Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence 2020
DOI: 10.24963/ijcai.2020/226
|View full text |Cite
|
Sign up to set email alerts
|

Diagnosing Software Faults Using Multiverse Analysis

Abstract: Spectrum-based Fault Localization (SFL) approaches aim to efficiently localize faulty components from examining program behavior. This is done by collecting the execution patterns of various combinations of components and the corresponding outcomes into a spectrum. Efficient fault localization depends heavily on the quality of the spectra. Previous approaches, including the current state-of-the-art Density- Diversity-Uniqueness (DDU) approach, attempt to generate “good” test-suites by improving certa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 15 publications
(3 reference statements)
0
4
0
Order By: Relevance
“…We also believe that underapproximation widening may yield improvement performance on our distributed bounded model checker, Hydra [11,12]. Another interesting direction that we want to pursue is on combining bounded model checking algorithms (both overapproximation refinement and underapproximation widening) with dynamic analysis [5,13,38] and statistical testing [10,32] based approaches.…”
Section: Discussionmentioning
confidence: 99%
“…We also believe that underapproximation widening may yield improvement performance on our distributed bounded model checker, Hydra [11,12]. Another interesting direction that we want to pursue is on combining bounded model checking algorithms (both overapproximation refinement and underapproximation widening) with dynamic analysis [5,13,38] and statistical testing [10,32] based approaches.…”
Section: Discussionmentioning
confidence: 99%
“…For our experiments, we use the number of relation terms in the key relation as a proxy for its complexity. We define our budget in terms of it and use a budget threshold for the key relation in the range [12][13][14] latent terms and depth of expression selection in range [2][3][4]. We use a timeout of 20 minutes for locking and 4 days for attacks.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…We believe that this work shows the potential of applying programming languages techniques in hardware design. We believe that there is also a potential of applying program analysis techniques, both symbolic [10,22,13,37,35], dynamic [43,15] and statistical [29,33,12,34], for hardware analysis; this is a direction we intend to pursue in the future.…”
Section: Related Workmentioning
confidence: 99%
“…We believe that this work shows the potential of applying programming languages techniques in hardware design. We believe that there is also a potential of applying program analysis techniques, symbolic [9,21,12,36,34], dynamic [41,14] and statistical [28,32,11,33], for hardware analysis; this is a direction we intend to pursue in the future.…”
Section: Related Workmentioning
confidence: 99%