期刊文献+

基于关联挖掘的软件错误定位方法 被引量:8

Mining Associations to Improve the Effectiveness of Fault Localization
下载PDF
导出
摘要 基于覆盖率的错误定位(Coverage Based Fault Localization,CBFL)方法旨在通过分析程序执行的结果预测错误信息,是一种行之有效的错误定位方法.然而,CBFL方法中代码覆盖率的独立统计忽略了程序内存在的复杂控制依赖和数据依赖,从而忽视了语句间的语义关系,影响错误定位的准确性.该文借助实例重点分析了基于代码覆盖率所得到的错误可疑度与错误代码的表现关系,指出现有CBFL方法的不足是片面地将基于覆盖率的错误可疑度直接作为错误代码判定的依据;提出程序失效规则及基于覆盖向量的覆盖信息分析模型,并在此模型基础之上,指出高可疑代码与错误代码在执行路径上的覆盖一致性,进而提出用以挖掘与高可疑代码相关联的错误代码的频繁集求解方法.以SIR基准程序为实验对象建立的受控实验结果表明,相比之前的研究,文中方法在一定程度上能够改进错误定位结果. Coverage-based fault localization (CBFL) techniques find the fault-related positions in programs by comparing the execution statistics of passed executions and failed executions have been proven to be efficient by several empirical studies. However, these techniques assess the suspiciousness of program entities individually, whereas the individual coverage information can- not reflect the complicated control- and data-dependency relationships, and thus oversimplify the execution spectra. In this paper, we first use motivating examples to show the impact of the cause-effect relationship on the effectiveness of CBFL. Second, we propose the rules of program failures and design the execution analysis model based on the coverage of different program execu tion spectrum. By computing the frequency items for statements with high suspiciousness, we al- so bring out the coverage vector to mine fault-prone statements. The controlled experiments based on the SIR benchmarks indicate that our technique is promising.
出处 《计算机学报》 EI CSCD 北大核心 2012年第12期2528-2540,共13页 Chinese Journal of Computers
基金 国家自然科学基金(90718006 60970114 61003027 61073006) 教育部博士研究生学术新人项目资助~~
关键词 软件调试 错误定位 关联挖掘 覆盖向量 频繁集 software debugging fault localization association mining coverage vector frequencyitems
  • 相关文献

参考文献2

二级参考文献54

  • 1Shaw M. Truth Vs. knowledge: The difference between what a component does and what we know it does//Proeeedings of the 8th International Workshop Software Specification and Design. Budapest, Hungary, 1996: 181- 185.
  • 2Binkley David. Source code analysis: A road map//Proceedings of the Future of Software Engineering. Minneapolis, MN, USA, 2007:104 -119.
  • 3Dwyer Matthew B, Hatcliff John, Robby, Pasareanu Corina S, Visser Willem. Formal software analysis emerging trends in software model cheeking//Proceedings of the Future of Software Engineering. Minneapolis, MN, USA, 2007: 120- 136.
  • 4Flemming Nielson, Hanne Riis Nielson, Chris Hankin. Principles of Program Analysis. Berlin, Germany: Springer Verlag, 2005.
  • 5Jackson Daniel, Rinard Martin. Software analysis: A roadmap//Proceedings of the Future of Software Engineering. Limerick, Ireland, 2000:133-145.
  • 6Aho Alfred V, Sethi Ravi, Ullman Jeffrey D. Compilers: Principles, Techniques, and Tools. New Jersey, USA: Addison-Wesley, 1986.
  • 7Clarke E M, Jr Grumberg O, Peled D A. Model Checking, Cambridge, MA: MIT Press, 2000.
  • 8Ball T, Rajamani S K. Automatically validating temporal safety properties of interfaces//Dwyer M B ed. Proceedings of the 8th SPIN Workshop. LNCS 2057. Springer, 2001:103-122.
  • 9Chen H, Wagner D A. MOPS: An infrastructure for examining security properties of software//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washengton, DC, USA, 2002:235-244.
  • 10Corbett J et al. Bandera: Extracting finite-state models from Java source code//Proceedings of the 22nd ICSE. Limerick, Ireland, 2000:439-458.

共引文献232

同被引文献184

  • 1董晓刚,杨孟飞.航天嵌入式软件缺陷的分类方法[J].空间控制技术与应用,2012,38(5):49-52. 被引量:3
  • 2徐宝文,聂长海,史亮,陈火旺.一种基于组合测试的软件故障调试方法[J].计算机学报,2006,29(1):132-138. 被引量:38
  • 3梁成才,章代雨,林海静.软件缺陷的综合研究[J].计算机工程,2006,32(19):88-90. 被引量:19
  • 4沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 5Jones J A,Harrold M J.Empirical evaluation of the Tarantula automatic fault localization technique[C]//Proc of the 20th IEEE International Conference on Automated Software Engineering.[S.l.]:ASE Press,2005:273-282.
  • 6Abreu R,Zoeteweij P,Gemund A.On the accuracy of spectrum based fault localization[C]//Proc of Testing:Academic and Indus-trial Conference.UK:AIC Press,2007:89-98.
  • 7Zhang Z,Chan W K,Tse T H.Capturing propagation of infected program states[C]//Proc of the 17th International Conference on Foundation of Software Engineering.Amsterdam,Nederland:FSE/ESEC Press,2009:43-52.
  • 8Wong W E,Qi Yu,Zhao Lei,et al.Effective fault localization using code coverage[C]//Proc of the 31st Annual International Computer Software and Applications Conference.2007.
  • 9Wong W E,Debroy V,Choi B.A family of code coverage-based heuristics for effective fault localization[J].The Journal of Systems and Software,2010,83(1):188-208.
  • 10Wong W E,Debroy V,Gao Ruizhi,et al.The DStar method for effective software fault localization[J].IEEE Trans on Reliability,2014,63(1):290-308.

引证文献8

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部