Abstract
There are many web-based applications for multi-agent systems (MAS). However, developing MAS is not easy, because agents have many different variables, and it is difficult to validate them. PHP is one of the most popular web programming languages. PHP is dynamically typed, which means that the type of variable is assigned when the variable is accessed. This flexibility makes it easier to develop MAS. On the contrary, when a programmer refers variables to other PHP files, misreferences among the PHP files may occur because it is difficult to find references across files. To solve these misreferences, we propose a bug-finding tool called Mis.Config using static analysis. We used control flow graphs (CFGs) and thin slicing to realize this purpose. In our experiment, we applied our tool to real-world software to investigate whether Mis.Config can find misreferenced configurations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Allen, F.E.: Control flow analysis. 5(7), 1–19 (1970)
Attariyan, M., Flinn, J.: Automating configuration troubleshooting with dynamic information flow analysis. In: Proceedings of OSDI, vol. 10, pp. 1–14 (2010)
Castro-Schez, J.J., Miguel, R., Vallejo, D., López-López, L.M.: A highly adaptive recommender system based on fuzzy logic for B2C e-commerce portals. Expert Syst. Appl. 38(3), 2441–2454 (2011)
El Hajj, F., El Hajj, A., Chehade, R.A.: Multi-agent system vulnerability detector for a secured e-learning environment. In: Proceedings of ICDIPCl, pp. 113–118. IEEE (2016)
Eshkevari, L., Dos Santos, F., Cordy, J.R., Antoniol, G.: Are PHP applications ready for hack? In: Proceedings of IEEE SANER, pp. 63–72 (2015)
de la Hoz, E., Gimenez-Guzman, J.M., Marsa-Maestre, I., Cruz-Piris, L., Orden, D.: A distributed, multi-agent approach to reactive network resilience. In: Proceedings of AAMAS, pp. 1044–1053 (2017)
Nadi, S., Berger, T., Kästner, C., Czarnecki, K.: Mining configuration constraints: static analyses and empirical results. In: Proceedings of ICSE, pp. 140–151 (2014)
Nguyen, H.V., Kästner, C., Nguyen, T.N.: Cross-language program slicing for dynamic web applications. In: Proceedings of FSE, pp. 369–380 (2015)
Sayagh, M., Adams, B.: Multi-layer software configuration: empirical study on wordpress. In: Proceedings of IEEE SCAM, pp. 31–40 (2015)
Sridharan, M., Fink, S.J., Bodik, R.: Thin slicing. ACM SIGPLAN Notices 42(6), 112–122 (2007)
Su, Y.Y., Attariyan, M., Flinn, J.: Autobash: improving configuration management with operating system causality analysis. ACM SIGOPS Oper. Syst. Rev. 41(6), 237–250 (2007)
Verna, I., Bucciarelli, E., Giulioni, G., Silvestri, M.: The teaching evaluation model: a web application framework. In: Bajo, J., Escalona, M.J., Giroux, S., Hoffa-Dabrowska, P., Julián, V., Novais, P., Sánchez-Pi, N., Unland, R., Azambuja-Silveira, R. (eds.) Proceedings of PAAMS (2016)
Wang, M., Kawamura, T., Sei, Y., Nakagawa, H., Tahara, Y., Ohsuga, A.: Music recommender adapting implicit context using ‘renso’ relation among linked data. J. Inf. Process. 22(2), 279–288 (2014). https://doi.org/10.2197/ipsjjip.22.279
Weiser, M.: Program slicing. In: Proceedings of ICSE, pp. 439–449 (1981)
Xia, X., Lo, D., Qiu, W., Wang, X., Zhou, B.: Automated configuration bug report prediction using text mining. In: Proceedings of IEEE COMPSAC, pp. 107–116 (2014)
Zhang, S., Ernst, M.D.: Which configuration option should i change? In: Proceedings of ICSE, pp. 152–163 (2014)
Acknowledgements
This work was supported by JSPS KAKENHI Grant Numbers JP17H04705, JP18H03229, JP18H03340, JP18K19835, JP19H04113, JP19K12107.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Yoda, M., Sei, Y., Tahara, Y., Ohsuga, A. (2020). Mis.Config: Finding Misreferred Configuration Bugs in Web Application Using Thin Slicing. In: Lee, R. (eds) Computer and Information Science. ICIS 2019. Studies in Computational Intelligence, vol 849. Springer, Cham. https://doi.org/10.1007/978-3-030-25213-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-25213-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-25212-0
Online ISBN: 978-3-030-25213-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)