Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/1595696.1595705
- Scopus: eid_2-s2.0-77949365707
- WOS: WOS:000295315700006
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Capturing propagation of infected program states
Title | Capturing propagation of infected program states |
---|---|
Authors | |
Keywords | Basic block Control-flow edge Edge profile Fault localization |
Issue Date | 2009 |
Publisher | Association for Computing Machinery, Inc. The Journal's web site is located at http://www.acm.org/ |
Citation | Esec-Fse'09 - Proceedings Of The Joint 12Th European Software Engineering Conference And 17Th Acm Sigsoft Symposium On The Foundations Of Software Engineering, 2009, p. 43-52 How to Cite? |
Abstract | Coverage-based fault-localization techniques find the fault-related positions in programs by comparing the execution statistics of passed executions and failed executions. They assess the fault suspiciousness of individual program entities and rank the statements in descending order of their suspiciousness scores to help identify faults in programs. However, many such techniques focus on assessing the suspiciousness of individual program entities but ignore the propagation of infected program states among them. In this paper, we use edge profiles to represent passed executions and failed executions, contrast them to model how each basic block contributes to failures by abstractly propagating infected program states to its adjacent basic blocks through control flow edges. We assess the suspiciousness of the infected program states propagated through each edge, associate basic blocks with edges via such propagation of infected program states, calculate suspiciousness scores for each basic block, and finally synthesize a ranked list of statements to facilitate the identification of program faults. We conduct a controlled experiment to compare the effectiveness of existing representative techniques with ours using standard bench-marks. The results are promising. Copyright 2009 ACM. |
Description | ESEC/FSE (Conference) This research is supported in part by the General Research Fund of the Research Grants Council of Hong Kong (project nos. 111107 and 716507). |
Persistent Identifier | http://hdl.handle.net/10722/93325 |
ISBN | |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhang, Z | en_HK |
dc.contributor.author | Chan, WK | en_HK |
dc.contributor.author | Tse, TH | en_HK |
dc.contributor.author | Jiang, B | en_HK |
dc.contributor.author | Wang, X | en_HK |
dc.date.accessioned | 2010-09-25T14:57:41Z | - |
dc.date.available | 2010-09-25T14:57:41Z | - |
dc.date.issued | 2009 | en_HK |
dc.identifier.citation | Esec-Fse'09 - Proceedings Of The Joint 12Th European Software Engineering Conference And 17Th Acm Sigsoft Symposium On The Foundations Of Software Engineering, 2009, p. 43-52 | en_HK |
dc.identifier.isbn | 9781605580012 | - |
dc.identifier.uri | http://hdl.handle.net/10722/93325 | - |
dc.description | ESEC/FSE (Conference) | - |
dc.description | This research is supported in part by the General Research Fund of the Research Grants Council of Hong Kong (project nos. 111107 and 716507). | - |
dc.description.abstract | Coverage-based fault-localization techniques find the fault-related positions in programs by comparing the execution statistics of passed executions and failed executions. They assess the fault suspiciousness of individual program entities and rank the statements in descending order of their suspiciousness scores to help identify faults in programs. However, many such techniques focus on assessing the suspiciousness of individual program entities but ignore the propagation of infected program states among them. In this paper, we use edge profiles to represent passed executions and failed executions, contrast them to model how each basic block contributes to failures by abstractly propagating infected program states to its adjacent basic blocks through control flow edges. We assess the suspiciousness of the infected program states propagated through each edge, associate basic blocks with edges via such propagation of infected program states, calculate suspiciousness scores for each basic block, and finally synthesize a ranked list of statements to facilitate the identification of program faults. We conduct a controlled experiment to compare the effectiveness of existing representative techniques with ours using standard bench-marks. The results are promising. Copyright 2009 ACM. | en_HK |
dc.language | eng | en_HK |
dc.publisher | Association for Computing Machinery, Inc. The Journal's web site is located at http://www.acm.org/ | - |
dc.relation.ispartof | ESEC-FSE'09 - Proceedings of the Joint 12th European Software Engineering Conference and 17th ACM SIGSOFT Symposium on the Foundations of Software Engineering | en_HK |
dc.rights | © ACM, 2009. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in the Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC 2009/FSE-17), Amsterdam, The Netherlands, August 24-28, 2009, p. 43-52. | - |
dc.subject | Basic block | en_HK |
dc.subject | Control-flow edge | en_HK |
dc.subject | Edge profile | en_HK |
dc.subject | Fault localization | en_HK |
dc.title | Capturing propagation of infected program states | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=9781605580012 &volume=&spage=43&epage=52&date=2009&atitle=Capturing+propagation+of+infected+program+states | - |
dc.identifier.email | Tse, TH: thtse@cs.hku.hk | en_HK |
dc.identifier.authority | Tse, TH=rp00546 | en_HK |
dc.description.nature | postprint | - |
dc.identifier.doi | 10.1145/1595696.1595705 | en_HK |
dc.identifier.scopus | eid_2-s2.0-77949365707 | en_HK |
dc.identifier.hkuros | 155837 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-77949365707&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 43 | en_HK |
dc.identifier.epage | 52 | en_HK |
dc.identifier.isi | WOS:000295315700006 | - |
dc.identifier.scopusauthorid | Zhang, Z=10639502200 | en_HK |
dc.identifier.scopusauthorid | Chan, WK=23967779900 | en_HK |
dc.identifier.scopusauthorid | Tse, TH=7005496974 | en_HK |
dc.identifier.scopusauthorid | Jiang, B=35199818000 | en_HK |
dc.identifier.scopusauthorid | Wang, X=34769103600 | en_HK |