Filters








1,163 Hits in 8.7 sec

FixD : Fault Detection, Bug Reporting, and Recoverability for Distributed Applications

Cristian Tapus, David A. Noblet
2007 2007 IEEE International Parallel and Distributed Processing Symposium  
Model checking, logging, debugging, and checkpointing/recovery are great tools to identify bugs in small sequential programs.  ...  This paper presents the design of a hybrid tool, FixD , that attempts to address the deficiencies of these tools with respect to their application to distributed systems by using a novel composition of  ...  Once a bug is identified in the code and the Investigator provides execution traces of possible invariant violations, the programmer repairs the source code of the program and, as mentioned before, either  ... 
doi:10.1109/ipdps.2007.370413 dblp:conf/ipps/TapusN07 fatcat:pm52ct7mkjebzo3ai2xkknu3qa

GenProg: A Generic Method for Automatic Software Repair

Claire Le Goues, ThanhVu Nguyen, Stephanie Forrest, Westley Weimer
2012 IEEE Transactions on Software Engineering  
This paper describes GenProg, an automated method for repairing defects in off-the-shelf, legacy programs without formal specifications, program annotations, or special coding practices.  ...  GenProg uses an extended form of genetic programming to evolve a program variant that retains required functionality but is not susceptible to a given defect, using existing test suites to encode both  ...  Experimental results on 120K lines of program or module source code from programs totaling 1.25M lines of source code. We report averages for 100 random trials.  ... 
doi:10.1109/tse.2011.104 fatcat:5nxg5txfsfaqnc3xwnox5ucarq

Debug-Localize-Repair: A Symbiotic Construction for Heap Manipulations [article]

Sahil Verma, Subhajit Roy
2020 arXiv   pre-print
We evaluate our framework on 6400 buggy programs (generated using automated fault injection) on a variety of data-structures like singly, doubly, and circular linked lists, AVL trees, Red-Black trees,  ...  Wolverine also facilitates new debug-localize-repair possibilities, specification refinement, and checkpoint-based hopping.  ...  On the repair command, the driver invokes the repair module to request an automated repair based on the specification collected thus far.  ... 
arXiv:2011.13396v1 fatcat:ogr4hxl2rzfvvklzpxdlwrxobi

Automatic Software Repair

Martin Monperrus
2018 ACM Computing Surveys  
This article presents a survey on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs without human intervention.  ...  It provides a novel and structured overview of the diversity of bug oracles and repair operators used in the literature.  ...  BEHAVIORAL REPAIR Behavioral repair consists of changing the behavior of the program under repair, i.e. changing its code. The modification can be done on source code, but also on binary code (e.g.  ... 
doi:10.1145/3105906 fatcat:zbrbc6e22rdeja4vfrx7j57g5e

Patching as Translation: the Data and the Metaphor [article]

Yangruibo Ding, Baishakhi Ray, Premkumar Devanbu, Vincent J. Hellendoorn
2020 arXiv   pre-print
Our findings also lend strong support to the recent trend towards synthesizing edits of code conditional on the buggy context, to repair bugs.  ...  Yet a transplanted model's initial success at a given task does not necessarily mean it is well-suited for the task.  ...  How well does the NMT objective function apply to Automated Program Repair?  ... 
arXiv:2008.10707v1 fatcat:naybnampxjcajn7d3gklejpnuu

Automated software attack recovery using rollback and huddle

Jesse Sathre, Joseph Zambreno
2008 Design automation for embedded systems  
Our experimental results show that this approach could have a practical impact on modern computing system architectures, by allowing for the inclusion of low-overhead software security features while at  ...  Inspired by concepts made popular in the world of software debug, we propose the inclusion of extra on-chip hardware for the efficient storage and tracing of execution contexts.  ...  A separate approach [11, 29] for enforcing program flow, called whitebox training, involves analyzing source code to determine an acceptable pattern of function and system calls.  ... 
doi:10.1007/s10617-008-9020-4 fatcat:ztq5yovcsraqhmmekn6edmqg3q

IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper) [article]

Michael Norris, Berkay Celik, Patrick McDaniel, Gang Tan, Prasanna Venkatesh, Shulin Zhao, Anand Sivasubramaniam
2020 arXiv   pre-print
In this paper, we present IoTRepair, a fault-handling system for IoT that (1)integrates a fault identification module to track faulty devices,(2) provides a library of fault-handling functions for effectively  ...  handling different fault types, (3) provides a fault handler on top of the library for autonomous IoT fault handling, with user and developer configuration as input.  ...  The automated fault handler invokes faulthandling functions in customized orders and configures the functions automatically based on the IoT environment. • In designing IOTREPAIR, we propose a set of novel  ... 
arXiv:2002.07641v1 fatcat:bxzrqn2cwjc5dfkjrgthofgzjq

Leveraging Automated Unit Tests for Unsupervised Code Translation [article]

Baptiste Roziere, Jie M. Zhang, Francois Charton, Mark Harman, Gabriel Synnaeve, Guillaume Lample
2021 arXiv   pre-print
With little to no parallel data available for programming languages, unsupervised methods are well-suited to source code translation.  ...  Unfortunately, source code is highly sensitive to small changes; a single token can result in compilation failures or erroneous programs, unlike natural languages where small inaccuracies may not change  ...  CONCLUSION In this paper, we introduced a novel method to grow a parallel corpus for automated code translation, from completely monolingual data.  ... 
arXiv:2110.06773v1 fatcat:galfigcorvhsld3ncwwj4rt32y

