Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Softw 2020
DOI: 10.1145/3368089.3409727
|View full text |Cite
|
Sign up to set email alerts
|

Understanding and discovering software configuration dependencies in cloud and datacenter systems

Abstract: A large percentage of real-world software configuration issues, such as misconfigurations, involve multiple interdependent configuration parameters. However, existing techniques and tools either do not consider dependencies among configuration parameters-termed configuration dependencies-or rely on one or two dependency types and code patterns as input. Without rigorous understanding of configuration dependencies, it is hard to deal with many resulting configuration issues.This thesis presents our study of sof… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 52 publications
0
17
0
Order By: Relevance
“…However, the existing techniques [6], [8], [10], [11] analyze configuration APIs by conducting path-insensitive analysis, which can be somewhat inaccurate and miss incompatible configuration APIs without considering the if-conditions (e.g., Line 6 in Figure 2). Therefore, a path-sensitive analysis is necessary to obtain {A, X , F} by solving path constraints triggering configuration APIs with the constraint solver.…”
Section: B Confdroid Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the existing techniques [6], [8], [10], [11] analyze configuration APIs by conducting path-insensitive analysis, which can be somewhat inaccurate and miss incompatible configuration APIs without considering the if-conditions (e.g., Line 6 in Figure 2). Therefore, a path-sensitive analysis is necessary to obtain {A, X , F} by solving path constraints triggering configuration APIs with the constraint solver.…”
Section: B Confdroid Overviewmentioning
confidence: 99%
“…• Baseline II: ORPLOCATOR [10], the state-of-the-art technique for extracting attributes in a software system by conducting path-insensitive analysis on its configuration APIs. We ran ORPLOCATOR at different API levels to extract detection rules for unavailable attribute A at API level L. • Baseline III: CDEP [11], the state-of-the-art software misconfiguration tool which focuses on analyzing attribute dependencies in the software system. We ran CDEP among API levels to generate detection rules for the unavailable dependencies between two attributes A 1 and A 2 at API level L.…”
Section: A Rq3: Effectiveness Of Detection Rule Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…Prior work [13], [15], [18], [21] proposes static analysis approaches to infer configuration constraints from source code. SPEX [18] searches code patterns for different predefined constraints types, such as data range and value relationship.…”
Section: A Misconfiguration Detectionmentioning
confidence: 99%
“…For instance, the value range (0∼32767) of configuration option "LimitRequestFields" in Apache Httpd [19] is a legacy mistake in documentation [20] . In order to help users understand the configuration constraints, there are prior methods [13], [18], [21] focusing on inferring configuration constraints from software source code. The existing methods typically have two main steps.…”
Section: Introductionmentioning
confidence: 99%