Skip to main content

Mis.Config: Finding Misreferred Configuration Bugs in Web Application Using Thin Slicing

  • Chapter
  • First Online:
Computer and Information Science (ICIS 2019)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 849))

Included in the following conference series:

  • 594 Accesses

Abstract

There are many web-based applications for multi-agent systems (MAS).  However, developing MAS is not easy, because agents have many different variables, and it is difficult to validate them.  PHP is one of the most popular web programming languages. PHP is dynamically typed, which means that the type of variable is assigned when the variable is accessed.  This flexibility makes it easier to develop MAS.  On the contrary, when a programmer refers variables to other PHP files, misreferences among the PHP files may occur because it is difficult to find references across files. To solve these misreferences, we propose a bug-finding tool called Mis.Config using static analysis. We used control flow graphs (CFGs) and thin slicing to realize this purpose. In our experiment, we applied our tool to real-world software to investigate whether Mis.Config can find misreferenced configurations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://wordpress.com.

  2. 2.

    https://www.joomla.org.

  3. 3.

    https://sourceforge.net/projects/webchess/.

  4. 4.

    http://www.responsivefilemanager.com.

  5. 5.

    http://www.php.net/manual/en/intro.pdo.php.

References

  1. Allen, F.E.: Control flow analysis. 5(7), 1–19 (1970)

    Google Scholar 

  2. Attariyan, M., Flinn, J.: Automating configuration troubleshooting with dynamic information flow analysis. In: Proceedings of OSDI, vol. 10, pp. 1–14 (2010)

    Google Scholar 

  3. Castro-Schez, J.J., Miguel, R., Vallejo, D., López-López, L.M.: A highly adaptive recommender system based on fuzzy logic for B2C e-commerce portals. Expert Syst. Appl. 38(3), 2441–2454 (2011)

    Article  Google Scholar 

  4. El Hajj, F., El Hajj, A., Chehade, R.A.: Multi-agent system vulnerability detector for a secured e-learning environment. In: Proceedings of ICDIPCl, pp. 113–118. IEEE (2016)

    Google Scholar 

  5. Eshkevari, L., Dos Santos, F., Cordy, J.R., Antoniol, G.: Are PHP applications ready for hack? In: Proceedings of IEEE SANER, pp. 63–72 (2015)

    Google Scholar 

  6. de la Hoz, E., Gimenez-Guzman, J.M., Marsa-Maestre, I., Cruz-Piris, L., Orden, D.: A distributed, multi-agent approach to reactive network resilience. In: Proceedings of AAMAS, pp. 1044–1053 (2017)

    Google Scholar 

  7. Nadi, S., Berger, T., Kästner, C., Czarnecki, K.: Mining configuration constraints: static analyses and empirical results. In: Proceedings of ICSE, pp. 140–151 (2014)

    Google Scholar 

  8. Nguyen, H.V., Kästner, C., Nguyen, T.N.: Cross-language program slicing for dynamic web applications. In: Proceedings of FSE, pp. 369–380 (2015)

    Google Scholar 

  9. Sayagh, M., Adams, B.: Multi-layer software configuration: empirical study on wordpress. In: Proceedings of IEEE SCAM, pp. 31–40 (2015)

    Google Scholar 

  10. Sridharan, M., Fink, S.J., Bodik, R.: Thin slicing. ACM SIGPLAN Notices 42(6), 112–122 (2007)

    Article  Google Scholar 

  11. Su, Y.Y., Attariyan, M., Flinn, J.: Autobash: improving configuration management with operating system causality analysis. ACM SIGOPS Oper. Syst. Rev. 41(6), 237–250 (2007)

    Article  Google Scholar 

  12. Verna, I., Bucciarelli, E., Giulioni, G., Silvestri, M.: The teaching evaluation model: a web application framework. In: Bajo, J., Escalona, M.J., Giroux, S., Hoffa-Dabrowska, P., Julián, V., Novais, P., Sánchez-Pi, N., Unland, R., Azambuja-Silveira, R. (eds.) Proceedings of PAAMS (2016)

    Google Scholar 

  13. Wang, M., Kawamura, T., Sei, Y., Nakagawa, H., Tahara, Y., Ohsuga, A.: Music recommender adapting implicit context using ‘renso’ relation among linked data. J. Inf. Process. 22(2), 279–288 (2014). https://doi.org/10.2197/ipsjjip.22.279

    Article  Google Scholar 

  14. Weiser, M.: Program slicing. In: Proceedings of ICSE, pp. 439–449 (1981)

    Google Scholar 

  15. Xia, X., Lo, D., Qiu, W., Wang, X., Zhou, B.: Automated configuration bug report prediction using text mining. In: Proceedings of IEEE COMPSAC, pp. 107–116 (2014)

    Google Scholar 

  16. Zhang, S., Ernst, M.D.: Which configuration option should i change? In: Proceedings of ICSE, pp. 152–163 (2014)

    Google Scholar 

Download references

Acknowledgements

This work was supported by JSPS KAKENHI Grant Numbers JP17H04705, JP18H03229, JP18H03340, JP18K19835, JP19H04113, JP19K12107.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuichi Sei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yoda, M., Sei, Y., Tahara, Y., Ohsuga, A. (2020). Mis.Config: Finding Misreferred Configuration Bugs in Web Application Using Thin Slicing. In: Lee, R. (eds) Computer and Information Science. ICIS 2019. Studies in Computational Intelligence, vol 849. Springer, Cham. https://doi.org/10.1007/978-3-030-25213-7_4

Download citation

Publish with us

Policies and ethics