Addressing failures in exascale computing

Marc Snir, Robert W Wisniewski, Jacob A Abraham, Sarita V Adve, Saurabh Bagchi, Pavan Balaji, Jim Belak, Pradip Bose, Franck Cappello, Bill Carlson, Andrew A Chien, Paul Coteus (+16 others)
2014 The international journal of high performance computing applications  
Executive Summary The current approach to resilience for large high-performance computing (HPC) machines is based on global application checkpoint/restart.  ...  errors Diagnosis: for identifying the root cause of a detected error Repair: for repairing or replacing failed components We discuss potential hardware approaches in Section 3 and potential software solutions  ...  Department of Energy for its financial support of ICiS; the ICiS director and steering committee for the support provided to our workshop; and, in particular, Cheryl Zidel for her outstanding administrative  ... 
doi:10.1177/1094342014522573 fatcat:menonpmgdfflzamz2fsivevxqm

Achieving Target MTTF by Duplicating Reliability-Critical Components in High Performance Computing Systems

Nithin Nakka, Alok Choudhary, Gary Grider, John Bent, James Nunez, Satsangat Khalsa
2011 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum  
Systems grouped based on hardware configuration showed similar improvements in MTTF when different components in them were targeted for fault-tolerance.  ...  Mean Time To failure, MTTF, is a commonly accepted metric for reliability. In this paper we present a novel approach to achieve the desired MTTF with minimum redundancy.  ...  Failure and repair logs are a valuable source of field failure information. The extent to which the logs aid in reliable design depends on the granularity at which the logging is performed.  ... 
doi:10.1109/ipdps.2011.311 dblp:conf/ipps/NakkaCGBNK11 fatcat:76fldlp3ufamdbsk5puczqost4

Automatically patching errors in deployed software

Jeff H. Perkins, Greg Sullivan, Weng-Fai Wong, Yoav Zibin, Michael D. Ernst, Martin Rinard, Sunghun Kim, Sam Larsen, Saman Amarasinghe, Jonathan Bachrach, Michael Carbin, Carlos Pacheco (+2 others)
2009 Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles - SOSP '09  
ClearView works on stripped Windows x86 binaries without any need for source code, debugging information, or other external information, and without human intervention.  ...  We present ClearView, a system for automatically patching errors in deployed software.  ...  We thank our DARPA program manager, Lee Badger, for his enthusiastic support and encouragement. Lee's vision and will-  ... 
doi:10.1145/1629575.1629585 dblp:conf/sosp/PerkinsKLABCPSSSWZER09 fatcat:nfrafyfkjnggfnkeyxaci2pkyq

State of the art of accessibility standards, evaluation tools, and technologies

Serena Caria, Fabio Paternò, Francesca Pulina, Carmen Santoro
2021 Zenodo  
We compared them based on some critical features at the end of the section.  ...  The deliverable also introduces metrics for accessibility evaluation, analyse relevant metrics for web accessibility, and report some research work that has been carried out on this topic, up to the most  ...  Technology FIT 15 (Germany), it provides its functionality as a web application and as a REST API for integration in Content Management Systems.  ... 
doi:10.5281/zenodo.5578666 fatcat:fzet5v2xxfe5xo3wm3aihlvvsy

Software-Based Online Detection of Hardware Defects Mechanisms, Architectural Support, and Evaluation

Kypros Constantinides, Onur Mutlu, Todd Austin, Valeria Bertacco
2007 Microarchitecture (MICRO), Proceedings of the Annual International Symposium on  
Based on a detailed RTL-level implementation of our technique, we find its area overhead to be quite modest, with only a 5.8% increase in total chip area.  ...  We evaluated our technique on a commercial chip-multiprocessor based on Sun's Niagara and found that it can provide very high coverage, with 99.22% of all silicon defects detected.  ...  We made this partition based on functionality, where each domain comprises a basic functionality module in the RTL code.  ... 
doi:10.1109/micro.2007.4408248 fatcat:rpb4hsd5t5dt3efxemlgy5bssm

Software-Based Online Detection of Hardware Defects Mechanisms, Architectural Support, and Evaluation

Kypros Constantinides, Onur Mutlu, Todd Austin, Valeria Bertacco
2007 40th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO 2007)  
Based on a detailed RTL-level implementation of our technique, we find its area overhead to be quite modest, with only a 5.8% increase in total chip area.  ...  We evaluated our technique on a commercial chip-multiprocessor based on Sun's Niagara and found that it can provide very high coverage, with 99.22% of all silicon defects detected.  ...  We made this partition based on functionality, where each domain comprises a basic functionality module in the RTL code.  ... 
doi:10.1109/micro.2007.34 dblp:conf/micro/ConstantinidesMAB07 fatcat:ho26hq4wz5ho7o45q27sjubcnq

CuPIDS: An exploration of highly focused, co-processor-based information system protection

Paul D. Williams, Eugene H. Spafford
2007 Computer Networks  
, raise an alarm, automatically repair the damage done by the fault or attack, allow the application to resume execution, and export a signature for the activity leading up to the error.  ...  One approach we examined has a protected application running on one processor in a symmetric multi-processing (SMP) system while a shadow process specific to that application runs on a different processor  ...  code is both novel and worthwhile.  ... 
doi:10.1016/j.comnet.2006.09.011 fatcat:ynphcaigvjarjcbold3ljvhxsu
« Previous Showing results 1 — 15 out of 1,163 results