ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study
Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiti...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on parallel and distributed systems 2016-03, Vol.27 (3), p.724-734 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 734 |
---|---|
container_issue | 3 |
container_start_page | 724 |
container_title | IEEE transactions on parallel and distributed systems |
container_volume | 27 |
creator | Wu, Shangru Yang, Chunbai Jia, Changjiang Chan, W. K. |
description | Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiting significant influence? This work presents the first controlled experiment that studies two design factors, abstraction level and subspace, in partitioning such instances through 35 resultant partition-based techniques on 10 benchmarks with known vulnerability-related bugs. The empirical analysis reveals significant findings. First, partition-based prioritization can significantly improve the fault detection rate. Second, coarse-grained techniques are more effective than fine-grained ones, and using some one-dimensional subspaces is more effective than using other dimensional subspaces. Third, eight previously unknown techniques can be more effective than the technique modeled after a state-of-the-art dynamic detector. |
doi_str_mv | 10.1109/TPDS.2015.2412544 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TPDS_2015_2412544</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7059243</ieee_id><sourcerecordid>4047460241</sourcerecordid><originalsourceid>FETCH-LOGICAL-c326t-69db71638fadb50ebaad5fe18bd86b0762330f6839221604f506fd83e10a3ce43</originalsourceid><addsrcrecordid>eNpdkMtKxDAUhosoeH0AcRNw46ZjTm5N3Q3OeAHBgVG3IW0TzdBpxiRF5u1tmcGFq3P4-f7D4cuyS8ATAFzevi1mywnBwCeEAeGMHWQnwLnMCUh6OOyY8bwkUB5npzGuMAbGMTvJmulycYemVUxB18n5Di37Km50bdBCh-TGyHWfyPqAZiaZHeMtmia_drVLW_ThfKvHOKIfl76Q7tB8vXHB1bpFy9Q32_PsyOo2mov9PMveH-Zv90_5y-vj8_30Ja8pESkXZVMVIKi0uqk4NpXWDbcGZNVIUeFCEEqxFZKWhIDAzHIsbCOpAaxpbRg9y252dzfBf_cmJrV2sTZtqzvj-6hADjVBmZQDev0PXfk-dMN3CgpZEEIwgYGCHVUHH2MwVm2CW-uwVYDV6F2N3tXoXe29D52rXccZY_74AvOSMEp_AZzvfmE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1787222021</pqid></control><display><type>article</type><title>ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study</title><source>IEEE Electronic Library (IEL)</source><creator>Wu, Shangru ; Yang, Chunbai ; Jia, Changjiang ; Chan, W. K.</creator><creatorcontrib>Wu, Shangru ; Yang, Chunbai ; Jia, Changjiang ; Chan, W. K.</creatorcontrib><description>Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiting significant influence? This work presents the first controlled experiment that studies two design factors, abstraction level and subspace, in partitioning such instances through 35 resultant partition-based techniques on 10 benchmarks with known vulnerability-related bugs. The empirical analysis reveals significant findings. First, partition-based prioritization can significantly improve the fault detection rate. Second, coarse-grained techniques are more effective than fine-grained ones, and using some one-dimensional subspaces is more effective than using other dimensional subspaces. Third, eight previously unknown techniques can be more effective than the technique modeled after a state-of-the-art dynamic detector.</description><identifier>ISSN: 1045-9219</identifier><identifier>EISSN: 1558-2183</identifier><identifier>DOI: 10.1109/TPDS.2015.2412544</identifier><identifier>CODEN: ITDSEO</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>abstraction ; Atomicity violations ; Benchmark testing ; Benchmarks ; Computer bugs ; Concurrency ; Concurrent computing ; Context ; Design factors ; Detectors ; Dynamics ; Empirical analysis ; Instruction sets ; multithreaded programs ; Partitioning ; Subspaces ; testing and debugging</subject><ispartof>IEEE transactions on parallel and distributed systems, 2016-03, Vol.27 (3), p.724-734</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c326t-69db71638fadb50ebaad5fe18bd86b0762330f6839221604f506fd83e10a3ce43</citedby><cites>FETCH-LOGICAL-c326t-69db71638fadb50ebaad5fe18bd86b0762330f6839221604f506fd83e10a3ce43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7059243$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7059243$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wu, Shangru</creatorcontrib><creatorcontrib>Yang, Chunbai</creatorcontrib><creatorcontrib>Jia, Changjiang</creatorcontrib><creatorcontrib>Chan, W. K.</creatorcontrib><title>ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study</title><title>IEEE transactions on parallel and distributed systems</title><addtitle>TPDS</addtitle><description>Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiting significant influence? This work presents the first controlled experiment that studies two design factors, abstraction level and subspace, in partitioning such instances through 35 resultant partition-based techniques on 10 benchmarks with known vulnerability-related bugs. The empirical analysis reveals significant findings. First, partition-based prioritization can significantly improve the fault detection rate. Second, coarse-grained techniques are more effective than fine-grained ones, and using some one-dimensional subspaces is more effective than using other dimensional subspaces. Third, eight previously unknown techniques can be more effective than the technique modeled after a state-of-the-art dynamic detector.