Filters








18 Hits in 6.0 sec

Better Debugging via Output Tracing and Callstack-Sensitive Slicing

S. Horwitz, B. Liblit, M. Polishchuk
2010 IEEE Transactions on Software Engineering  
Index Terms-Static program slicing, callstack-sensitive analysis, points of failure, output tracing and attribution.  ...  Finally, we apply our point-of-failure tools to a suite of buggy programs and evaluate callstack-sensitive slicing and slice intersection as applied to debugging.  ...  ACKNOWLEDGMENTS This work was supported in part by AFOSR grant FA9550-07-1-0210; LLNL contract B580360; and the US National Science Foundation (NSF) grants CCF-0621487, CCF-0701957, CCR-0305387, and CNS  ... 
doi:10.1109/tse.2009.66 fatcat:p5bjvimgizhxpjapvh7em6konq

Identifying Degree and Sources of Non-Determinism in MPI Applications via Graph Kernels

Dylan Chapp, Nigel Tan, Sanjukta Bhowmick, Michela Taufer
2021 IEEE Transactions on Parallel and Distributed Systems  
As the scientific community prepares to deploy an increasingly complex and diverse set of applications on exascale platforms, the need to assess reproducibility of simulations and identify the root causes  ...  To address this challenge, we propose a software framework for identifying the percentage and sources of communication nondeterminism.  ...  Callstacks involved in mesh refinement and load-balancing cumulatively make up ≈ 90% of all callstacks extracted from anomalous slices.  ... 
doi:10.1109/tpds.2021.3081530 fatcat:j4g3xrxtvfa75ivix47pio7uee

Lightweight control-flow instrumentation and postmortem analysis in support of debugging

Peter Ohmann, Ben Liblit
2016 Automated Software Engineering : An International Journal  
Debugging is difficult and costly. As a programmer looks for a bug, it would be helpful to see a complete trace of events leading to the point of failure.  ...  For example, our analyses shrink stack-sensitive interprocedural static slices by 53%-78% in larger applications.  ...  Wisconsin Alumni Research Foundation; and a CodeSurfer license generously provided by GrammaTech, Inc.  ... 
doi:10.1007/s10515-016-0190-1 fatcat:hw4pcm5ghray5n44y6hpdzx4im

Lightweight control-flow instrumentation and postmortem analysis in support of debugging

Peter Ohmann, Ben Liblit
2013 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE)  
Debugging is difficult and costly. As a programmer looks for a bug, it would be helpful to see a complete trace of events leading to the point of failure.  ...  For example, our analyses shrink stack-sensitive interprocedural static slices by 53%-78% in larger applications.  ...  Wisconsin Alumni Research Foundation; and a CodeSurfer license generously provided by GrammaTech, Inc.  ... 
doi:10.1109/ase.2013.6693096 dblp:conf/kbse/OhmannL13 fatcat:awa724h3anez7htlmia2ocu5gq

Repeatable Reverse Engineering with PANDA

Brendan Dolan-Gavitt, Josh Hodosh, Patrick Hulin, Tim Leek, Ryan Whelan
2015 Proceedings of the 5th Program Protection and Reverse Engineering Workshop on - PPREW-5  
and uncovering the censorship activities and mechanisms of an IM client.  ...  We demonstrate PANDA's effectiveness via a number of use cases, including enabling an old but legitimately purchased game to run despite a lost CD key, in-depth diagnosis of an Internet Explorer crash,  ...  Via RE, the inputs and outputs, the dependencies and requirements can be enumerated in detail, and appropriate shims fashioned to be able to run the old code in a more modern environment.  ... 
doi:10.1145/2843859.2843867 dblp:conf/acsac/Dolan-GavittHHL15 fatcat:bv2jyc5n4fd4rofa7mkuplvwce

Bug Localization in Test-Driven Development

Massimo Ficco, Roberto Pietrantuono, Stefano Russo
2011 Advances in Software Engineering  
TDD allows to produce software by iterative and incremental work cycle, and with a strict control over the process, favouring an early detection of bugs.  ...  In such systems, the propagation chains following the bugs activation can be unacceptably long and intricate, and the size of the code to be analyzed is often too large.  ...  A recent approach based on dynamic 3 see "the Daikon Invariant Detector", http://groups.csail.mit.edu/pag/daikon/ slicing is proposed in [23] , which through a callstack-sensitive slicing and slices intersection  ... 
doi:10.1155/2011/492757 fatcat:l7zepqs62vfhbeelr6qppm6u74

JSAI: a static analysis platform for JavaScript

Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, Ben Hardekopf
2014 Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2014  
Part of JSAI's novelty is user-configurable analysis sensitivity, i.e., context-, path-, and heap-sensitivity.  ...  We have also used JSAI to build a static program slicing [48] client and to build a novel abstract slicing [49] client. These are only a few examples of JSAI's usefulness.  ...  This work was supported by NSF CCF-1319060 and CCF-1117165.  ... 
doi:10.1145/2635868.2635904 dblp:conf/sigsoft/KashyapDKWGSWH14 fatcat:nvhqwr7nqbg2fkor673vgnv23y

