Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering 2011
DOI: 10.1145/2025113.2025151
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging existing instrumentation to automatically infer invariant-constrained models

Abstract: Computer systems are often difficult to debug and understand. A common way of gaining insight into system behavior is to inspect execution logs and documentation. Unfortunately, manual inspection of logs is an arduous process and documentation is often incomplete and out of sync with the implementation. This paper presents Synoptic, a tool that helps developers by inferring a concise and accurate system model. Unlike most related work, Synoptic does not require developer-written scenarios, specifications, nega… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
161
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 172 publications
(168 citation statements)
references
References 45 publications
3
161
0
Order By: Relevance
“…Results that generalize to poorly-understood libraries. 4. Enhancements to an existing third-party technique [16], further corroborating our hypothesis that using inferred invariants during model construction yields higher-quality models.…”
Section: Introductionsupporting
confidence: 75%
See 2 more Smart Citations
“…Results that generalize to poorly-understood libraries. 4. Enhancements to an existing third-party technique [16], further corroborating our hypothesis that using inferred invariants during model construction yields higher-quality models.…”
Section: Introductionsupporting
confidence: 75%
“…Such a specification should, for example, assert that communication libraries (e.g., Apache's [1] libraries) require a connection to be established before data is sent. Numerous techniques have been proposed to that end [3,4,10,15,19,20,32,33,41,46]. These techniques either (1) infer finite state machine (FSM) models that match the observed executions [3,4,9,20,32,38,44], or (2) identify the declarative class and method invariants by considering a library's state (i.e., its internal variables) [10,19,45].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The approach presented in [5] (which extends the work described in [6]) uses the CSight tool to produce Communicating Finite State Machines (CFSM) from logs of execution based on regular expressions provided by users. They deal with logs of concurrent systems and require that vector timestamps be inserted in the traces to determine the partial order of the concurrent events.…”
Section: Related Workmentioning
confidence: 99%
“…Usage profiles can be specified based on physical phenomena, known sensor parameters or other domain specific knowledge about the program and its deployment context. They can also be built automatically based on observed data from past usages of the program [19,5].…”
Section: Probabilistic Software Analysismentioning
confidence: 99%