Proceedings of the 2006 SIAM International Conference on Data Mining 2006
DOI: 10.1137/1.9781611972764.10
|View full text |Cite
|
Sign up to set email alerts
|

Mining Control Flow Abnormality for Logic Error Isolation

Abstract: Analyzing the executions of a buggy program is essentially a data mining process: Tracing the data generated during program executions may disclose important patterns and outliers that could eventually reveal the location of software errors. In this paper, we investigate program logic errors, which rarely incur memory access violations but generate incorrect outputs. We show that through mining program control flow abnormality, we could isolate many logic errors without knowing the program semantics. In order … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 33 publications
0
17
0
Order By: Relevance
“…To evaluate bug localisation techniques, the Siemens Programs [15] are often used [1,2,13] as a reference suite of C programs artificially instrumented with different bugs. More specifically, it usually is just a small subset of this benchmark which is used.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…To evaluate bug localisation techniques, the Siemens Programs [15] are often used [1,2,13] as a reference suite of C programs artificially instrumented with different bugs. More specifically, it usually is just a small subset of this benchmark which is used.…”
Section: Discussionmentioning
confidence: 99%
“…Approaches range from static code analysis and mining of software repositories and bug databases [8,9,10] to dynamic program verification. The latter focus on the data flow [11,12] or, like all call graph based techniques, on the control flow [13,14]. In the following, we will first discuss the application of data mining techniques in this context -bug localisation is just one application.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Using machine learning techniques to diagnose failure is not new [3,2,6,12,14,15]. Discriminative frequent pattern analysis [6], software behavior graph analysis [14], a Bayesian analysis based approach [13], and control flow analysis to identify logic error [15] are a few examples.…”
Section: Related Workmentioning
confidence: 99%
“…Discriminative frequent pattern analysis [6], software behavior graph analysis [14], a Bayesian analysis based approach [13], and control flow analysis to identify logic error [15] are a few examples. These techniques do not focus on extracting symbolic relationships, however.…”
Section: Related Workmentioning
confidence: 99%