Proceedings of the Eighteenth International Symposium on Software Testing and Analysis 2009
DOI: 10.1145/1572272.1572290
|View full text |Cite
|
Sign up to set email alerts
|

Identifying bug signatures using discriminative graph mining

Abstract: Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Although such methods could be very accurate, it is usually very hard for developers to understand the context of the bug, given each bug location in isolation. In this study, we propose to model software executions with graphs at two levels of granularity: methods and basic blocks. An individual node represents a method or basic block … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
143
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 111 publications
(143 citation statements)
references
References 31 publications
0
143
0
Order By: Relevance
“…The 20 association measures that we consider are: ϕ-coefficient [23] [19], support [5], confidence [5], Clark and Boswell's Laplace accuracy [12], conviction [9], interest [9], cosine [45], Piatetsky-Shapiro's Leverage [35], certainty factor [40], added value [45], collective strength [4], Jaccard [21], Klosgen [28], and information gain [10], [37].…”
Section: B Association Measuresmentioning
confidence: 99%
“…The 20 association measures that we consider are: ϕ-coefficient [23] [19], support [5], confidence [5], Clark and Boswell's Laplace accuracy [12], conviction [9], interest [9], cosine [45], Piatetsky-Shapiro's Leverage [35], certainty factor [40], added value [45], collective strength [4], Jaccard [21], Klosgen [28], and information gain [10], [37].…”
Section: B Association Measuresmentioning
confidence: 99%
“…Localising Call-Graph-Affecting Bugs. In the past years, a number of callgraph-based techniques for defect localisation have been proposed [3,5,7,8,18]. Their basic idea is to mine for patterns in the call graph which are characteristic for failing executions.…”
Section: Fundamentals Of Call-graph-based Defect Localisationmentioning
confidence: 99%
“…Existing techniques focus on structure-affecting bugs [3,5,7,18] and callfrequency-affecting bugs [7,8]. The graphs in [3,5,18] incorporate temporal information, the ones in [7,8] do not.…”
Section: Fundamentals Of Call-graph-based Defect Localisationmentioning
confidence: 99%
See 2 more Smart Citations