Skip to main content

Mining Dataflow Sensitive Specifications

  • Conference paper
Formal Methods and Software Engineering (ICFEM 2013)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 8144))

Included in the following conference series:

Abstract

Specification mining has become an attractive tool for assisting in numerous software development and maintenance tasks. The majority of these techniques share a common assumption: significant program properties occur frequently. Unfortunately, statistical inference alone produces too many program properties, many of which are found to be either insignificant or meaningless. Consequently, it becomes a laborious task for developers to separate semantically meaningful specifications from the rest. In this paper, we present a semantic-directed specification mining framework that injects in-depth semantics information into mining input. Specifically, we investigate the introduction of dataflow semantics to extract dataflow related sequences from execution traces, and demonstrate that mining specifications from these dataflow related sequences reduces a great number of meaningless specifications, resulting in a collection of specifications which are both semantically relevant and statistically significant. Our experimental results indicate that our approach can effectively filter out insignificant specifications and greatly improve the efficiency of mining. In addition, we also show that our mined specifications reflect the essential program behavior and can practically help program understanding and bug detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Mining sequential patterns. In: ICDE 1995 (1995)

    Google Scholar 

  2. Ammons, G., Bodík, R., Larus, J.R.: Mining specifications. In: POPL 2002 (2002)

    Google Scholar 

  3. Damm, W., Harel, D.: Lscs: Breathing life into message sequence charts. Tech. rep.

    Google Scholar 

  4. Ernst, M.D., Cockrell, J., Griswold, W.G., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. TSE (2001)

    Google Scholar 

  5. Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. In: PLDI 1988, NY, USA (1988)

    Google Scholar 

  6. ITU-T: Itu-t recommendation z.120: Message sequence chart (msc) (1999)

    Google Scholar 

  7. Kugler, H., Harel, D., Pnueli, A., Lu, Y., Bontemps, Y.: Temporal logic for scenario-based specifications. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol. 3440, pp. 445–460. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Lee, C., Chen, F., RoÅŸu, G.: Mining parametric specifications. In: ICSE 2011, NY, USA (2011)

    Google Scholar 

  9. Lo, D., Khoo, S.C., Liu, C.: Efficient mining of iterative patterns for software specification discovery. In: KDD 2007, New York, NY, USA (2007)

    Google Scholar 

  10. Masseglia, F., Poncelet, P., Teisseire, M.: Incremental mining of sequential patterns in large databases. Data Knowl. Eng. (2003)

    Google Scholar 

  11. Olender, K.M., Osterweil, L.J.: Cecil: A sequencing constraint language for automatic static analysis generation. IEEE Trans. Softw. Eng. (1990)

    Google Scholar 

  12. Pradel, M., Gross, T.R.: Automatic generation of object usage specifications from large method traces. In: ASE 2009. IEEE Computer Society, USA (2009)

    Google Scholar 

  13. Raja, V.R.: Soot: A Java Bytecode Optimization Framework. Master’s thesis, School of Computer Science, McGill University, Montreal (2000)

    Google Scholar 

  14. Thummalapenta, S., Xie, T.: Alattin: Mining alternative patterns for detecting neglected conditions. In: ASE 2009. IEEE Computer Society, USA (2009)

    Google Scholar 

  15. Thummalapenta, S., Xie, T.: Mining exception-handling rules as sequence association rules. In: ICSE 2009, Washington, DC, USA (2009)

    Google Scholar 

  16. Tip, F.: A survey of program slicing techniques. Tech. rep. (1994)

    Google Scholar 

  17. Wasylkowski, A., Zeller, A., Lindig, C.: Detecting object usage anomalies. FSE 2007 (2007)

    Google Scholar 

  18. Zhang, X., Gupta, R., Zhang, Y.: Precise dynamic slicing algorithms. In: ICSE 2003 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zuo, Z., Khoo, SC. (2013). Mining Dataflow Sensitive Specifications. In: Groves, L., Sun, J. (eds) Formal Methods and Software Engineering. ICFEM 2013. Lecture Notes in Computer Science, vol 8144. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41202-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41202-8_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41201-1

  • Online ISBN: 978-3-642-41202-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics