A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Unveiling Exception Handling Bug Hazards in Android Based on GitHub and Google Code Issues
2015
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories
[43] conducted an empirical study on the usefulness of stack traces for bug fixing and showed that developers fixed the bugs faster when failing stack traces were included on bug issues. ...
[48] propose an approach to identify correlated crash types and describe a fault localization method to locate and rank files related to the bug described on a stack trace. Schroter et al. ...
doi:10.1109/msr.2015.20
dblp:conf/msr/CoelhoAGD15
fatcat:jajn7ijhkjbldowpstdfaxx3ua
Exception handling bug hazards in Android
2016
Empirical Software Engineering
To that end, we first provide a detailed empirical study of over 6,000 Java exception stack traces we extracted from over 600 open source Android projects. ...
The results corroborate the stack trace findings, and indicate that developers are unaware of frequently occurring undocumented exception handling behavior. ...
[48] conducted an empirical study on the usefulness of stack traces for bug fixing and showed that developers fixed the bugs faster when failing stack traces were included in bug issues. ...
doi:10.1007/s10664-016-9443-7
fatcat:ypqsntbasngw7lqmvzubiixcdi
BuGL – A Cross-Language Dataset for Bug Localization
[article]
2020
arXiv
pre-print
The existing dataset do not comprise projects of other programming languages, despite of the need to investigate specific and cross project bug localization. ...
In this paper, we present BuGL, a large-scale cross-language dataset. ...
It also accommodates stack traces and code snippets, that provide structured information related to a bug [16] . ...
arXiv:2004.08846v1
fatcat:lchxc6j27ffndaa7usnzf5lgui
Severity Prediction for Bug Reports Using Multi-Aspect Features: A Deep Learning Approach
2021
Mathematics
The severity of software bug reports plays an important role in maintaining software quality. Many approaches have been proposed to predict the severity of bug reports using textual information. ...
bug reports to improve prediction performance. ...
MASP uses a parser to calculate the number of steps in each bug report. (2) The line number of stack traces q S i : Stack traces reveal the execution information of call stacks. ...
doi:10.3390/math9141644
fatcat:yyxhwfhuhvgefpzzvv7p6g5m4u
TFix+: Self-configuring Hybrid Timeout Bug Fixing for Cloud Systems
[article]
2021
arXiv
pre-print
TFix+ further provides prediction-driven timeout variable configuration based on runtime function tracing. ...
In this paper, we present TFix+, a self-configuring timeout bug fixing framework for automatically correcting two major kinds of timeout bugs (i.e., misused timeout bugs and missing timeout bugs) with ...
:139)
Fig. 6: A stack trace snippet of a blocking bug, i.e.,
Mapreduce-5066 bug. ...
arXiv:2110.04101v1
fatcat:bgnjrhmgzndvfc5bf3h77cghve
On fault resilience of OpenStack
2013
Proceedings of the 4th annual Symposium on Cloud Computing - SOCC '13
Cloud-management stacks have become an increasingly important element in cloud computing, serving as the resource manager of cloud platforms. ...
fault-injection framework targeting service communications during the processing of external requests, both among OpenStack services and between OpenStack and external services, and have thus far uncovered 23 bugs ...
The work reported in this paper was supported in part by the US Air Force Office of Scientific Research under Grant No. FA9550-10-1-0393. ...
doi:10.1145/2523616.2523622
dblp:conf/cloud/JuSSRS13
fatcat:ywt6upbnhrdwtnfh2okzcvwxsu
CRETE: A Versatile Binary-Level Concolic Testing Framework
[chapter]
2018
Lecture Notes in Computer Science
The evaluation of TianoCore utility programs found numerous exploitable bugs that were previously unreported. ...
The standardized execution traces are llvm-based, self-contained, and composable, providing succinct and sufficient information for symbolic execution engines to reproduce the concrete executions. ...
