Filters








2,309 Hits in 4.0 sec

Unveiling Exception Handling Bug Hazards in Android Based on GitHub and Google Code Issues

Roberta Coelho, Lucas Almeida, Georgios Gousios, Arie van Deursen
2015 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories  
[43] conducted an empirical study on the usefulness of stack traces for bug fixing and showed that developers fixed the bugs faster when failing stack traces were included on bug issues.  ...  [48] propose an approach to identify correlated crash types and describe a fault localization method to locate and rank files related to the bug described on a stack trace. Schroter et al.  ... 
doi:10.1109/msr.2015.20 dblp:conf/msr/CoelhoAGD15 fatcat:jajn7ijhkjbldowpstdfaxx3ua

Exception handling bug hazards in Android

Roberta Coelho, Lucas Almeida, Georgios Gousios, Arie van Deursen, Christoph Treude
2016 Empirical Software Engineering  
To that end, we first provide a detailed empirical study of over 6,000 Java exception stack traces we extracted from over 600 open source Android projects.  ...  The results corroborate the stack trace findings, and indicate that developers are unaware of frequently occurring undocumented exception handling behavior.  ...  [48] conducted an empirical study on the usefulness of stack traces for bug fixing and showed that developers fixed the bugs faster when failing stack traces were included in bug issues.  ... 
doi:10.1007/s10664-016-9443-7 fatcat:ypqsntbasngw7lqmvzubiixcdi

BuGL – A Cross-Language Dataset for Bug Localization [article]

Sandeep Muvva, A Eashaan Rao, Sridhar Chimalakonda
2020 arXiv   pre-print
The existing dataset do not comprise projects of other programming languages, despite of the need to investigate specific and cross project bug localization.  ...  In this paper, we present BuGL, a large-scale cross-language dataset.  ...  It also accommodates stack traces and code snippets, that provide structured information related to a bug [16] .  ... 
arXiv:2004.08846v1 fatcat:lchxc6j27ffndaa7usnzf5lgui

Severity Prediction for Bug Reports Using Multi-Aspect Features: A Deep Learning Approach

Anh-Hien Dao, Cheng-Zen Yang
2021 Mathematics  
The severity of software bug reports plays an important role in maintaining software quality. Many approaches have been proposed to predict the severity of bug reports using textual information.  ...  bug reports to improve prediction performance.  ...  MASP uses a parser to calculate the number of steps in each bug report. (2) The line number of stack traces q S i : Stack traces reveal the execution information of call stacks.  ... 
doi:10.3390/math9141644 fatcat:yyxhwfhuhvgefpzzvv7p6g5m4u

TFix+: Self-configuring Hybrid Timeout Bug Fixing for Cloud Systems [article]

Jingzhu He, Ting Dai, Xiaohui Gu
2021 arXiv   pre-print
TFix+ further provides prediction-driven timeout variable configuration based on runtime function tracing.  ...  In this paper, we present TFix+, a self-configuring timeout bug fixing framework for automatically correcting two major kinds of timeout bugs (i.e., misused timeout bugs and missing timeout bugs) with  ...  :139) Fig. 6: A stack trace snippet of a blocking bug, i.e., Mapreduce-5066 bug.  ... 
arXiv:2110.04101v1 fatcat:bgnjrhmgzndvfc5bf3h77cghve

On fault resilience of OpenStack

Xiaoen Ju, Livio Soares, Kang G. Shin, Kyung Dong Ryu, Dilma Da Silva
2013 Proceedings of the 4th annual Symposium on Cloud Computing - SOCC '13  
Cloud-management stacks have become an increasingly important element in cloud computing, serving as the resource manager of cloud platforms.  ...  fault-injection framework targeting service communications during the processing of external requests, both among OpenStack services and between OpenStack and external services, and have thus far uncovered 23 bugs  ...  The work reported in this paper was supported in part by the US Air Force Office of Scientific Research under Grant No. FA9550-10-1-0393.  ... 
doi:10.1145/2523616.2523622 dblp:conf/cloud/JuSSRS13 fatcat:ywt6upbnhrdwtnfh2okzcvwxsu

CRETE: A Versatile Binary-Level Concolic Testing Framework [chapter]

Bo Chen, Christopher Havlicek, Zhenkun Yang, Kai Cong, Raghudeep Kannavara, Fei Xie
2018 Lecture Notes in Computer Science  
The evaluation of TianoCore utility programs found numerous exploitable bugs that were previously unreported.  ...  The standardized execution traces are llvm-based, self-contained, and composable, providing succinct and sufficient information for symbolic execution engines to reproduce the concrete executions.  ...  TianoCore utility programs are part of the open-source project EDK2 [42], a cross-platform firmware development environment from Intel. It includes 16 command-line programs used to build BIOS images.  ... 
doi:10.1007/978-3-319-89363-1_16 fatcat:yo57gft65bamfkhpdbnb7z5uki