</description><subject>abstraction</subject><subject>Atomicity violations</subject><subject>Benchmark testing</subject><subject>Benchmarks</subject><subject>Computer bugs</subject><subject>Concurrency</subject><subject>Concurrent computing</subject><subject>Context</subject><subject>Design factors</subject><subject>Detectors</subject><subject>Dynamics</subject><subject>Empirical analysis</subject><subject>Instruction sets</subject><subject>multithreaded programs</subject><subject>Partitioning</subject><subject>Subspaces</subject><subject>testing and debugging</subject><issn>1045-9219</issn><issn>1558-2183</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkMtKxDAUhosoeH0AcRNw46ZjTm5N3Q3OeAHBgVG3IW0TzdBpxiRF5u1tmcGFq3P4-f7D4cuyS8ATAFzevi1mywnBwCeEAeGMHWQnwLnMCUh6OOyY8bwkUB5npzGuMAbGMTvJmulycYemVUxB18n5Di37Km50bdBCh-TGyHWfyPqAZiaZHeMtmia_drVLW_ThfKvHOKIfl76Q7tB8vXHB1bpFy9Q32_PsyOo2mov9PMveH-Zv90_5y-vj8_30Ja8pESkXZVMVIKi0uqk4NpXWDbcGZNVIUeFCEEqxFZKWhIDAzHIsbCOpAaxpbRg9y252dzfBf_cmJrV2sTZtqzvj-6hADjVBmZQDev0PXfk-dMN3CgpZEEIwgYGCHVUHH2MwVm2CW-uwVYDV6F2N3tXoXe29D52rXccZY_74AvOSMEp_AZzvfmE</recordid><startdate>20160301</startdate><enddate>20160301</enddate><creator>Wu, Shangru</creator><creator>Yang, Chunbai</creator><creator>Jia, Changjiang</creator><creator>Chan, W. K.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20160301</creationdate><title>ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study</title><author>Wu, Shangru ; Yang, Chunbai ; Jia, Changjiang ; Chan, W. K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c326t-69db71638fadb50ebaad5fe18bd86b0762330f6839221604f506fd83e10a3ce43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>abstraction</topic><topic>Atomicity violations</topic><topic>Benchmark testing</topic><topic>Benchmarks</topic><topic>Computer bugs</topic><topic>Concurrency</topic><topic>Concurrent computing</topic><topic>Context</topic><topic>Design factors</topic><topic>Detectors</topic><topic>Dynamics</topic><topic>Empirical analysis</topic><topic>Instruction sets</topic><topic>multithreaded programs</topic><topic>Partitioning</topic><topic>Subspaces</topic><topic>testing and debugging</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wu, Shangru</creatorcontrib><creatorcontrib>Yang, Chunbai</creatorcontrib><creatorcontrib>Jia, Changjiang</creatorcontrib><creatorcontrib>Chan, W. K.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on parallel and distributed systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wu, Shangru</au><au>Yang, Chunbai</au><au>Jia, Changjiang</au><au>Chan, W. K.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study</atitle><jtitle>IEEE transactions on parallel and distributed systems</jtitle><stitle>TPDS</stitle><date>2016-03-01</date><risdate>2016</risdate><volume>27</volume><issue>3</issue><spage>724</spage><epage>734</epage><pages>724-734</pages><issn>1045-9219</issn><eissn>1558-2183</eissn><coden>ITDSEO</coden><abstract>Dynamic concurrency bug detectors predict and then examine suspicious instances of atomicity violations from executions of multithreaded programs. Only few predicted instances are real bugs. Prioritizing such instances can make the examinations cost-effective, but is there any design factor exhibiting significant influence? This work presents the first controlled experiment that studies two design factors, abstraction level and subspace, in partitioning such instances through 35 resultant partition-based techniques on 10 benchmarks with known vulnerability-related bugs. The empirical analysis reveals significant findings. First, partition-based prioritization can significantly improve the fault detection rate. Second, coarse-grained techniques are more effective than fine-grained ones, and using some one-dimensional subspaces is more effective than using other dimensional subspaces. Third, eight previously unknown techniques can be more effective than the technique modeled after a state-of-the-art dynamic detector.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPDS.2015.2412544</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1045-9219 |
ispartof | IEEE transactions on parallel and distributed systems, 2016-03, Vol.27 (3), p.724-734 |
issn | 1045-9219 1558-2183 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TPDS_2015_2412544 |
source | IEEE Electronic Library (IEL) |
subjects | abstraction Atomicity violations Benchmark testing Benchmarks Computer bugs Concurrency Concurrent computing Context Design factors Detectors Dynamics Empirical analysis Instruction sets multithreaded programs Partitioning Subspaces testing and debugging |
title | ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T20%3A33%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ASP:%20Abstraction%20Subspace%20Partitioning%20for%20Detection%20of%20Atomicity%20Violations%20with%20an%20Empirical%20Study&rft.jtitle=IEEE%20transactions%20on%20parallel%20and%20distributed%20systems&rft.au=Wu,%20Shangru&rft.date=2016-03-01&rft.volume=27&rft.issue=3&rft.spage=724&rft.epage=734&rft.pages=724-734&rft.issn=1045-9219&rft.eissn=1558-2183&rft.coden=ITDSEO&rft_id=info:doi/10.1109/TPDS.2015.2412544&rft_dat=%3Cproquest_RIE%3E4047460241%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1787222021&rft_id=info:pmid/&rft_ieee_id=7059243&rfr_iscdi=true |