the middle program
play

The middle program $ middle 3 3 5 middle: 3 $ middle 2 1 3 - PDF document

Detecting Anomalies Andreas Zeller 1 Tracing Infections For every infection, we must find the earlier infection that causes it. Which origin should we focus upon? 2 2 Tracing Infections 3 3 Focusing on Anomalies


  1. Detecting Anomalies Andreas Zeller 1 Tracing Infections • For every infection, we must find the earlier infection that causes it. • Which origin should we focus upon? ✘ 2 2 Tracing Infections ✘ 3 3

  2. Focusing on Anomalies • Examine origins and locations where something abnormal happens ✘ 4 4 What’s normal? • General idea: Use induction – reasoning from the particular to the general • Start with a multitude of runs • Determine properties that are common across all runs 5 5 What’s abnormal? • Suppose we determine common properties of all passing runs. • Now we examine a run which fails the test. • Any difference in properties correlates with failure – and is likely to hint at failure causes 6 6

  3. Detecting Anomalies Run Run Run Run Run Run ✔ ✘ Properties Properties Differences correlate with failure 7 7 Properties Data properties that hold in all runs: • “At f(), x is odd” • “0 ≤ x ≤ 10 during the run” Code properties that hold in all runs: • “f() is always executed” • “After open(), we eventually have close()” 8 8 Comparing Coverage 1. Every failure is caused by an infection, which in turn is caused by a defect 2. The defect must be executed to start the infection 3. Code that is executed in failing runs only is thus likely to cause the defect 9 9

  4. The middle program $ middle 3 3 5 middle: 3 $ middle 2 1 3 middle: 1 10 10 int main(int arc, char *argv[]) { int x = atoi(argv[1]); int y = atoi(argv[2]); int z = atoi(argv[3]); int m = middle(x, y, z); printf("middle: %d\n", m); return 0; } 11 11 int middle(int x, int y, int z) { int m = z; if (y < z) { if (x < y) m = y; else if (x < z) m = y; } else { if (x > y) m = y; else if (x > z) m = x; } return m; } 12 12

  5. Obtaining Coverage for C programs 13 13 x 3 1 3 5 5 2 y 3 2 2 5 3 1 z 5 3 1 5 4 3 int middle(int x, int y, int z) { • • • • • • int m = z; • • • • • • if (y < z) { • • • • • • if (x < y) • m = y; • else if (x < z) • • • m = y; • • } else { • • • if (x > y) • m = y; • else if (x > z) m = x; } return m; • • • • • • } ✔ ✔ ✔ ✔ ✔ ✘ 14 14 Discrete Coloring executed only in failing runs highly suspect executed in passing and failing runs ambiguous executed only in passing runs likely correct 15 15

  6. x 3 1 3 5 5 2 y 3 2 2 5 3 1 z 5 3 1 5 4 3 int middle(int x, int y, int z) { • • • • • • int m = z; • • • • • • if (y < z) { • • • • • • if (x < y) • m = y; • else if (x < z) • • • m = y; • • } else { • • • if (x > y) • m = y; • else if (x > z) m = x; } return m; • • • • • • } ✔ ✔ ✔ ✔ ✔ ✘ 16 16 x 3 1 3 5 5 2 y 3 2 2 5 3 1 z 5 3 1 5 4 3 int middle(int x, int y, int z) { • • • • • • int m = z; • • • • • • if (y < z) { • • • • • • if (x < y) • m = y; • else if (x < z) • • • m = y; • • } else { • • • if (x > y) • m = y; • else if (x > z) m = x; } return m; • • • • • • } ✔ ✔ ✔ ✔ ✔ ✘ 17 17 Continuous Coloring executed only in failing runs passing and failing runs executed only in passing runs 18 18

  7. Hue % passed (s) hue (s) = red hue + % passed (s) + % failed (s) × hue range 0% passed 100% passed 19 19 Brightness frequently executed � � bright (s) = max % passed (s), % failed (s) rarely executed 20 20 x 3 1 3 5 5 2 y 3 2 2 5 3 1 z 5 3 1 5 4 3 int middle(int x, int y, int z) { • • • • • • int m = z; • • • • • • if (y < z) { • • • • • • if (x < y) • m = y; • else if (x < z) • • • m = y; • • } else { • • • if (x > y) • m = y; • else if (x > z) m = x; } return m; • • • • • • } ✔ ✔ ✔ ✔ ✔ ✘ Source: Jones et al., ICSE 2002 21 21

  8. 22 Source: Jones et al., ICSE 2002 22 Evaluation How well does comparing coverage detect anomalies? • How green are the defects? (false negatives) • How red are non-defects? (false positives) 23 23 Space • 8000 lines of executable code • 1000 test suites with156–4700 test cases • 20 defective versions with one defect each (corrected in subsequent version) 24 24

