ACDC: Altering Control Dependence Chains for Automated Patch Generation

نویسندگان

  • Rawad Abou Assi
  • Chadi Trad
  • Wes Masri
چکیده

Once a failure is observed, the primary concern of the developer is to identify what caused it in order to repair the code that induced the incorrect behavior. Until a permanent repair is afforded, code repair patches are invaluable. The aim of this work is to devise an automated patch generation technique that proceeds as follows: Step1) It identifies a set of failure-causing control dependence chains that are minimal in terms of number and length. Step2) It identifies a set of predicates within the chains along with associated execution instances, such that negating the predicates at the given instances would exhibit correct behavior. Step3) For each candidate predicate, it creates a classifier that dictates when the predicate should be negated to yield correct program behavior. Step4) Prior to each candidate predicate, the faulty program is injected with a call to its corresponding classifier passing it the program state and getting a return value predictively indicating whether to negate the predicate or not. The role of the classifiers is to ensure that: 1) the predicates are not negated during passing runs; and 2) the predicates are negated at the appropriate instances within failing runs. We implemented our patch generation approach for the Java platform and evaluated our toolset using 148 defects from the Introclass and Siemens benchmarks. The toolset identified 56 full patches and another 46 partial patches, and the classification accuracy averaged 84%.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BIC based on Modified Droop Control of Hybrid AC/DC Microgrid with PV/Wind/ESS under Variable Generation and Load Conditions

The idea of a microgrid is created by utilizing more diverse ac or dc distributed generation (DG) sources along with an energy storage system (ESS) and loads. The most efficient and reliable selection of ac and dc microgrids is a hybrid ac/dc microgrid. The hybrid microgrid largely overcomes the shortcomings of standalone ac or dc microgrids. A bidirectional interlinking converter (BIC) is util...

متن کامل

Automated cell type discovery and classification through knowledge transfer

Motivation Recent advances in mass cytometry allow simultaneous measurements of up to 50 markers at single-cell resolution. However, the high dimensionality of mass cytometry data introduces computational challenges for automated data analysis and hinders translation of new biological understanding into clinical applications. Previous studies have applied machine learning to facilitate processi...

متن کامل

Automated Change Detection and Classification System

This paper describes an Automated Change Detection and Classification (ACDC) system being developed by the Naval Research Laboratory (NRL) for the Mine Warfare group at the Naval Oceanographic Office (NAVOCEANO). ACDC autonomously detects features in sidescan imagery, classifies the features, searches through historical and dynamic databases of previously detected features and performs change d...

متن کامل

Supervisory Control of a Hybrid AC/DC Micro-Grid with Load Shedding Based on the Bankruptcy Problem

In this paper, a supervisory controller is proposed to manage the power flow in a hybrid AC/DC micro-grid for both grid-connected and disconnected modes. When the hybrid AC/DC micro-grid is connected to the utility grid, power surplus or shortage leads to power trade between the micro-grid and the utility grid. In the grid-disconnected mode, the renewable power sources (wind and solar generatio...

متن کامل

Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems

Software is everywhere, from mission critical systems such as industrial power stations, pacemakers and even household appliances. This growing dependence on technology and the increasing complexity software has serious security implications as it means we are potentially surrounded by software that contain exploitable vulnerabilities. These challenges have made binary analysis an important are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1705.00811  شماره 

صفحات  -

تاریخ انتشار 2017