21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06) 2006
DOI: 10.1109/ase.2006.63
|View full text |Cite
|
Sign up to set email alerts
|

Software Library Usage Pattern Extraction Using a Software Model Checker

Abstract: The need to manually specify temporal properties of software systems is a major barrier to wider adoption of software model checking, because the specification of software temporal properties is a difficult, time-consuming, and error-prone process. To address this problem, we propose to automatically extract software library usage patterns, which are one type of temporal specifications. Our approach uses a model checker to check a set of software library usage pattern candidates against existing programs using… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
11
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…Other static approaches to mine API specifications and then leverage them to detect bugs [16,28,30,31,33]. FindBugs [25] looks for specified bug patterns.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Other static approaches to mine API specifications and then leverage them to detect bugs [16,28,30,31,33]. FindBugs [25] looks for specified bug patterns.…”
Section: Related Workmentioning
confidence: 99%
“…There are several dynamic approaches in mining specifications [5,12,13,17,21,33,35,43,53,58]. Daikon [17] automatically detects invariants in a program via running test cases.…”
Section: Related Workmentioning
confidence: 99%
“…Mining-based methods are proposed [2,3,7,27,28,33,35,36,38,50,65,68] to discover API usage rules from executing traces or source codes, where API usage rules are represented by some patterns or finite automata. One can apply model-checking techniques to check whether programs violate or not API usage rules represented by patterns or finite automata.…”
Section: Related Workmentioning
confidence: 99%
“…Many works addressed this problem [7,25,27,28,31,33,[35][36][37][38]43,50,64,65,68]. However, their approaches either cannot formally describe API usage rules in a precise way or cannot automatically check API usage rules.…”
Section: Introductionmentioning
confidence: 97%
“…2001);Kremenek et al (2006b);Li et al (2006);Li and Zhou (2005);Liu et al (2006). FindBugs Hovemeyer and Pugh (2004) looks for specified bug patterns.…”
mentioning
confidence: 99%