  9. 18 of 20 defects are correctly classified in the “reddest” portion of the code Source: Jones et al., ICSE 2002 25 25 The “reddest” portion is at most 20% of the code Source: Jones et al., ICSE 2002 26 26 Siemens Suite • 7 C programs, 170–560 lines • 132 variations with one defect each • 108 all yellow (i.e., useless) • 1 with one red statement (at the defect) 27 27 Source: Renieris and Reiss, ASE 2003

  10. Nearest Neighbor Run Run Run Run Run Run ✔ ✘ 28 28 Nearest Neighbor Run Run Run Run Run Run ✔ ✔ ✘ Compare with the single run that has the most similar coverage 29 29 Results obtained from Siemens test suite; can not be generalized Locating Defects Nearest Neighbor Intersection Renieris+Reiss (ASE 2003) Jones et al. (ICSE 2002) 100 % of failing tests 75 50 25 0 0 <10 <20 <30 <40 <50 <60 <70 <80 <90 <100 % of executed source code to examine 30 30

  11. Sequences Sequences of locations can correlate with failures: open() read() close() ✔ open() close() read() ✘ close() open() read() ✘ …but all locations are executed in both runs! 31 31 The AspectJ Compiler $ ajc Test3.aj $ java test.Test3 test.Test3@b8df17.x Unexpected Signal : 11 occurred at PC=0xFA415A00 Function name=(N/A) Library=(N/A) ... Please report this error at http:// java.sun.com/... $ 32 32 Coverage Di fg erences • Compare the failing run with passing runs • BcelShadow.getThisJoinPointVar() is invoked in the failing run only • Unfortunately, this method is correct 33 33

  12. Sequence Di fg erences This sequence occurs only in the failing run: ThisJoinPointVisitor.isRef() , ThisJoinPointVisitor.canTreatAsStatic() , � � MethodDeclaration.traverse() , ThisJoinPointVisitor.isRef() , ThisJoinPointVisitor.isRef() Defect location 34 34 Collecting Sequences Trace anInputStreamObj mark read read skip read read skip read mark read InputStream read read mark read read skip skip read skip read read read read read read skip read skip skip read Sequences Sequence Set 35 35 Ingoing vs. Outgoing aProducer aConsumer aQueue aLinkedList aLogger add add isEmpty size get add firstElement removeFirst isEmpty size add add add add incoming outgoing calls calls 36 36

  13. Anomalies weights ranking by average weight passing run passing run 0.60 1.0 0.5 0.5 0 0.50 0.5 0.5 1.0 0.40 failing run 37 37 NanoXML • Simple XML parser written in Java • 5 revisions, each with 16–23 classes • 33 errors discovered or seeded 38 38 Locating Defects Results obtained from NanoXML; can not be generalized AMPLE/window size 8 Dallmeier et al. (ECOOP 2005) 100 % of failing tests 75 50 on average 0.5 classes 25 less than window size 1 0 0 1 2 3 4 5 6 7 8 9 classes to examine (of 16) 39 39

  14. 40 40 Properties Data properties that hold in all runs: • “At f(), x is odd” • “0 ≤ x ≤ 10 during the run” Code properties that hold in all runs: • “f() is always executed” • “After open(), we eventually have close()” 41 41 Techniques Dynamic Value Sampled Invariants Ranges Values 42 42

  15. Techniques Dynamic Value Sampled Invariants Ranges Values 43 43 Dynamic Invariants Run Run Run Run Run Run ✔ ✘ Invariant Property At f(), x is odd At f(), x = 2 44 44 Daikon • Determines invariants from program runs • Written by Michael Ernst et al. (1998–) • C++, Java, Lisp, and other languages • analyzed up to 13,000 lines of code 45 45

  16. Daikon public int ex1511(int[] b, int n) Precondition { n == size(b[]) int s = 0; b != null int i = 0; n <= 13 n >= 7 while (i != n) { s = s + b[i]; Postcondition i = i + 1; b[] = orig(b[]) } return == sum(b) return s; } • Run with 100 randomly generated arrays of length 7–13 46 46 Daikon get trace Run Run Trace Run Run Run ✔ filter invariants Postcondition report results Invariant Invariant b[] = orig(b[]) Invariant return == sum(b) Invariant 47 47 Getting the Trace Run Run Trace Run Run Run ✔ • Records all variable values at all function entries and exits • Uses VALGRIND to create the trace 48 48

  17. Filtering Invariants Trace • Daikon has a library of invariant patterns over variables and constants • Only matching patterns are preserved Invariant Invariant Invariant Invariant 49 49 Method Specifications using primitive data x = 6 x ∈ {2, 5, –30} x < y y = 5x + 10 z = 4x +12y +3 z = fn(x, y) using composite data A subseq B x ∈ A sorted(A) checked at method entry + exit 50 50 Object Invariants string.content[string.length] = ‘\0’ node.left.value ≤ node.right.value this.next.last = this checked at entry + exit of public methods 51 51

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend