ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study

Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiti...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on parallel and distributed systems 2016-03, Vol.27 (3), p.724-734
Hauptverfasser: Wu, Shangru, Yang, Chunbai, Jia, Changjiang, Chan, W. K.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 734
container_issue 3
container_start_page 724
container_title IEEE transactions on parallel and distributed systems
container_volume 27
creator Wu, Shangru
Yang, Chunbai
Jia, Changjiang
Chan, W. K.
description Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiting significant influence? This work presents the first controlled experiment that studies two design factors, abstraction level and subspace, in partitioning such instances through 35 resultant partition-based techniques on 10 benchmarks with known vulnerability-related bugs. The empirical analysis reveals significant findings. First, partition-based prioritization can significantly improve the fault detection rate. Second, coarse-grained techniques are more effective than fine-grained ones, and using some one-dimensional subspaces is more effective than using other dimensional subspaces. Third, eight previously unknown techniques can be more effective than the technique modeled after a state-of-the-art dynamic detector.
doi_str_mv 10.1109/TPDS.2015.2412544
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TPDS_2015_2412544</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7059243</ieee_id><sourcerecordid>4047460241</sourcerecordid><originalsourceid>FETCH-LOGICAL-c326t-69db71638fadb50ebaad5fe18bd86b0762330f6839221604f506fd83e10a3ce43</originalsourceid><addsrcrecordid>eNpdkMtKxDAUhosoeH0AcRNw46ZjTm5N3Q3OeAHBgVG3IW0TzdBpxiRF5u1tmcGFq3P4-f7D4cuyS8ATAFzevi1mywnBwCeEAeGMHWQnwLnMCUh6OOyY8bwkUB5npzGuMAbGMTvJmulycYemVUxB18n5Di37Km50bdBCh-TGyHWfyPqAZiaZHeMtmia_drVLW_ThfKvHOKIfl76Q7tB8vXHB1bpFy9Q32_PsyOo2mov9PMveH-Zv90_5y-vj8_30Ja8pESkXZVMVIKi0uqk4NpXWDbcGZNVIUeFCEEqxFZKWhIDAzHIsbCOpAaxpbRg9y252dzfBf_cmJrV2sTZtqzvj-6hADjVBmZQDev0PXfk-dMN3CgpZEEIwgYGCHVUHH2MwVm2CW-uwVYDV6F2N3tXoXe29D52rXccZY_74AvOSMEp_AZzvfmE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1787222021</pqid></control><display><type>article</type><title>ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study</title><source>IEEE Electronic Library (IEL)</source><creator>Wu, Shangru ; Yang, Chunbai ; Jia, Changjiang ; Chan, W. K.</creator><creatorcontrib>Wu, Shangru ; Yang, Chunbai ; Jia, Changjiang ; Chan, W. K.</creatorcontrib><description>Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiting significant influence? This work presents the first controlled experiment that studies two design factors, abstraction level and subspace, in partitioning such instances through 35 resultant partition-based techniques on 10 benchmarks with known vulnerability-related bugs. The empirical analysis reveals significant findings. First, partition-based prioritization can significantly improve the fault detection rate. Second, coarse-grained techniques are more effective than fine-grained ones, and using some one-dimensional subspaces is more effective than using other dimensional subspaces. Third, eight previously unknown techniques can be more effective than the technique modeled after a state-of-the-art dynamic detector.</description><identifier>ISSN: 1045-9219</identifier><identifier>EISSN: 1558-2183</identifier><identifier>DOI: 10.1109/TPDS.2015.2412544</identifier><identifier>CODEN: ITDSEO</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>abstraction ; Atomicity violations ; Benchmark testing ; Benchmarks ; Computer bugs ; Concurrency ; Concurrent computing ; Context ; Design factors ; Detectors ; Dynamics ; Empirical analysis ; Instruction sets ; multithreaded programs ; Partitioning ; Subspaces ; testing and debugging</subject><ispartof>IEEE transactions on parallel and distributed systems, 2016-03, Vol.27 (3), p.724-734</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c326t-69db71638fadb50ebaad5fe18bd86b0762330f6839221604f506fd83e10a3ce43</citedby><cites>FETCH-LOGICAL-c326t-69db71638fadb50ebaad5fe18bd86b0762330f6839221604f506fd83e10a3ce43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7059243$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7059243$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wu, Shangru</creatorcontrib><creatorcontrib>Yang, Chunbai</creatorcontrib><creatorcontrib>Jia, Changjiang</creatorcontrib><creatorcontrib>Chan, W. K.</creatorcontrib><title>ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study</title><title>IEEE transactions on parallel and distributed systems</title><addtitle>TPDS</addtitle><description>Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiting significant influence? This work presents the first controlled experiment that studies two design factors, abstraction level and subspace, in partitioning such instances through 35 resultant partition-based techniques on 10 benchmarks with known vulnerability-related bugs. The empirical analysis reveals significant findings. First, partition-based prioritization can significantly improve the fault detection rate. Second, coarse-grained techniques are more effective than fine-grained ones, and using some one-dimensional subspaces is more effective than using other dimensional subspaces. Third, eight previously unknown techniques can be more effective than the technique modeled after a state-of-the-art dynamic detector.