Staccato: A Bug Finder for Dynamic Configuration Updates
暂无分享,去创建一个
[1] Yuanyuan Zhou,et al. Do not blame users for misconfigurations , 2013, SOSP.
[2] Xiangyu Zhang,et al. Flint: fixing linearizability violations , 2014, OOPSLA.
[3] Eugene Kuleshov. Using the ASM framework to implement common Java bytecode transformation patterns , 2007 .
[4] Feng Long. Practical Dynamic Software Updating for C , 2007 .
[5] Thomas R. Gross,et al. Protecting applications against TOCTTOU races by user-space caching of file metadata , 2012, VEE '12.
[6] Daniel Jackson,et al. Software Abstractions - Logic, Language, and Analysis , 2006 .
[7] Randy H. Katz,et al. Precomputing possible configuration error diagnoses , 2011, 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011).
[8] Aarti Gupta,et al. DTAM: dynamic taint analysis of multi-threaded programs for relevancy , 2012, SIGSOFT FSE.
[9] Rida A. Bazzi,et al. Immediate Multi-Threaded Dynamic Software Updates Using Stack Reconstruction , 2009, USENIX Annual Technical Conference.
[10] Mona Attariyan,et al. AutoBash: improving configuration management with operating system causality analysis , 2007, SOSP.
[11] Helen J. Wang,et al. Strider: a black-box, state-based approach to change and configuration management and support , 2003, Sci. Comput. Program..
[12] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[13] Kyung Dong Ryu,et al. Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels , 2007, EuroSys '07.
[14] Michael D. Ernst,et al. Automated diagnosis of software configuration errors , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[15] Eric Bodden,et al. Tracking Load-Time Configuration Options , 2014, IEEE Transactions on Software Engineering.
[16] Michael Hicks,et al. A study of dynamic software update quiescence for multithreaded programs , 2012, 2012 4th International Workshop on Hot Topics in Software Upgrades (HotSWUp).
[17] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[18] Mona Attariyan,et al. X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software , 2012, OSDI.
[19] Manuel Oriol,et al. Practical dynamic software updating for C , 2006, PLDI '06.
[20] Randy H. Katz,et al. Static extraction of program configuration options , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[21] Stephen N. Freund,et al. Velodrome: a sound and complete dynamic atomicity checker for multithreaded programs , 2008, PLDI '08.
[22] Gunter Saake,et al. JavAdaptor—Flexible runtime updates of Java applications , 2013, Softw. Pract. Exp..
[23] Myra B. Cohen,et al. PrefFinder: getting the right preference in configurable software systems , 2014, ASE.
[24] Scott D. Stoller,et al. Runtime analysis of atomicity for multithreaded programs , 2006, IEEE Transactions on Software Engineering.
[25] Shivnath Babu,et al. Tuning Database Configuration Parameters with iTuned , 2009, Proc. VLDB Endow..
[26] Krzysztof Czarnecki,et al. Mining configuration constraints: static analyses and empirical results , 2014, ICSE.
[27] Mona Attariyan,et al. Using Causality to Diagnose Configuration Bugs , 2008, USENIX Annual Technical Conference.
[28] Krzysztof Czarnecki,et al. Generating range fixes for software configuration , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[29] Jeffrey S. Foster,et al. Kitsune: efficient, general-purpose dynamic software updating for C , 2012, OOPSLA '12.
[30] Luís Veiga,et al. Rubah: DSU for Java on a stock JVM , 2014, OOPSLA.
[31] Eran Yahav,et al. Testing atomicity of composed concurrent operations , 2011, OOPSLA '11.
[32] Yu Lin,et al. Automated refactoring for Java concurrency , 2015 .
[33] Shigeru Chiba. Javassist - A Reflection-based Programming Wizard for Java , 1998 .
[34] Yu Lin,et al. CHECK-THEN-ACT Misuse of Java Concurrent Collections , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation.
[35] Michael Franz,et al. Dynamic taint propagation for Java , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[36] Gail E. Kaiser,et al. Phosphor: illuminating dynamic data flow in commodity jvms , 2014, OOPSLA.
[37] Adam A. Porter,et al. Using symbolic evaluation to understand behavior in configurable software systems , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[38] Michael D. Ernst,et al. Which configuration option should I change? , 2014, ICSE.
[39] Myra B. Cohen,et al. Configurations everywhere: implications for testing and debugging in practice , 2014, ICSE Companion.
[40] Mona Attariyan,et al. Automating Configuration Troubleshooting with Dynamic Information Flow Analysis , 2010, OSDI.
[41] Eran Yahav,et al. Verifying atomicity via data independence , 2014, ISSTA 2014.
[42] Martin Odersky,et al. Making the future safe for the past: adding genericity to the Java programming language , 1998, OOPSLA '98.
[43] Sebastian Burckhardt,et al. Line-up: a complete and automatic linearizability checker , 2010, PLDI '10.