modeling, and the equivalence of a cluster in runtime characterization to that in failure clustering. For the SPEC CPU2000 and SPEC CPU2006 suites of benchmarks, the experimental results and analysis show that our method is effective at clustering similar failure behaviors based on their runtime behavior clustering.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125012324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying silent failures of SaaS services using finite state machine based invariant analysis 使用基于不变量分析的有限状态机识别SaaS服务的静默故障
Geetika Goel, A. Roy, R. Ganesan
Field failure analysis is usually driven by a characterization of the different time related properties of failure. This characterization does not help the production support team in understanding the root cause. In order to pinpoint the root cause of failure, one of the most effective techniques used is checking for violations of the system invariants which are the consistent, time invariant correlations that exist in the system. Understanding when and where these violations happen helps in detecting the root cause of the failure. Silent failures, on the other hand are characterized by no evidence of failures either in the console or in the field failure logs. They are unearthed at moments of crisis, either with a customer complaint or other cascading failures. These failures often result in data loss or data corruption, creating many latent errors. Accumulation of these errors over time results in degraded system performance. This represents the problem of software aging and restoration of the system, i.e. its rejuvenation becomes a critical need. Subsequent to the restoration, a rigorous failure detection mechanism is needed to detect them early. What we describe in the paper is a novel method that could be used to detect silent failures using a combination of invariant violation checking and finite state machine based analysis of the system. We use the audit-trail logs of system to extract information about the state and transitions for FSM representation. Currently our research work was limited to proving its efficiency. We applied this approach to our SaaS platform and were able to detect 36 silent failures over a period of 9 months. As next steps, we will implement this as a part of automated failure detection in the operational SaaS platforms.
现场失效分析通常是由对不同时间相关的失效特性的描述驱动的。这种描述并不能帮助生产支持团队理解问题的根本原因。为了查明故障的根本原因,使用的最有效的技术之一是检查是否违反系统不变量,系统不变量是系统中存在的一致的、时不变的相关性。了解这些违规发生的时间和地点有助于检测故障的根本原因。另一方面,静默故障的特点是在控制台或现场故障日志中都没有故障证据。它们在危机时刻被挖掘出来,要么是客户投诉,要么是其他一连串的失败。这些故障通常会导致数据丢失或数据损坏,从而产生许多潜在的错误。随着时间的推移,这些错误的积累会导致系统性能下降。这代表了软件老化和系统恢复的问题,即它的复兴成为一个关键的需求。在恢复之后,需要一个严格的故障检测机制来早期检测它们。本文描述的是一种新的方法,该方法可以使用不变违例检查和基于有限状态机的系统分析相结合来检测无声故障。我们使用系统的审计跟踪日志来提取关于FSM表示的状态和转换的信息。目前我们的研究工作还局限于验证其效率。我们将这种方法应用于我们的SaaS平台,并在9个月的时间内检测到36个无声故障。在接下来的步骤中,我们将把它作为可操作SaaS平台中自动故障检测的一部分来实现。
{"title":"Identifying silent failures of SaaS services using finite state machine based invariant analysis","authors":"Geetika Goel, A. Roy, R. Ganesan","doi":"10.1109/ISSREW.2013.6688909","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688909","url":null,"abstract":"Field failure analysis is usually driven by a characterization of the different time related properties of failure. This characterization does not help the production support team in understanding the root cause. In order to pinpoint the root cause of failure, one of the most effective techniques used is checking for violations of the system invariants which are the consistent, time invariant correlations that exist in the system. Understanding when and where these violations happen helps in detecting the root cause of the failure. Silent failures, on the other hand are characterized by no evidence of failures either in the console or in the field failure logs. They are unearthed at moments of crisis, either with a customer complaint or other cascading failures. These failures often result in data loss or data corruption, creating many latent errors. Accumulation of these errors over time results in degraded system performance. This represents the problem of software aging and restoration of the system, i.e. its rejuvenation becomes a critical need. Subsequent to the restoration, a rigorous failure detection mechanism is needed to detect them early. What we describe in the paper is a novel method that could be used to detect silent failures using a combination of invariant violation checking and finite state machine based analysis of the system. We use the audit-trail logs of system to extract information about the state and transitions for FSM representation. Currently our research work was limited to proving its efficiency. We applied this approach to our SaaS platform and were able to detect 36 silent failures over a period of 9 months. As next steps, we will implement this as a part of automated failure detection in the operational SaaS platforms.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125092343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integration of software reliability engineering, risk management and safety assurance case 集成软件可靠性工程、风险管理和安全保障案例
Fubin Wu
GessNet™ is the leader in providing risk-driven software solutions and consulting services for medical device risk management, safety assurance case development, FDA submissions, FDA inspections and ISO 13485 quality system audits (http://www.gessnet.com).
GessNet™是为医疗器械风险管理、安全保证案例开发、FDA提交、FDA检查和ISO 13485质量体系审核(http://www.gessnet.com)提供风险驱动软件解决方案和咨询服务的领导者。
{"title":"Integration of software reliability engineering, risk management and safety assurance case","authors":"Fubin Wu","doi":"10.1109/ISSREW.2013.6688898","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688898","url":null,"abstract":"GessNet™ is the leader in providing risk-driven software solutions and consulting services for medical device risk management, safety assurance case development, FDA submissions, FDA inspections and ISO 13485 quality system audits (http://www.gessnet.com).","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115251874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coincidental correctness: An interference or interface to successful fault localization? 巧合正确性:成功定位错误的干扰或接口?
Zheng Zheng, Yichao Gao, P. Hao, Zhenyu Zhang
In software debugging, statistical fault localization techniques contrast dynamic spectra of program elements to estimate the location of faults in faulty programs. Coincidental correctness may have a negative impact on these techniques because faults can also be triggered in an observed non-failed run and thus disturbs the assessment of fault locations. However, eliminating the confounding relies on the accuracy of recognizing them. This paper makes use of the presence of coincidental correctness as an effective interface to the success of fault localization. We calculate the distribution overlapping of dynamic spectrum in failed runs and in non-failed runs to find out the fault-leading predicates, and further reduce the region by referencing the inter-class distances of the spectra to suppress the less suspicious candidates. Empirical results show that our technique can outperform representative existing predicate-based fault localization techniques.
在软件调试中,统计故障定位技术通过对比程序元素的动态谱来估计故障程序中的故障位置。巧合正确性可能对这些技术产生负面影响,因为故障也可能在观察到的非失败运行中触发,从而干扰对故障位置的评估。然而,消除混淆依赖于识别它们的准确性。本文利用巧合正确性作为故障定位成功的有效接口。通过计算运行失败和运行正常时动态谱的分布重叠,找出故障引导谓词,并通过参考谱的类间距离进一步缩小区域,从而抑制不太可疑的候选谱。实验结果表明,该方法优于已有的基于谓词的故障定位技术。
{"title":"Coincidental correctness: An interference or interface to successful fault localization?","authors":"Zheng Zheng, Yichao Gao, P. Hao, Zhenyu Zhang","doi":"10.1109/ISSREW.2013.6688889","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688889","url":null,"abstract":"In software debugging, statistical fault localization techniques contrast dynamic spectra of program elements to estimate the location of faults in faulty programs. Coincidental correctness may have a negative impact on these techniques because faults can also be triggered in an observed non-failed run and thus disturbs the assessment of fault locations. However, eliminating the confounding relies on the accuracy of recognizing them. This paper makes use of the presence of coincidental correctness as an effective interface to the success of fault localization. We calculate the distribution overlapping of dynamic spectrum in failed runs and in non-failed runs to find out the fault-leading predicates, and further reduce the region by referencing the inter-class distances of the spectra to suppress the less suspicious candidates. Empirical results show that our technique can outperform representative existing predicate-based fault localization techniques.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132278659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fault-class-aware fault tree generation and analysis 基于故障分类的故障树生成与分析
A. Tai, C. Walter, L. Fesq, J. Day
Over decades, fault-tree has remained as one of the most widely used fault management (FM) mechanisms by practitioners as a visualization/communication media, as well as a quantitative analysis tool for building dependable systems. Nonetheless, to date fault tree analysis is often unable to provide us with high-confidence results due to potential misrepresentation of the relationships among failure events. In retrospect, catastrophic system failures were almost always caused by a chain of mixed fault manifestation and interaction. Moreover, faults in FM itself may become a critical element in a fault-manifestation chain. The 1996 Ariane-5 rocket self-destruction provides us with a lesson on the devastating consequence of inappropriate FM application. Such prior lessons have inspired us to propose a fault-class-aware and FM-capability-aware fault tree analysis framework.