</description><subject>abstraction</subject><subject>Atomicity violations</subject><subject>Benchmark testing</subject><subject>Benchmarks</subject><subject>Computer bugs</subject><subject>Concurrency</subject><subject>Concurrent computing</subject><subject>Context</subject><subject>Design factors</subject><subject>Detectors</subject><subject>Dynamics</subject><subject>Empirical analysis</subject><subject>Instruction sets</subject><subject>multithreaded programs</subject><subject>Partitioning</subject><subject>Subspaces</subject><subject>testing and debugging</subject><issn>1045-9219</issn><issn>1558-2183</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkMtKxDAUhosoeH0AcRNw46ZjTm5N3Q3OeAHBgVG3IW0TzdBpxiRF5u1tmcGFq3P4-f7D4cuyS8ATAFzevi1mywnBwCeEAeGMHWQnwLnMCUh6OOyY8bwkUB5npzGuMAbGMTvJmulycYemVUxB18n5Di37Km50bdBCh-TGyHWfyPqAZiaZHeMtmia_drVLW_ThfKvHOKIfl76Q7tB8vXHB1bpFy9Q32_PsyOo2mov9PMveH-Zv90_5y-vj8_30Ja8pESkXZVMVIKi0uqk4NpXWDbcGZNVIUeFCEEqxFZKWhIDAzHIsbCOpAaxpbRg9y252dzfBf_cmJrV2sTZtqzvj-6hADjVBmZQDev0PXfk-dMN3CgpZEEIwgYGCHVUHH2MwVm2CW-uwVYDV6F2N3tXoXe29D52rXccZY_74AvOSMEp_AZzvfmE</recordid><startdate>20160301</startdate><enddate>20160301</enddate><creator>Wu, Shangru</creator><creator>Yang, Chunbai</creator><creator>Jia, Changjiang</creator><creator>Chan, W. K.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20160301</creationdate><title>ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study</title><author>Wu, Shangru ; Yang, Chunbai ; Jia, Changjiang ; Chan, W. K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c326t-69db71638fadb50ebaad5fe18bd86b0762330f6839221604f506fd83e10a3ce43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>abstraction</topic><topic>Atomicity violations</topic><topic>Benchmark testing</topic><topic>Benchmarks</topic><topic>Computer bugs</topic><topic>Concurrency</topic><topic>Concurrent computing</topic><topic>Context</topic><topic>Design factors</topic><topic>Detectors</topic><topic>Dynamics</topic><topic>Empirical analysis</topic><topic>Instruction sets</topic><topic>multithreaded programs</topic><topic>Partitioning</topic><topic>Subspaces</topic><topic>testing and debugging</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wu, Shangru</creatorcontrib><creatorcontrib>Yang, Chunbai</creatorcontrib><creatorcontrib>Jia, Changjiang</creatorcontrib><creatorcontrib>Chan, W. K.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on parallel and distributed systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wu, Shangru</au><au>Yang, Chunbai</au><au>Jia, Changjiang</au><au>Chan, W. K.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study</atitle><jtitle>IEEE transactions on parallel and distributed systems</jtitle><stitle>TPDS</stitle><date>2016-03-01</date><risdate>2016</risdate><volume>27</volume><issue>3</issue><spage>724</spage><epage>734</epage><pages>724-734</pages><issn>1045-9219</issn><eissn>1558-2183</eissn><coden>ITDSEO</coden><abstract>Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiting significant influence? This work presents the first controlled experiment that studies two design factors, abstraction level and subspace, in partitioning such instances through 35 resultant partition-based techniques on 10 benchmarks with known vulnerability-related bugs. The empirical analysis reveals significant findings. First, partition-based prioritization can significantly improve the fault detection rate. Second, coarse-grained techniques are more effective than fine-grained ones, and using some one-dimensional subspaces is more effective than using other dimensional subspaces. Third, eight previously unknown techniques can be more effective than the technique modeled after a state-of-the-art dynamic detector.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPDS.2015.2412544</doi><tpages>11</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1045-9219
ispartof IEEE transactions on parallel and distributed systems, 2016-03, Vol.27 (3), p.724-734
issn 1045-9219
1558-2183
language eng
recordid cdi_crossref_primary_10_1109_TPDS_2015_2412544
source IEEE Electronic Library (IEL)
subjects abstraction
Atomicity violations
Benchmark testing
Benchmarks
Computer bugs
Concurrency
Concurrent computing
Context
Design factors
Detectors
Dynamics
Empirical analysis
Instruction sets
multithreaded programs
Partitioning
Subspaces
testing and debugging
title ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T20%3A33%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ASP:%20Abstraction%20Subspace%20Partitioning%20for%20Detection%20of%20Atomicity%20Violations%20with%20an%20Empirical%20Study&rft.jtitle=IEEE%20transactions%20on%20parallel%20and%20distributed%20systems&rft.au=Wu,%20Shangru&rft.date=2016-03-01&rft.volume=27&rft.issue=3&rft.spage=724&rft.epage=734&rft.pages=724-734&rft.issn=1045-9219&rft.eissn=1558-2183&rft.coden=ITDSEO&rft_id=info:doi/10.1109/TPDS.2015.2412544&rft_dat=%3Cproquest_RIE%3E4047460241%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1787222021&rft_id=info:pmid/&rft_ieee_id=7059243&rfr_iscdi=true