Skip to main content

Three Views of Log Trace Triaging

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10128))

Included in the following conference series:

Abstract

This paper extends previous work on execution trace triaging. We examine the problem of trace triaging along three of the four views used in the study of temporal properties, namely the automata-theoretic view, the temporal logic view and the set-theoretic view. For each case, we propose several partitions of universe of possible traces into equivalence classes, which follow naturally from the chosen view and form the basis for trace triaging.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. IEEE standard classification for software anomalies. Technical report 1044-2009. IEEE (2010)

    Google Scholar 

  2. Alenezi, M., Magel, K., Banitaan, S.: Efficient bug triaging using text mining. JSW 8(9), 2185–2190 (2013)

    Article  Google Scholar 

  3. Alpern, B., Alpera, B., Schneider, F.B.: Recognizing safety and liveness. Distrib. Comput. 2, 117–126 (1986)

    Article  MATH  Google Scholar 

  4. Bang, L., Aydin, A., Bultan, T.: Automatically computing path complexity of programs. In: Nitto, E.D., Harman, M., Heymans, P. (eds.) Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2015, Bergamo, Italy, 30 August - 4 September 2015, pp. 61–72. ACM (2015)

    Google Scholar 

  5. Bauer, A., Leucker, M., Schallhart, C.: Comparing LTL semantics for runtime verification. J. Log. Comput. 20(3), 651–674 (2010). http://dx.doi.org/10.1093/logcom/exn075

    Article  MathSciNet  MATH  Google Scholar 

  6. Beauquier, D., Pin, J.: Languages and scanners. Theor. Comput. Sci. 84(1), 3–21 (1991)

    Article  MATH  Google Scholar 

  7. Brewer, D.F.C., Nash, M.J.: The Chinese wall security policy. In: S&P, pp. 206–214. IEEE Computer Society (1989)

    Google Scholar 

  8. Carstensen, P.H., Sørensen, C., Tuikkar, T.: Let’s talk about bugs!. Scand. J. Inf. Syst. 7(6), 33–54 (1995)

    Google Scholar 

  9. Chan, A., Holmes, R., Murphy, G.C., Ying, A.T.T.: Scaling an object-oriented system execution visualizer through sampling. In: 11th International Workshop on Program Comprehension (IWPC 2003), 10–11 May 2003, Portland, Oregon, USA, pp. 237–244. IEEE Computer Society (2003). http://dx.doi.org/10.1109/WPC.2003.1199207

  10. Chang, E., Manna, Z., Pnueli, A.: The safety-progress classification. In: Bauer, F.L., Brauer, W., Schwichtenberg, H. (eds.) Logic and Algebra of Specification. NATO ASI Series, vol. 94, pp. 143–202. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  11. Cornelissen, B., van Deursen, A., Moonen, L., Zaidman, A.: Visualizing testsuites to aid in software understanding. In: Krikhaar, R.L., Verhoef, C., Lucca, G.A.D. (eds.) CSMR, pp. 213–222. IEEE Computer Society (2007). http://dx.doi.org/10.1109/CSMR.2007.54

  12. Cornelissen, B., Moonen, L.: On large execution traces and trace abstraction techniques. Technical report, Delft University of Technology, Software Engineering Research Group (2008)

    Google Scholar 

  13. Fong, P.W.L.: Access control by tracking shallow execution history. In: S&P, pp. 43–55. IEEE Computer Society (2004)

    Google Scholar 

  14. Groote, J.F., Vaandrager, F.: An efficient algorithm for branching bisimulation and stuttering equivalence. In: Paterson, M.S. (ed.) ICALP 1990. LNCS, vol. 443, pp. 626–638. Springer, Heidelberg (1990). doi:10.1007/BFb0032063. http://dblp.uni-trier.de/db/conf/icalp/icalp90.html#GrooteV90

    Chapter  Google Scholar 

  15. Grottke, M., Trivedie, K.S.: A classification of software faults. In: ISSRE, pp. 4.19–4.20 (2005)

    Google Scholar 

  16. Henkin, L.: The completeness of the first-order functional calculus. J. Symbolic Logic 14(3), 159–166 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  17. Holzmann, G.J., Peled, D.A.: An improvement in formal verification. In: Hogrefe, D., Leue, S. (eds.) Formal Description Techniques VII. IFIP AICT, pp. 197–211. Springer, New York (1994). doi:10.1007/978-0-387-34878-0_13

    Google Scholar 

  18. Kuhn, A., Greevy, O.: Exploiting the analogy between traces and signal processing. In: 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 24–27 September 2006, Philadelphia, Pennsylvania, USA, pp. 320–329. IEEE Computer Society (2006). http://dx.doi.org/10.1109/ICSM.2006.29

  19. Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebr. Program. 78(5), 293–303 (2009)

    Article  MATH  Google Scholar 

  20. Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4, 2–16 (2005)

    Article  Google Scholar 

  21. Lo, D., Cheng, H., Han, J., Khoo, S.C., Sun, C.: Classification of software behaviors for failure detection: a discriminative pattern mining approach. In: KDD, pp. 557–566 (2009)

    Google Scholar 

  22. Moha, N., Guéhéneuc, Y.G., Leduc, P.: Automatic generation of detection algorithms for design defects. In: ASE, pp. 297–300. IEEE Computer Society (2006)

    Google Scholar 

  23. Nagwani, N.K., Verma, S.: CLUBAS: an algorithm and Java based tool for software bug classification using bug attributes similarities. J. Softw. Eng. Appl. 5(6), 436–447 (2012)

    Article  Google Scholar 

  24. Rountev, A., Connell, B.H.: Object naming analysis for reverse-engineered sequence diagrams. In: Roman, G., Griswold, W.G., Nuseibeh, B. (eds.) ICSE, pp. 254–263. ACM (2005). http://doi.acm.org/10.1145/1062455.1062510

  25. Sridhar, M.: Model-checking in-lined reference monitors. Ph.D. thesis, The University of Texas at Dallas, Richardson, Texas, August 2014

    Google Scholar 

  26. Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2–4), 158–184 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  27. Varvaressos, S., Lavoie, K., Gaboury, S., Hallé, S.: A generalized monitor verdict for log trace triaging. In: PCODA, pp. 13–18. IEEE Computer Society (2015)

    Google Scholar 

  28. Wagner, R.A.: Order-n correction for regular languages. Commun. ACM 17(5), 265–268 (1974)

    Article  MATH  Google Scholar 

  29. Wagner, S.: Defect classification and defect types revisited. In: DEFECTS 2008, Proceedings of the 2008 Workshop on Defects in Large Software Systems, pp. 39–40 (2008)

    Google Scholar 

  30. Wiszniewski, H.K.B., Mork, H.: Classification of software defects in parallel programs. Technical report 2, Faculty of Electronics, Technical University of Gdansk, Poland (1994)

    Google Scholar 

  31. Xuan, J., Jiang, H., Ren, Z., Yan, J., Luo, Z.: Automatic bug triage using semi-supervised text classification. In: SEKE, pp. 209–214. Knowledge Systems Institute Graduate School (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raphaël Khoury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Khoury, R., Gaboury, S., Hallé, S. (2017). Three Views of Log Trace Triaging. In: Cuppens, F., Wang, L., Cuppens-Boulahia, N., Tawbi, N., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2016. Lecture Notes in Computer Science(), vol 10128. Springer, Cham. https://doi.org/10.1007/978-3-319-51966-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51966-1_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51965-4

  • Online ISBN: 978-3-319-51966-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics