Three Views of Log Trace Triaging

This paper extends previous work on execution trace triaging. We examine the problem of trace triaging along three of the four views used in the study of temporal properties, namely the automata-theoretic view, the temporal logic view and the set-theoretic view. For each case, we propose several partitions of universe of possible traces into equivalence classes, which follow naturally from the chosen view and form the basis for trace triaging.

[1]  Nadia Tawbi,et al.  Execution monitoring enforcement under memory-limitation constraints , 2008, Inf. Comput..

[2]  Leon Henkin,et al.  The completeness of the first-order functional calculus , 1949, Journal of Symbolic Logic.

[3]  Danièle Beauquier,et al.  Languages and Scanners , 1991, Theor. Comput. Sci..

[4]  Robert A. Wagner,et al.  Order-n correction for regular languages , 1974, CACM.

[5]  Kishor S. Trivedi,et al.  A Classification of Software Faults , 2011 .

[6]  Arie van Deursen,et al.  Visualizing Testsuites to Aid in Software Understanding , 2006, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).

[7]  Kevin W. Hamlen,et al.  Model-Checking In-Lined Reference Monitors , 2010, VMCAI.

[8]  Jun Yan,et al.  Automatic Bug Triage using Semi-Supervised Text Classification , 2017, SEKE.

[9]  Yann-Gaël Guéhéneuc,et al.  Automatic Generation of Detection Algorithms for Design Defects , 2006, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06).

[10]  Edward Y. Chang,et al.  The Safety-Progress Classification , 1993 .

[11]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[12]  Gail C. Murphy,et al.  Scaling an object-oriented system execution visualizer through sampling , 2003, 11th IEEE International Workshop on Program Comprehension, 2003..

[13]  Lujo Bauer,et al.  Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.

[14]  Peter H. Carstensen,et al.  Let's Talk About Bugs! , 1995, Scand. J. Inf. Syst..

[15]  Philip W. L. Fong Access control by tracking shallow execution history , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[16]  Tevfik Bultan,et al.  Automatically computing path complexity of programs , 2015, ESEC/SIGSOFT FSE.

[17]  Martin Leucker,et al.  A brief account of runtime verification , 2009, J. Log. Algebraic Methods Program..

[18]  Henryk Krawczyk,et al.  Classification of software defects in parallel programs , 2007 .

[19]  Stefan Wagner,et al.  Defect classification and defect types revisited , 2008, DEFECTS '08.

[20]  Bowen Alpern,et al.  Recognizing safety and liveness , 2005, Distributed Computing.

[21]  Martin Leucker,et al.  Comparing LTL Semantics for Runtime Verification , 2010, J. Log. Comput..

[22]  Adrian Kuhn,et al.  Exploiting the Analogy Between Traces and Signal Processing , 2006, 2006 22nd IEEE International Conference on Software Maintenance.

[23]  Gerard J. Holzmann,et al.  An improvement in formal verification , 1994, FORTE.

[24]  L. Moonen,et al.  On Large Execution Traces and Trace Abstraction Techniques , 2008 .

[25]  Jan Friso Groote,et al.  An Efficient Algorithm for Branching Bisimulation and Stuttering Equivalence , 1990, ICALP.

[26]  Kenneth Magel,et al.  Efficient Bug Triaging Using Text Mining , 2013, J. Softw..

[27]  Naresh Kumar Nagwani,et al.  CLUBAS: An Algorithm and Java Based Tool for Software Bug Classification Using Bug Attributes Similarities , 2012 .

[28]  Sylvain Hallé,et al.  A generalized monitor verdict for log trace triaging , 2015, 2015 IEEE 6th International Workshop on Program Comprehension through Dynamic Analysis (PCODA).

[29]  Jiawei Han,et al.  Classification of software behaviors for failure detection: a discriminative pattern mining approach , 2009, KDD.

[30]  Atanas Rountev,et al.  Object naming analysis for reverse-engineered sequence diagrams , 2005, ICSE.