On PDG-based noninterference and its modular proof

Daniel Wasserrab, Denis Lohner, Gregor Snelting
2009 Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security - PLAS '09  
IFC based on slicing and PDGs is flow-sensitive, context-sensitive, and object-sensitive; thus offering more precision than traditional approaches.  ...  The new proof is based on a new correctness proof for intraprocedural PDGs and program slices. Both proofs are formalized in Isabelle/HOL.  ...  Exploiting modern program analysis will avoid such problems, as modern analysis and slicing is flow-sensitive, context-sensitive, and object sensitive.  ... 
doi:10.1145/1554339.1554345 dblp:conf/pldi/WasserrabLS09 fatcat:l43fltkd7zddpbh5gxpz2duyb4

Repeatable Reverse Engineering for the Greater Good with PANDA

Brendan F. Dolan-Gavitt, Josh Hodosh, Patrick Hulin, Tim Leek, Ryan Whelan
2017
, and uncovering the censorship activities and mechanisms of a Chinese IM client.  ...  We demonstrate PANDA's effectiveness via a number of use cases, including enabling an old but legitimate version of Starcraft to run despite a lost CD key, in-depth diagnosis of an Internet Explorer crash  ...  Via RE, the inputs and outputs, the dependencies and requirements can be enumerated in detail, and appropriate shims fashioned to be able to run the old code in a more modern environment.  ... 
doi:10.7916/d8wm1c1p fatcat:tu3753jycndmrdoyijimbjj7cy

Regression testing minimization, selection and prioritization: a survey

S. Yoo, M. Harman
2012 Software testing, verification & reliability  
It means that the existing test cases can be reused without changing their input/output relation. Leung and White categorise test cases into five classes.  ...  This paper surveys each area of minimisation, selection and prioritisation technique and discusses open problems and potential directions for future research.  ...  Mark Harman is supported by EPSRC Grants EP/D050863, GR/S93684 & GR/T22872, by EU grant IST-33472 (EvoTest) and also by the kind support of DaimlerChrysler Berlin and Vizuri Ltd., London.  ... 
doi:10.1002/stv.430 fatcat:kg5sgywm4jfqjl5eiz6ols6x4a

Execution Synthesis: A Technique for Automating the Debugging of Software

Cristian Zamfir
2013
Abstract Debugging real systems is hard, requires deep knowledge of the target code, and is time-consuming.  ...  The thesis also shows how execution synthesis can be combined with recording techniques in order to automatically classify data races and to efficiently debug deadlock bugs.  ...  If developers had a better way to triage, analyze, and debug these failures, they would spend less time debugging and more time implementing useful features.  ... 
doi:10.5075/epfl-thesis-5914 fatcat:xzex5ojuh5fc3ja7lvhlfbubc4

High-Performance JavaScript [chapter]

Colt McAnlis, Petter Lubbers, Brandon Jones, Duncan Tebbs, Andrzej Manzur, Sean Bennett, Florian d'Erfurth, Bruno Garcia, Shun Lin, Ivan Popelyshev, Jason Gauci, Jon Howard (+8 others)
2014 HTML5 Game Development Insights  
, and more.  ...  TM This book uses RepKover™, a durable and flexible lay-flat binding.  ...  #ifdef DEBUG YAHOO.log("Log this in debug mode only"); #endif ... } yahoo.js, dom.js and event.js 192,164 bytes yahoo.js, dom.js and event.js + JSMin 47,316 bytes yahoo.js, dom.js and event.js  ... 
doi:10.1007/978-1-4302-6698-3_3 fatcat:p5tifnxeq5h5rmgyhuyzxoxtxm

From Formal Semantics to Verified Slicing : A Modular Framework with Applications in Language Based Security

Daniel Wasserrab
2011
This book presents a modular framework for slicing in the proof assistant Isabelle/HOL which is based on abstract control flow graphs.  ...  Via these annotations, noninterference algorithms allow arbitrary intermediate in-and output, both secret and public.  ...  Then, slicing is applied only in this concrete situation. These approaches can be subsumed under dynamic slicing, and are applied in e.g. debugging [142] .  ... 
doi:10.5445/ksp/1000020678 fatcat:go6vijaoqzdfhfy7ooha55377a

Making the Most of Structure in Constraint Models

KEVIN LEO
2017
In particular, it proposes a framework for extracting and using structure to solve problems faster and to help users write better models and debug them.  ...  This thesis focuses on model structure, showing how it can be exploited to improve compilation and solving.  ...  modeller trying to debug the output program) that these constraints are related in any way.  ... 
doi:10.4225/03/596daeeccfcd8 fatcat:6a5aoks3grhurhhg2i4ldfcxk4

Automated Program Transformation for Improving Software Quality

Rijnard Van Tonder
2019
Millions of dollars and thousands of developer-hours are spent finding bugs, debugging the root cause, writing a patch, and reviewing fixes.  ...  The thesis is that automated syntactic and semantic search and application of program transformations enables efficient, scalable, and unassisted techniques for improving the effectiveness of existing  ...  First, patches can be used as better bug reports [204] , supporting human triage and debugging.  ... 
doi:10.1184/r1/9989393.v1 fatcat:wvqcqeompnhungzw4ntekf2iru
« Previous Showing results 1 — 15 out of 18 results