TianoCore utility programs are part of the open-source project EDK2 [42], a cross-platform firmware development environment from Intel. It includes 16 command-line programs used to build BIOS images. ...
doi:10.1007/978-3-319-89363-1_16
fatcat:yo57gft65bamfkhpdbnb7z5uki
A Systematic Study of Duplicate Bug Report Detection
2021
International Journal of Advanced Computer Science and Applications
In open source projects, open bug repositories are used to maintain the bug reports. ...
Bug Tracking Systems are usually used to maintain the bug reports and are the most consulted resource during the maintenance process. ...
used to map the stack traces to generate feature vectors. ...
doi:10.14569/ijacsa.2021.0120167
fatcat:twtget3horgrtnut46bl3mxtqq
Catch me if you can
2011
SIGPLAN notices
We evaluate our approach with an experiment where we monitor an application used by 24 users for 1958 hours over the course of 3-months. ...
But do they find performance bugs -performance problems that real users actually notice? ...
[17] present an approach for finding correctness bugs by correlating the value of predicates inserted at specific program points with the occurrences of failures. ...
doi:10.1145/2076021.2048081
fatcat:skeyg6tlkfdbhoivd57xmcauna
Declarative tracepoints
2008
Proceedings of the 6th ACM conference on Embedded network sensor systems - SenSys '08
to detect real bugs using case studies of three bugs based on the development of the LiteOS operating system. ...
Effective debugging usually involves watching program state to diagnose bugs. ...
To correlate the incorrect modifications with their origins, we also use TraceSQL to capture the traces of system calls, a technique we introduced earlier in Section 6.1. ...
doi:10.1145/1460412.1460422
dblp:conf/sensys/CaoASWL08
fatcat:4ctghnzlx5esxom3hiyjgseyvq
A Deep Learning Technique Based Duplicate Bug Report Detection and Classification System
2020
IEEE Access
In proposed approach, the graph of same bug reports stacks traces is created to combine the multiple stack traces. ...
In second part, extracted features are used to measure the similarity between stack traces of new and historical bug reports. ...
doi:10.1109/access.2020.3033045
fatcat:i6wqsk4nszfutjkbahsmxrcwlm
Investigation of failure causes in workload-driven reliability testing
2007
Fourth international workshop on Software quality assurance in conjunction with the 6th ESEC/FSE joint meeting - SOQUA '07
Virtual execution environments and middleware are required to be extremely reliable because applications running on top of them are developed assuming their correctness, and platform-level failures can ...
Since software platforms and middleware are often executed for long time without any interruption, large part of the testing process is devoted to investigate their behavior when long and stressful executions ...
An HLL-VM is a VM which i) adds support for cross-platform programming, ii) provides a virtual Instruction Set Architecture (ISA), and iii) abstracts the Application Binary Interface (ABI) and the ISA ...
doi:10.1145/1295074.1295089
dblp:conf/soqua/CotroneoPMP07
fatcat:pkybfzc5azevjpjva7gylt4aoy
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities
[article]
2018
arXiv
pre-print
Bug bounties have become increasingly popular in recent years. This paper discusses bug bounties by framing these theoretically against so-called platform economy. ...
The platform has also attracted many productive hackers, (ii) but there exists a large productivity gap, which likely relates to (iii) a knowledge gap and the use of automated tools for web vulnerability ...
continue to use the platform. ...
arXiv:1805.09850v1
fatcat:fbierkmbwzaedcrds6zgm5ygc4
Monitoring and Debugging DryadLINQ Applications with Daphne
2011
2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum
We have erred towards portability: to provide cross-platform functionality, the JOM uses a minimal amount of platform-specific data. ...
The vertex runtime attempts to trap all unhandled exceptions and to save the managed stack trace at the exception point, but some vertex errors do not generate stack traces (in particular, stack overflow ...
doi:10.1109/ipdps.2011.268
dblp:conf/ipps/JagannathYB11
fatcat:kegnamvvvza2ndrbxypwjv264i
NodeMD
2007
Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07
identify the correlation. ...
In the second trace section, the same set of code is run with the OS bug fixed. ...
doi:10.1145/1247660.1247669
dblp:conf/mobisys/KrunicTH07
fatcat:r22agysewrcw5opswvcugborfu
« Previous
Showing results 1 — 15 out of 2,309 results