SOFTWARE LIBRARY USAGE PATTERN EXTRACTION USING A SOFTWARE MODEL CHECKER

C. Liu, E. Ye, and D.J. Richardson

References

  1. [1] E.M. Clarke, O. Grumberg & D.A. Peled, Model checking(Cambridge, MA: MIT Press, 1999).
  2. [2] T. Ball & S.K. Rajamani, The SLAM project: debuggingsystem software via static analysis, in POPL ’02: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (New York, NY: ACM Press, 2002), 1–3.
  3. [3] G.J. Holzmann, The model checker SPIN, IEEE Transactions on Software Engineering, 23(5), 1997, 279–295.
  4. [4] D. Beyer, T.A. Henzinger, R. Jhala, & R. Majumdar, The software model checker BLAST: applications to software engineering, International Journal on Software Tools for Technology Transfer, 9(5), 2007, 505–525.
  5. [5] W. Visser, K. Havelund, G. Brat, S. Park, & F. Lerda, Model checking programs, Automated Software Engineering Journal, 10(2), 2003, 203–232.
  6. [6] J.C. Corbett, M.B. Dwyer, J. Hatcliff, S. Laubach, C.S.Pasareanu, Robby, & H. Zheng, Bandera: extracting finite-state models from Java source code, in ICSE ’00: Proceedings of the 22nd International Conference on Software Engineering (NY USA: ACM Press, 2000), 439–448.
  7. [7] Robby, M.B. Dwyer, & J. Hatcliff, Bogor: an extensibleand highly-modular software model checking framework, inESEC/FSE 2003: Proceedings of the 4th Joint Meeting of theEuropean Software Engineering Conference and ACM SIG-SOFT Symposium on the Foundations of Software Engineering,New York, NY, (2003), 267–276.
  8. [8] G.J. Holzmann, The logic of bugs, in SIGSOFT ’02/FSE-10: Proceedings of the 10th ACM SIGSOFT Symposium onFoundations of Software Engineering (NY, USA: ACM Press,2002), 81–87.
  9. [9] M.B. Dwyer, G.S. Avrunin, & J.C. Corbett, Patterns inproperty specifications for finite-state verification, in ICSE ’99: Proceedings of the 21st International Conference on Software Engineering (Los Alamitos, CA, USA: IEEE Computer Society Press, 1999), 411–420.
  10. [10] D. Beyer, A.J. Chlipala, T.A. Henzinger, R. Jhala, & R. Majumdar, The BLAST query language for software verification, in SAS ’04: Proceedings of the 11th International Static Analysis Symposium (Berlin, Heidelber: Springer-Verlag, 2004), 2–18.
  11. [11] C. Liu, E. Ye, & D.J. Richardson, LtRules: an automated software library usage rule extraction tool. In ICSE ’06: Proceedings of the 28th International Conference on Software Engineering, Research Demonstrations, New York, NY, (2006).
  12. [12] C. Liu, E. Ye, & D.J. Richardson, Software library usage pattern extraction using a software model checker, in ASE ’06: Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering, Washington, DC, (2006), 301–304.
  13. [13] T. Ball, V. Levin, & F. Xie, Automatic creation of environment models via training, in TACAS ’04: Proceedings of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (2004), 93–107.
  14. [14] M.D. Ernst, J. Cockrell, W.G. Griswold, & D. Notkin, Dynamically discovering likely program invariants to support program evolution, IEEE Transactions on Software Engineering, 27(2) February 2001, 1–25.
  15. [15] S. Hangal & M.S. Lam, Tracking down software bugs using automatic anomaly detection, in ICSE ’02: Proceedings of the 24th International Conference on Software Engineering (NY, USA: ACM Press, 2002), 291–301.
  16. [16] R. Alur, P. Cerny, P. Madhusudan, & W. Nam, Synthesisof interface specifications for Java classes, in POPL ’05:Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposiumon Principles Of Programming Languages (ACM Press, 2005),98–109.
  17. [17] G. Ammons, R. Bodik, & J.R. Larus, Mining specifications, in POPL ’02: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (New York, NY: ACM Press, 2002), 4–16.
  18. [18] D. Engler, D.Y. Chen, S. Hallem, A. Chou, & B. Chelf, Bugs as deviant behavior: a general approach to inferring errors in systems code, in SOSP ’01: Proceedings of the 18th ACM Symposium on Operating Systems Principles (New York, NY: ACM Press, 2001), 57–72.
  19. [19] W. Weimer & G. Necula, Mining temporal specificationsfor error detection, in TACAS ’05: Proceedings of the 11thInternational Conference on Tools and Algorithms for theConstruction and Analysis of Systems (2005).
  20. [20] J. Whaley, M.C. Martin, & M.S. Lam, Automatic extraction of object-oriented component interfaces, in ISSTA ’02: Proceedings of the 2002 ACM SIGSOFT International Symposium on Software Testing and Analysis (ACM Press, 2002), 218–228.
  21. [21] J. Yang, D. Evans, D. Bhardwaj, T. Bhat, & M. Das, Perracotta: mining temporal API rules from imperfect traces, in ICSE ’06: Proceedings of the 28th International Conference on Software Engineering, New York, NY, (2006).

Important Links:

Go Back