在过去的几十年里,故障树作为一种可视化/交流媒体,以及构建可靠系统的定量分析工具,一直是从业者最广泛使用的故障管理(FM)机制之一。尽管如此,到目前为止,故障树分析通常无法为我们提供高可信度的结果,因为故障事件之间的关系可能存在误解。回顾过去,灾难性系统故障几乎总是由一系列混合故障表现和相互作用引起的。此外,FM本身的故障可能成为故障表现链中的关键因素。1996年阿丽亚娜5号火箭自毁给我们上了一堂关于不适当使用调频的毁灭性后果的课。这些先前的经验教训启发我们提出了一个故障类感知和fm能力感知的故障树分析框架。
{"title":"Fault-class-aware fault tree generation and analysis","authors":"A. Tai, C. Walter, L. Fesq, J. Day","doi":"10.1109/ISSREW.2013.6688878","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688878","url":null,"abstract":"Over decades, fault-tree has remained as one of the most widely used fault management (FM) mechanisms by practitioners as a visualization/communication media, as well as a quantitative analysis tool for building dependable systems. Nonetheless, to date fault tree analysis is often unable to provide us with high-confidence results due to potential misrepresentation of the relationships among failure events. In retrospect, catastrophic system failures were almost always caused by a chain of mixed fault manifestation and interaction. Moreover, faults in FM itself may become a critical element in a fault-manifestation chain. The 1996 Ariane-5 rocket self-destruction provides us with a lesson on the devastating consequence of inappropriate FM application. Such prior lessons have inspired us to propose a fault-class-aware and FM-capability-aware fault tree analysis framework.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123397965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cues for scent intensification in debugging 调试中气味增强的提示
Alexandre Perez, Rui Abreu
Information foraging is a theory to understand how people search for information. In this theory, information scent is the perceived likelihood by the “predator” that a cue will lead to a “prey”. The better the cues, the better the information scent. In automatic debugging, it is the perceived likelihood that the diagnostic report leads to the cause of failures. In this paper, we detail a visualization, offered by the GZoltar toolset, that has the potential to provide better cues. With better we mean providing more information that leads to the fault than, e.g., the source code and code coverage information. The toolset provides a graphical display of the diagnostic reports yielded by well-known debugging techniques. From an information foraging point of view, we argue that the visualization is of added value while debugging. Finally, we report a user study to confirm that GZOLTAR's visualization provides better cues for pinpointing faults.
信息觅食是一种理解人们如何搜索信息的理论。在这个理论中,信息气味是“捕食者”感知到的一种可能性,即一个线索将导致“猎物”。线索越好,信息的气味就越好。在自动调试中,它是诊断报告导致故障原因的感知可能性。在本文中,我们详细介绍了由GZoltar工具集提供的可视化,它有可能提供更好的线索。我们所说的“更好”是指提供比源代码和代码覆盖信息更多的导致错误的信息。该工具集提供了由知名调试技术生成的诊断报告的图形显示。从信息搜集的角度来看,我们认为可视化在调试过程中具有附加价值。最后,我们报告了一项用户研究,以证实GZOLTAR的可视化为精确定位故障提供了更好的线索。
{"title":"Cues for scent intensification in debugging","authors":"Alexandre Perez, Rui Abreu","doi":"10.1109/ISSREW.2013.6688890","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688890","url":null,"abstract":"Information foraging is a theory to understand how people search for information. In this theory, information scent is the perceived likelihood by the “predator” that a cue will lead to a “prey”. The better the cues, the better the information scent. In automatic debugging, it is the perceived likelihood that the diagnostic report leads to the cause of failures. In this paper, we detail a visualization, offered by the GZoltar toolset, that has the potential to provide better cues. With better we mean providing more information that leads to the fault than, e.g., the source code and code coverage information. The toolset provides a graphical display of the diagnostic reports yielded by well-known debugging techniques. From an information foraging point of view, we argue that the visualization is of added value while debugging. Finally, we report a user study to confirm that GZOLTAR's visualization provides better cues for pinpointing faults.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Non-operational testing of software for security issues 针对安全问题对软件进行非操作测试
Shweta Subramani, M. Vouk, L. Williams
We are studying extension of the classical Software Reliability Engineering (SRE) methodology into the security space. We combine “classical” reliability modeling, when applied to reported vulnerabilities found under “normal” operational profile conditions, with safety oriented fault management processes. We illustrate with open source Fedora software.
我们正在研究将经典的软件可靠性工程(SRE)方法扩展到安全领域。我们将“经典”可靠性建模(当应用于在“正常”操作概要条件下发现的报告漏洞时)与面向安全的故障管理流程相结合。我们用开源的Fedora软件来说明。
{"title":"Non-operational testing of software for security issues","authors":"Shweta Subramani, M. Vouk, L. Williams","doi":"10.1109/ISSREW.2013.6688857","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688857","url":null,"abstract":"We are studying extension of the classical Software Reliability Engineering (SRE) methodology into the security space. We combine “classical” reliability modeling, when applied to reported vulnerabilities found under “normal” operational profile conditions, with safety oriented fault management processes. We illustrate with open source Fedora software.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1