Skip to main content

Finding Discriminative Weighted Sub-graphs to Identify Software Bugs

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 70))

Abstract

The aim has been to detect discriminative sub-graphs which are highly distinguishable between program failing and passing execution graphs resulted from different runs. In this paper, a novel approach to mine weighted-edge graphs is proposed. We also apply our efficient objective function to find most discriminative patterns between failing and passing graphs. To find bug relevant sub-graphs, a decision tree classifier is used to classify program failing and passing runs based on their discriminative sub-graphs. The experimental results on Siemens test suite reveal the effectiveness of the proposed approach specifically in finding multiple bugs. It also gives the debugger an infection path related to the discovered bug(s).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arumuga Nainar, P., Chen, T., Rosin, J., Liblit, B.: Statistical debugging using compound Boolean predicates. In: International Symposium on Software Testing and Analysis, pp. 5–15. ACM Press, London (2007)

    Google Scholar 

  2. Fei, L., Lee, K., Li, F., Midkiff, S.P.: Argus: Online statistical bug detection. In: Baresi, L., Heckel, R. (eds.) FASE 2006. LNCS, vol. 3922, pp. 308–323. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Yan, X., Cheng, H., Han, J., Yu, P.: Mining Significant Graph Patterns by Leap Search. In: International Conference on Management of Data, pp. 433–444. ACM Press, Canada (2008)

    Google Scholar 

  4. Cheng, H., Lo, D., Zhou, Y., Wang, X.: Identifying Bug Signatures Using Discriminative Graph Mining. In: International Symptoms on Software Testing and Analysis, pp. 141–151. ACM Press, USA (2009)

    Google Scholar 

  5. Ohara, K., Hara, M., Takabayashi, K., Motoda, H.: Pruning Strategies Based on the Upper Bound of Information Gain for Discriminative Sub-graph Mining. In: Richards, D., Kang, B.-H. (eds.) PKAW 2008. LNCS, vol. 5465, pp. 50–60. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Cook, D., Holder, L.: Mining Graph Data. John Wiley and Sons, Chichester (2006)

    Book  Google Scholar 

  7. Zeller, A.: Why Programs Fail: A Guide to Systematic Debugging. Morgan Kaufmann, San Francisco (2006)

    Google Scholar 

  8. Software-artifact infrastructure repository, http://sir.unl.edu/portal

  9. Eichinger, F., Bohm, K., Huber, M.: Mining Edge-Weighted Call Graphs to Localize Software Bugs. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part I. LNCS (LNAI), vol. 5211, pp. 333–348. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  10. Tan, P., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison-Wesley Press, USA (2005)

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Parsa, S., Arabi, S., Ebrahimi, N., Vahidi-Asl, M. (2010). Finding Discriminative Weighted Sub-graphs to Identify Software Bugs. In: Das, V.V., et al. Information Processing and Management. BAIP 2010. Communications in Computer and Information Science, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12214-9_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12214-9_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12213-2

  • Online ISBN: 978-3-642-12214-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics