File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Capturing propagation of infected program states

TitleCapturing propagation of infected program states
Authors
KeywordsBasic block
Control-flow edge
Edge profile
Fault localization
Issue Date2009
PublisherAssociation for Computing Machinery, Inc. The Journal's web site is located at http://www.acm.org/
Citation
Esec-Fse'09 - Proceedings Of The Joint 12Th European Software Engineering Conference And 17Th Acm Sigsoft Symposium On The Foundations Of Software Engineering, 2009, p. 43-52 How to Cite?
AbstractCoverage-based fault-localization techniques find the fault-related positions in programs by comparing the execution statistics of passed executions and failed executions. They assess the fault suspiciousness of individual program entities and rank the statements in descending order of their suspiciousness scores to help identify faults in programs. However, many such techniques focus on assessing the suspiciousness of individual program entities but ignore the propagation of infected program states among them. In this paper, we use edge profiles to represent passed executions and failed executions, contrast them to model how each basic block contributes to failures by abstractly propagating infected program states to its adjacent basic blocks through control flow edges. We assess the suspiciousness of the infected program states propagated through each edge, associate basic blocks with edges via such propagation of infected program states, calculate suspiciousness scores for each basic block, and finally synthesize a ranked list of statements to facilitate the identification of program faults. We conduct a controlled experiment to compare the effectiveness of existing representative techniques with ours using standard bench-marks. The results are promising. Copyright 2009 ACM.
DescriptionESEC/FSE (Conference)
This research is supported in part by the General Research Fund of the Research Grants Council of Hong Kong (project nos. 111107 and 716507).
Persistent Identifierhttp://hdl.handle.net/10722/93325
ISBN
ISI Accession Number ID
References

 

DC FieldValueLanguage
dc.contributor.authorZhang, Zen_HK
dc.contributor.authorChan, WKen_HK
dc.contributor.authorTse, THen_HK
dc.contributor.authorJiang, Ben_HK
dc.contributor.authorWang, Xen_HK
dc.date.accessioned2010-09-25T14:57:41Z-
dc.date.available2010-09-25T14:57:41Z-
dc.date.issued2009en_HK
dc.identifier.citationEsec-Fse'09 - Proceedings Of The Joint 12Th European Software Engineering Conference And 17Th Acm Sigsoft Symposium On The Foundations Of Software Engineering, 2009, p. 43-52en_HK
dc.identifier.isbn9781605580012-
dc.identifier.urihttp://hdl.handle.net/10722/93325-
dc.descriptionESEC/FSE (Conference)-
dc.descriptionThis research is supported in part by the General Research Fund of the Research Grants Council of Hong Kong (project nos. 111107 and 716507).-
dc.description.abstractCoverage-based fault-localization techniques find the fault-related positions in programs by comparing the execution statistics of passed executions and failed executions. They assess the fault suspiciousness of individual program entities and rank the statements in descending order of their suspiciousness scores to help identify faults in programs. However, many such techniques focus on assessing the suspiciousness of individual program entities but ignore the propagation of infected program states among them. In this paper, we use edge profiles to represent passed executions and failed executions, contrast them to model how each basic block contributes to failures by abstractly propagating infected program states to its adjacent basic blocks through control flow edges. We assess the suspiciousness of the infected program states propagated through each edge, associate basic blocks with edges via such propagation of infected program states, calculate suspiciousness scores for each basic block, and finally synthesize a ranked list of statements to facilitate the identification of program faults. We conduct a controlled experiment to compare the effectiveness of existing representative techniques with ours using standard bench-marks. The results are promising. Copyright 2009 ACM.en_HK
dc.languageengen_HK
dc.publisherAssociation for Computing Machinery, Inc. The Journal's web site is located at http://www.acm.org/-
dc.relation.ispartofESEC-FSE'09 - Proceedings of the Joint 12th European Software Engineering Conference and 17th ACM SIGSOFT Symposium on the Foundations of Software Engineeringen_HK
dc.rights© ACM, 2009. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in the Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC 2009/FSE-17), Amsterdam, The Netherlands, August 24-28, 2009, p. 43-52.-
dc.subjectBasic blocken_HK
dc.subjectControl-flow edgeen_HK
dc.subjectEdge profileen_HK
dc.subjectFault localizationen_HK
dc.titleCapturing propagation of infected program statesen_HK
dc.typeConference_Paperen_HK
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=9781605580012 &volume=&spage=43&epage=52&date=2009&atitle=Capturing+propagation+of+infected+program+states-
dc.identifier.emailTse, TH: thtse@cs.hku.hken_HK
dc.identifier.authorityTse, TH=rp00546en_HK
dc.description.naturepostprint-
dc.identifier.doi10.1145/1595696.1595705en_HK
dc.identifier.scopuseid_2-s2.0-77949365707en_HK
dc.identifier.hkuros155837en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-77949365707&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.spage43en_HK
dc.identifier.epage52en_HK
dc.identifier.isiWOS:000295315700006-
dc.identifier.scopusauthoridZhang, Z=10639502200en_HK
dc.identifier.scopusauthoridChan, WK=23967779900en_HK
dc.identifier.scopusauthoridTse, TH=7005496974en_HK
dc.identifier.scopusauthoridJiang, B=35199818000en_HK
dc.identifier.scopusauthoridWang, X=34769103600en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats