Exploration of the scalability of LocFaults approach for error localization with While-loops programs

03/18/2015
by   Mohammed Bekkouche, et al.
0

A model checker can produce a trace of counterexample, for an erroneous program, which is often long and difficult to understand. In general, the part about the loops is the largest among the instructions in this trace. This makes the location of errors in loops critical, to analyze errors in the overall program. In this paper, we explore the scala-bility capabilities of LocFaults, our error localization approach exploiting paths of CFG(Control Flow Graph) from a counterexample to calculate the MCDs (Minimal Correction Deviations), and MCSs (Minimal Correction Subsets) from each found MCD. We present the times of our approach on programs with While-loops unfolded b times, and a number of deviated conditions ranging from 0 to n. Our preliminary results show that the times of our approach, constraint-based and flow-driven, are better compared to BugAssist which is based on SAT and transforms the entire program to a Boolean formula, and further the information provided by LocFaults is more expressive for the user.

READ FULL TEXT

Authors

page 1

page 2

page 3

page 4

03/18/2015

Exploration of the scalability of LocFaults

A model checker can produce a trace of counterexample, for an erroneous ...
04/25/2014

Une approche CSP pour l'aide à la localisation d'erreurs

We introduce in this paper a new CP-based approach to support errors loc...
07/26/2020

funcGNN: A Graph Neural Network Approach to Program Similarity

Program similarity is a fundamental concept, central to the solution of ...
06/02/2021

Efficient and Expressive Bytecode-Level Instrumentation for Java Programs

We present an efficient and expressive tool for the instrumentation of J...
11/11/2020

GRCNN: Graph Recognition Convolutional Neural Network for Synthesizing Programs from Flow Charts

Program synthesis is the task to automatically generate programs based o...
06/12/2019

SPoC: Search-based Pseudocode to Code

We consider the task of mapping pseudocode to long programs that are fun...
06/06/2018

Obfuscation Resilient Search throughExecutable Classification

Android applications are usually obfuscated before release, making it di...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.