Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems 2008
DOI: 10.1145/1346281.1346322
|View full text |Cite
|
Sign up to set email alerts
|

Better bug reporting with better privacy

Abstract: Software vendors collect bug reports from customers to improve the quality of their software. These reports should include the inputs that make the software fail, to enable vendors to reproduce the bug. However, vendors rarely include these inputs in reports because they may contain private user data. We describe a solution to this problem that provides software vendors with new input values that satisfy the conditions required to make the software follow the same execution path until it fails, but are otherwi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
59
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 82 publications
(59 citation statements)
references
References 21 publications
0
59
0
Order By: Relevance
“…However, it is closely related to privacy work for software testing and debugging [43], [52], [53], [54]. Here, although the work uses within company data, privacy becomes an issue when it involves outsourcing the testing to third parties, as is the case with Budi et al [54] and Taneja et al [43], or collecting user information after a software system has been deployed [52], [53]. In the former case, since companies do not wish to release actual cases for testing, they anonymize the test cases before releasing them to testers.…”
Section: Privacy Research In Software Engineeringmentioning
confidence: 99%
See 4 more Smart Citations
“…However, it is closely related to privacy work for software testing and debugging [43], [52], [53], [54]. Here, although the work uses within company data, privacy becomes an issue when it involves outsourcing the testing to third parties, as is the case with Budi et al [54] and Taneja et al [43], or collecting user information after a software system has been deployed [52], [53]. In the former case, since companies do not wish to release actual cases for testing, they anonymize the test cases before releasing them to testers.…”
Section: Privacy Research In Software Engineeringmentioning
confidence: 99%
“…Work published by Castro et al [52] sought to provide a solution to the problem of software vendors who need to include sensitive user information in error reports to reproduce a bug. To protect sensitive user information, Castro et al [52] used symbolic execution along the path followed by a failed execution to compute path conditions. Their goal was to compute new input values unrelated to the original input.…”
Section: Privacy Research In Software Engineeringmentioning
confidence: 99%
See 3 more Smart Citations