Please use this identifier to cite or link to this item: http://dx.doi.org/10.25673/13472
Title: Variational debugging : understandig differences among executions
Author(s): Meinicke, Jens
Referee(s): Saake, Gunter
Granting Institution: Otto-von-Guericke-Universität Magdeburg, Fakultät für Informatik
Issue Date: 2019
Type: PhDThesis
Exam Date: 2019
Language: English
Publisher: Otto von Guericke University Library, Magdeburg, Germany
URN: urn:nbn:de:gbv:ma9:1-1981185920-135590
Subjects: Software engineering
Abstract: Interactions among multiple program inputs or options can lead to undesired or wrong behavior, such as system crashes and security vulnerabilities. This is especially challenging for large numbers of inputs such as for highly configurable systems, as the number of configurations to test grows exponentially with the number of boolean options. A lot of research has focused on systematically covering this con- figuration space, however there is little knowledge on how inputs interact as they can only be observed from their effects (e.g., from bug reports). A better understanding of interactions is needed to improve quality assurance. In this thesis, we developed a dynamic analysis based on variational execution, that monitors data and control ow interactions among all options simultaneously. We analyzed the program traces of multiple medium sized highly-configurable systems to characterize and identify where and how interactions occur. We found that the essential configuration complexity (i.e., the degree of interactions occurring during executions) is indeed much lower than the combinatorial explosion, but that the pattern of how options interact are more nuanced than what state of the art analysis techniques exploit. Interaction characteristics can inform analysis techniques, however, understanding of a specific interaction (e.g., a system crash), is challenging as this requires understanding how multiple inputs interact with each other to cause this undesired behavior while the program succeeds otherwise. Debugging such faults requires understanding the individual effects of inputs and how they interact to cause the fault. Contrasting traces of failing and the succeeding executions can reveal the interactions in their differences, and thus the information needed to understand the fault. We propose to align the execution traces of all configurations to discover and explain interactions. As complete traces are too large to be used for debugging, we present variational traces that concisely represent the differences on data and control flow caused by interactions. We again use variational executions to scale the generation of variational traces to exponential configuration spaces. To enable programmers interacting with such variational traces, we provide our debugging tool Varviz. We have shown that variational traces improve the performance of debugging variability faults by a factor of two compared to standard debuggers.
URI: https://opendata.uni-halle.de//handle/1981185920/13559
http://dx.doi.org/10.25673/13472
Open Access: Open access publication
License: (CC BY-NC 4.0) Creative Commons Attribution NonCommercial 4.0(CC BY-NC 4.0) Creative Commons Attribution NonCommercial 4.0
Appears in Collections:Fakultät für Informatik

Files in This Item:
File Description SizeFormat 
Meinicke_Jens_Dissertation_2019.pdfDissertation5.65 MBAdobe PDFThumbnail
View/Open