A literature review on different types of empirically evaluated bug localization approaches

by   Filip Zamfirov, et al.

Today, software systems have a significant role in various domains among which are healthcare, entertainment, transport and logistics, and many more. It is only natural that with this increasing dependency on software, the number of software systems increases. Additionally, these systems become more and more complex. All this leads to a rise in the number of software faults also known as bugs. As a result, the ability to locate the source of a bug (e.g. a file or a commit) is vital for the development and maintenance of efficient software solutions. Bug localization refers to the automated process of discovering files that contain bugs, based on a bug report. This research project aims to make a literature review on different techniques for bug localization. This study distinguishes itself from other surveys and literature reviews [1] in one significant way. The focus of the work is on identifying, categorizing and analyzing existing bug localization methods and tools which were evaluated in an industrial setting. To the best of my knowledge, there are no other works that prioritise this aspect. Unfortunately, such literature is scarce, therefore, bug localization techniques evaluated on open source software are also included.


page 1

page 2

page 3

page 4


Broccoli: Bug localization with the help of text search engines

Bug localization is a tedious activity in the bug fixing process in whic...

DABT: A Dependency-aware Bug Triaging Method

In software engineering practice, fixing a bug promptly reduces the asso...

A Fault Localization and Debugging Support Framework driven by Bug Tracking Data

Fault localization has been determined as a major resource factor in the...

Comparing Bug Finding Tools with Reviews and Tests

Bug finding tools can find defects in software source code us- ing an au...

Machine Learning for Microprocessor Performance Bug Localization

The validation process for microprocessors is a very complex task that c...

Understanding the Heterogeneity of Contributors in Bug Bounty Programs

Background: While bug bounty programs are not new in software developmen...

Please sign up or login with your details

Forgot password? Click here to reset