2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE) 2015
DOI: 10.1109/issre.2015.7381842
|View full text |Cite
|
Sign up to set email alerts
|

Discovering specification violations in networked software systems

Abstract: Publicly released software implementations of network protocols often have bugs that arise from latent specification violations. We present APE, a technique that explores program behavior to identify potential specification violations. APE overcomes the challenge of exploring the large space of behavior by dynamically inferring precise models of behavior, stimulating unobserved behavior likely to lead to violations, and refining the behavioral models with the new, stimulated behavior. APE can (1) discover new … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…Execution traces can be defined as an ordered list of events that have occurred during the program execution. Event is a general term that can refer to a function call [3], raised exception, network packet [14], [15], keyboard or mouse events, and more. Events can be collected in different ways, for instance, from operating systems [10], framework [16], or programmers' logs [17].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Execution traces can be defined as an ordered list of events that have occurred during the program execution. Event is a general term that can refer to a function call [3], raised exception, network packet [14], [15], keyboard or mouse events, and more. Events can be collected in different ways, for instance, from operating systems [10], framework [16], or programmers' logs [17].…”
Section: Background and Related Workmentioning
confidence: 99%
“…The approach completely overlooks the impact of the wireless network service. In another work , networked software systems are checked for violations in functional specifications using fuzz testing and model refinement. For the Android platform, a model‐based test generation tool is provided to test mobile applications .…”
Section: Literature Reviewmentioning
confidence: 99%
“…Other work mines a variety of distributed system information for SE purposes. For example, some work uses mining to detect dependencies [37], anomalies [53,55], and performance bugs [48].…”
Section: Related Workmentioning
confidence: 99%