2007
DOI: 10.1109/wcre.2007.24
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Protocol Recovery

Abstract: Dynamic protocol recovery tries to recover a component's sequencing constraints by means of dynamic analysis. This problem has been tackled by several automaton learning approaches in the past. These approaches are based on the sequence of component method invocations only.We introduce a new dynamic protocol recovery technique based on object process graphs. These graphs contain information about loops and the context in which methods are being called. We describe the transformation of a set of these graphs to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(26 citation statements)
references
References 16 publications
0
26
0
Order By: Relevance
“…In fact, to the best of our knowledge, no other research group but ours is explicitly processing domain knowledge in dynamic analysis for program comprehension. It seems that most of the effort is applied to compressing or summarizing the execution traces, i.e., [Quante and Koschke, 2007] [Smit et al, 2008] [ Kuhn and Greevy, 2006].…”
Section: Dynamic Analysismentioning
confidence: 99%
“…In fact, to the best of our knowledge, no other research group but ours is explicitly processing domain knowledge in dynamic analysis for program comprehension. It seems that most of the effort is applied to compressing or summarizing the execution traces, i.e., [Quante and Koschke, 2007] [Smit et al, 2008] [ Kuhn and Greevy, 2006].…”
Section: Dynamic Analysismentioning
confidence: 99%
“…[8] define similarity measures between web-services to identify candidate services to replace a service in use when it becomes unavailable or unsuitable due to a change. Quante and Koschke [56] propose similarity measures between finite state automata generated by different reverse engineering mechanisms to compare the effectiveness of these mechanisms. Bogdanov and Walkinshaw [57] provide an algorithm for comparing LTSs without relying on the initial state or any particular states of the underlying models as the reference point.…”
Section: E Model Matching Techniquesmentioning
confidence: 99%
“…Many studies propose variants of dynamic analysis based specification mining (e.g., [9] mine boolean expressions describing likely invariants on values of program variables, [4], [15], [31], [33] mine temporal orderings of method calls/network packets as finite state machines, [8], [32] mine frequent patterns of behavior, [7] mine implied message sequence charts). Different from the above mentioned studies, we mine a set of LSCs from traces of program executions.…”
Section: Related Workmentioning
confidence: 99%
“…In the literature, extracted invariants vary from boolean expressions capturing a relationship between two variables in a particular program point, to frequent patterns of usage behavior, to various automata and temporal rules. The extracted candidate invariants are used to support comprehension, testing, and formal verification tasks (see, e.g., [4], [7], [8], [31], [33], [32]). …”
Section: Introductionmentioning
confidence: 99%