Interactive semi-automated specification mining for debugging: An experience report

Information and Software Technology - Tập 113 - Trang 20-38 - 2019
Mohammad Jafar Mashhadi1, Taha R. Siddiqui2, Hadi Hemmati1, Howard Loewen3
1Department of Electrical & Computer Engineering, University of Calgary, AB, Canada
2InfoMagnetics Technologies Corp, Winnipeg, MB, Canada
3MicroPilot Inc., Winnipeg, MB, Canada

Tài liệu tham khảo

Ackermann, 2010, Automatic requirement extraction from test cases, 1 Al-Sharif, 2009 Biermann, 1972, On the synthesis of finite-state machines from samples of their behavior, IEEE Trans. Comput., 100, 592, 10.1109/TC.1972.5009015 Böhme, 2017, Where is the bug and how is it fixed? An experiment with practitioners, 1 Bruneliere, 2014, Modisco: a model driven reverse engineering framework, Inf. Softw. Technol., 56, 1012, 10.1016/j.infsof.2014.04.007 Cheng, 2009, Identifying bug signatures using discriminative graph mining, 141 Christodorescu, 2007, Mining specifications of malicious behavior, 5 Cook, 1998, Discovering models of software processes from event-based data, ACM Trans. Softw. Eng. Methodol., 7, 215, 10.1145/287000.287001 Cornelissen, 2009, A systematic survey of program comprehension through dynamic analysis, IEEE Trans. Softw. Eng., 35, 684, 10.1109/TSE.2009.28 Dallmeier, 2010, Generating test cases for specification mining, 85 Dallmeier, 2006, Mining object behavior with ADABU, 17 Dallmeier, 2009, Generating fixes from object behavior anomalies, 550 Damas, 2005, Generating annotated behavior models from end-user scenarios, IEEE Trans. Softw. Eng., 31, 1056, 10.1109/TSE.2005.138 Dupont, 2008, The QSM algorithm and its application to software behavior model induction, Appl. Artif. Intell., 22, 77, 10.1080/08839510701853200 Ernst, 2007, The Daikon system for dynamic detection of likely invariants, Sci. Comput. Program., 69, 35, 10.1016/j.scico.2007.01.015 Fraser, 2012, Behaviourally adequate software testing, 300 Friedrich, 1999, Model-based diagnosis of hardware designs, Artif. Intell., 111, 3, 10.1016/S0004-3702(99)00034-X Goldstein, 2017, Experience report: Log-based behavioral differencing, 282 Guest, 2006, How many interviews are enough? An experiment with data saturation and variability, Field Methods, 18, 59, 10.1177/1525822X05279903 Hassan, 2015, Software reverse engineering to requirement engineering for evolution of legacy system, 1 Hemmati, 2017, Analytics-based safety monitoring and verification, 3608 D. Hiebert, Exuberant ctags, 1999. Hsu, 2008, Rapid: Identifying bug signatures to support debugging activities, 439 Isenberg, 2013, A systematic review on the practice of evaluating visualization, IEEE Trans. Vis. Comput. Graph., 19, 2818, 10.1109/TVCG.2013.126 Krka, 2010, Using dynamic execution traces and program invariants to enhance behavioral model inference, 179 Lang, 1998, Results of the Abbadingo one DFA learning competition and a new evidence-driven state merging algorithm, 1 Le, 2015, Synergizing specification miners through model fissions and fusions (t), 115 Lemieux, 2015, General LTL specification mining (t), 81 Lo, 2011 Lo, 2008, Mining scenario-based triggers and effects, 109 Lo, 2009, Mining hierarchical scenario-based specifications, 359 Lo, 2012, Scenario-based and value-based specification mining: better together, Autom. Softw. Eng., 19, 423, 10.1007/s10515-012-0103-x Lo, 2007, Mining modal scenario-based specifications from execution traces of reactive systems, 465 Lo, 2012, Learning extended FSA from software: an empirical assessment, J. Syst. Softw., 85, 2063, 10.1016/j.jss.2012.04.001 Lorenzoli, 2008, Automatic generation of software behavioral models, 501 Malik, 2013, Automatic detection of performance deviations in the load testing of large scale systems, 1012 Maoz, 2009, Using model-based traces as runtime models, Computer (Long Beach Calif), 42, 28 Mateis, 2000, Modeling java programs for diagnosis, 171 Mayer, 2007, Model-based debugging–state of the art and future challenges, Electron. Notes Theor. Comput. Sci., 174, 61, 10.1016/j.entcs.2006.12.030 Neil Walkinshaw, Model inference tool, 2018. https://github.com/neilwalkinshaw/mintframework, Last accessed on 2019-02-25. Nielsen, 1990, Heuristic evaluation of user interfaces, 249 Parmar, 2016, Software fault localization: a survey, Int. J. Comput. Appl., 154, 6 Pradel, 2010, A framework for the evaluation of specification miners based on finite state machines, 1 Pradel, 2012, Leveraging test generation and specification mining for automated bug detection without false positives, 288 Shang, 2013, Assisting developers of Big Data analytics applications when deploying on Hadoop clouds, 402 Shoham, 2008, Static specification mining using automata-based abstractions, IEEE Trans. Softw. Eng., 34, 651, 10.1109/TSE.2008.63 Spinellis, 2016 Sun, 2013, Mining succinct predicated bug signatures, 576 Taylor, 2012, Using behaviour inference to optimise regression test sets, 184 Valdes, 2000, Adaptive, model-based monitoring for cyber attack detection, 80 Valdes, 2000, Adaptive, model-based monitoring for cyber attack detection, 80 Walkinshaw, 2008, Inferring finite-state models with temporal constraints, 248 Walkinshaw, 2007, Reverse engineering state machines by interactive grammar inference, 209 Walkinshaw, 2007, Reverse engineering state machines by interactive grammar inference, 209 Walkinshaw, 2016, Inferring extended finite state machine models from software executions, Empir. Softw. Eng., 21, 811, 10.1007/s10664-015-9367-7 Wong, 2016, A survey on software fault localization, IEEE Trans. Softw. Eng., 42, 707, 10.1109/TSE.2016.2521368 Xia, 2017, “Automated debugging considered harmful” considered harmful: a user study revisiting the usefulness of spectra-based fault localization techniques with professionals using real bugs from large systems, 267 Xie, 2016, Revisit of automatic debugging via human focus-tracking analysis, 808 Yan, 2008, Mining significant graph patterns by leap search, 433 Ziadi, 2014, Towards a language-independent approach for reverse-engineering of software product lines, 1064 Zuo, 2014, Efficient predicated bug signature mining via hierarchical instrumentation, 215