A Systematic Study of Duplicate Bug Report Detection

Som Gupta, Sanjai Kumar
2021 International Journal of Advanced Computer Science and Applications  
In open source projects, open bug repositories are used to maintain the bug reports.  ...  Bug Tracking Systems are usually used to maintain the bug reports and are the most consulted resource during the maintenance process.  ...  used to map the stack traces to generate feature vectors.  ... 
doi:10.14569/ijacsa.2021.0120167 fatcat:twtget3horgrtnut46bl3mxtqq

Catch me if you can

Milan Jovic, Andrea Adamoli, Matthias Hauswirth
2011 SIGPLAN notices  
We evaluate our approach with an experiment where we monitor an application used by 24 users for 1958 hours over the course of 3-months.  ...  But do they find performance bugs -performance problems that real users actually notice?  ...  [17] present an approach for finding correctness bugs by correlating the value of predicates inserted at specific program points with the occurrences of failures.  ... 
doi:10.1145/2076021.2048081 fatcat:skeyg6tlkfdbhoivd57xmcauna

Declarative tracepoints

Qing Cao, Tarek Abdelzaher, John Stankovic, Kamin Whitehouse, Liqian Luo
2008 Proceedings of the 6th ACM conference on Embedded network sensor systems - SenSys '08  
to detect real bugs using case studies of three bugs based on the development of the LiteOS operating system.  ...  Effective debugging usually involves watching program state to diagnose bugs.  ...  To correlate the incorrect modifications with their origins, we also use TraceSQL to capture the traces of system calls, a technique we introduced earlier in Section 6.1.  ... 
doi:10.1145/1460412.1460422 dblp:conf/sensys/CaoASWL08 fatcat:4ctghnzlx5esxom3hiyjgseyvq

A Deep Learning Technique Based Duplicate Bug Report Detection and Classification System

Ashima Kukkar, Rajni Mohana, Yugal Kumar, Anand Nayyar, Muhammad Bilal, Kyung S. Kwak
2020 IEEE Access  
In proposed approach, the graph of same bug reports stacks traces is created to combine the multiple stack traces.  ...  In second part, extracted features are used to measure the similarity between stack traces of new and historical bug reports.  ... 
doi:10.1109/access.2020.3033045 fatcat:i6wqsk4nszfutjkbahsmxrcwlm

Investigation of failure causes in workload-driven reliability testing

Domenico Cotroneo, Roberto Pietrantuono, Leonardo Mariani, Fabrizio Pastore
2007 Fourth international workshop on Software quality assurance in conjunction with the 6th ESEC/FSE joint meeting - SOQUA '07  
Virtual execution environments and middleware are required to be extremely reliable because applications running on top of them are developed assuming their correctness, and platform-level failures can  ...  Since software platforms and middleware are often executed for long time without any interruption, large part of the testing process is devoted to investigate their behavior when long and stressful executions  ...  An HLL-VM is a VM which i) adds support for cross-platform programming, ii) provides a virtual Instruction Set Architecture (ISA), and iii) abstracts the Application Binary Interface (ABI) and the ISA  ... 
doi:10.1145/1295074.1295089 dblp:conf/soqua/CotroneoPMP07 fatcat:pkybfzc5azevjpjva7gylt4aoy

A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities [article]

Jukka Ruohonen, Luca Allodi
2018 arXiv   pre-print
Bug bounties have become increasingly popular in recent years. This paper discusses bug bounties by framing these theoretically against so-called platform economy.  ...  The platform has also attracted many productive hackers, (ii) but there exists a large productivity gap, which likely relates to (iii) a knowledge gap and the use of automated tools for web vulnerability  ...  continue to use the platform.  ... 
arXiv:1805.09850v1 fatcat:fbierkmbwzaedcrds6zgm5ygc4

Monitoring and Debugging DryadLINQ Applications with Daphne

Vilas Jagannath, Zuoning Yin, Mihai Budiu
2011 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum  
We have erred towards portability: to provide cross-platform functionality, the JOM uses a minimal amount of platform-specific data.  ...  The vertex runtime attempts to trap all unhandled exceptions and to save the managed stack trace at the exception point, but some vertex errors do not generate stack traces (in particular, stack overflow  ... 
doi:10.1109/ipdps.2011.268 dblp:conf/ipps/JagannathYB11 fatcat:kegnamvvvza2ndrbxypwjv264i

NodeMD

Veljko Krunic, Eric Trumpler, Richard Han
2007 Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07  
identify the correlation.  ...  In the second trace section, the same set of code is run with the OS bug fixed.  ... 
doi:10.1145/1247660.1247669 dblp:conf/mobisys/KrunicTH07 fatcat:r22agysewrcw5opswvcugborfu
« Previous Showing results 1 — 15 out of 2,309 results