Comparing Constraints Mined From Execution Logs to Understand Software Evolution

01/08/2020
by   Thomas Krismayer, et al.
0

Complex software systems evolve frequently, e.g., when introducing new features or fixing bugs during maintenance. However, understanding the impact of such changes on system behavior is often difficult. Many approaches have thus been proposed that analyze systems before and after changes, e.g., by comparing source code, model-based representations, or system execution logs. In this paper, we propose an approach for comparing run-time constraints, synthesized by a constraint mining algorithm, based on execution logs recorded before and after changes. Specifically, automatically mined constraints define the expected timing and order of recurring events and the values of data elements attached to events. Our approach presents the differences of the mined constraints to users, thereby providing a higher-level view on software evolution and supporting the analysis of the impact of changes on system behavior. We present a motivating example and a preliminary evaluation based on a cyber-physical system controlling unmanned aerial vehicles. The results of our preliminary evaluation show that our approach can help to analyze changed behavior and thus contributes to understanding software evolution.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/18/2021

What Distributed Systems Say: A Study of Seven Spark Application Logs

Execution logs are a crucial medium as they record runtime information o...
research
12/03/2021

GECCO: Constraint-driven Abstraction of Low-level Event Logs

Process mining enables the analysis of complex systems using event data ...
research
05/17/2022

A Multi-level Methodology for Behavioral Comparison of Software-Intensive Systems

Software-intensive systems constantly evolve. To prevent software change...
research
07/14/2023

Leveraging Traceability to Integrate Safety Analysis Artifacts into the Software Development Process

Safety-critical system's failure or malfunction can cause loss of human ...
research
06/02/2023

EvLog: Evolving Log Analyzer for Anomalous Logs Identification

Software logs record system activities, aiding maintainers in identifyin...
research
10/24/2019

How Do Code Changes Evolve in Different Platforms? A Mining-based Investigation

Code changes are performed differently in the mobile and non-mobile plat...
research
06/01/2022

Mining Function Homology of Bot Loaders from Honeypot Logs

Self-contained loaders are widely adopted in botnets for injecting loadi...

Please sign up or login with your details

Forgot password? Click here to reset