Abstract
This paper extends previous work on execution trace triaging. We examine the problem of trace triaging along three of the four views used in the study of temporal properties, namely the automata-theoretic view, the temporal logic view and the set-theoretic view. For each case, we propose several partitions of universe of possible traces into equivalence classes, which follow naturally from the chosen view and form the basis for trace triaging.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
IEEE standard classification for software anomalies. Technical report 1044-2009. IEEE (2010)
Alenezi, M., Magel, K., Banitaan, S.: Efficient bug triaging using text mining. JSW 8(9), 2185–2190 (2013)
Alpern, B., Alpera, B., Schneider, F.B.: Recognizing safety and liveness. Distrib. Comput. 2, 117–126 (1986)
Bang, L., Aydin, A., Bultan, T.: Automatically computing path complexity of programs. In: Nitto, E.D., Harman, M., Heymans, P. (eds.) Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2015, Bergamo, Italy, 30 August - 4 September 2015, pp. 61–72. ACM (2015)
Bauer, A., Leucker, M., Schallhart, C.: Comparing LTL semantics for runtime verification. J. Log. Comput. 20(3), 651–674 (2010). http://dx.doi.org/10.1093/logcom/exn075
Beauquier, D., Pin, J.: Languages and scanners. Theor. Comput. Sci. 84(1), 3–21 (1991)
Brewer, D.F.C., Nash, M.J.: The Chinese wall security policy. In: S&P, pp. 206–214. IEEE Computer Society (1989)
Carstensen, P.H., Sørensen, C., Tuikkar, T.: Let’s talk about bugs!. Scand. J. Inf. Syst. 7(6), 33–54 (1995)
Chan, A., Holmes, R., Murphy, G.C., Ying, A.T.T.: Scaling an object-oriented system execution visualizer through sampling. In: 11th International Workshop on Program Comprehension (IWPC 2003), 10–11 May 2003, Portland, Oregon, USA, pp. 237–244. IEEE Computer Society (2003). http://dx.doi.org/10.1109/WPC.2003.1199207
Chang, E., Manna, Z., Pnueli, A.: The safety-progress classification. In: Bauer, F.L., Brauer, W., Schwichtenberg, H. (eds.) Logic and Algebra of Specification. NATO ASI Series, vol. 94, pp. 143–202. Springer, Heidelberg (1993)
Cornelissen, B., van Deursen, A., Moonen, L., Zaidman, A.: Visualizing testsuites to aid in software understanding. In: Krikhaar, R.L., Verhoef, C., Lucca, G.A.D. (eds.) CSMR, pp. 213–222. IEEE Computer Society (2007). http://dx.doi.org/10.1109/CSMR.2007.54
Cornelissen, B., Moonen, L.: On large execution traces and trace abstraction techniques. Technical report, Delft University of Technology, Software Engineering Research Group (2008)
Fong, P.W.L.: Access control by tracking shallow execution history. In: S&P, pp. 43–55. IEEE Computer Society (2004)
Groote, J.F., Vaandrager, F.: An efficient algorithm for branching bisimulation and stuttering equivalence. In: Paterson, M.S. (ed.) ICALP 1990. LNCS, vol. 443, pp. 626–638. Springer, Heidelberg (1990). doi:10.1007/BFb0032063. http://dblp.uni-trier.de/db/conf/icalp/icalp90.html#GrooteV90
Grottke, M., Trivedie, K.S.: A classification of software faults. In: ISSRE, pp. 4.19–4.20 (2005)
Henkin, L.: The completeness of the first-order functional calculus. J. Symbolic Logic 14(3), 159–166 (1949)
Holzmann, G.J., Peled, D.A.: An improvement in formal verification. In: Hogrefe, D., Leue, S. (eds.) Formal Description Techniques VII. IFIP AICT, pp. 197–211. Springer, New York (1994). doi:10.1007/978-0-387-34878-0_13
Kuhn, A., Greevy, O.: Exploiting the analogy between traces and signal processing. In: 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 24–27 September 2006, Philadelphia, Pennsylvania, USA, pp. 320–329. IEEE Computer Society (2006). http://dx.doi.org/10.1109/ICSM.2006.29
Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebr. Program. 78(5), 293–303 (2009)
Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4, 2–16 (2005)
Lo, D., Cheng, H., Han, J., Khoo, S.C., Sun, C.: Classification of software behaviors for failure detection: a discriminative pattern mining approach. In: KDD, pp. 557–566 (2009)
Moha, N., Guéhéneuc, Y.G., Leduc, P.: Automatic generation of detection algorithms for design defects. In: ASE, pp. 297–300. IEEE Computer Society (2006)
Nagwani, N.K., Verma, S.: CLUBAS: an algorithm and Java based tool for software bug classification using bug attributes similarities. J. Softw. Eng. Appl. 5(6), 436–447 (2012)
Rountev, A., Connell, B.H.: Object naming analysis for reverse-engineered sequence diagrams. In: Roman, G., Griswold, W.G., Nuseibeh, B. (eds.) ICSE, pp. 254–263. ACM (2005). http://doi.acm.org/10.1145/1062455.1062510
Sridhar, M.: Model-checking in-lined reference monitors. Ph.D. thesis, The University of Texas at Dallas, Richardson, Texas, August 2014
Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2–4), 158–184 (2008)
Varvaressos, S., Lavoie, K., Gaboury, S., Hallé, S.: A generalized monitor verdict for log trace triaging. In: PCODA, pp. 13–18. IEEE Computer Society (2015)
Wagner, R.A.: Order-n correction for regular languages. Commun. ACM 17(5), 265–268 (1974)
Wagner, S.: Defect classification and defect types revisited. In: DEFECTS 2008, Proceedings of the 2008 Workshop on Defects in Large Software Systems, pp. 39–40 (2008)
Wiszniewski, H.K.B., Mork, H.: Classification of software defects in parallel programs. Technical report 2, Faculty of Electronics, Technical University of Gdansk, Poland (1994)
Xuan, J., Jiang, H., Ren, Z., Yan, J., Luo, Z.: Automatic bug triage using semi-supervised text classification. In: SEKE, pp. 209–214. Knowledge Systems Institute Graduate School (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Khoury, R., Gaboury, S., Hallé, S. (2017). Three Views of Log Trace Triaging. In: Cuppens, F., Wang, L., Cuppens-Boulahia, N., Tawbi, N., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2016. Lecture Notes in Computer Science(), vol 10128. Springer, Cham. https://doi.org/10.1007/978-3-319-51966-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-51966-1_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51965-4
Online ISBN: 978-3-319-51966-1
eBook Packages: Computer ScienceComputer Science (R0)