27
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Software Library Usage Pattern Extraction Using Asoftware Model Checker

, &
Pages 247-259 | Published online: 11 Jul 2015

References

  • E.M. Clarke, O. Grumberg & D.A. Peled, Model checking (Cambridge, MA: MIT Press, 1999).
  • T. Ball & S.K. Rajamani, The SLAM project: debugging system software via static analysis, in POPL ’02: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (New York, NY: ACM Press, 2002), 1–3.
  • G.J. Holzmann, The model checker SPIN, IEEE Transactions on Software Engineering, 23(5), 1997, 279–295.
  • D. Beyer, T.A. Henzinger, R. Jhala, & R. Majumdar, The software model checker BLAST: applications to software engineering, International Journal on Software Tools for Technology Transfer, 9(5), 2007, 505–525.
  • W. Visser, K. Havelund, G. Brat, S. Park, & F. Lerda, Model checking programs, Automated Software Engineering Journal, 10(2), 2003, 203–232.
  • J.C. Corbett, M.B. Dwyer, J. Hatcliff, S. Laubach, C.S. Pasareanu, Robby, & H. Zheng, Bandera: extracting finitestate models from Java source code, in ICSE ’00: Proceedings of the 22nd International Conference on Software Engineering (NY USA: ACM Press, 2000), 439–448.
  • Robby, M.B. Dwyer, & J. Hatcliff, Bogor: an extensible and highly-modular software model checking framework, in ESEC/FSE 2003: Proceedings of the 4th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering, New York, NY, (2003), 267–276.
  • G.J. Holzmann, The logic of bugs, in SIGSOFT ’02/FSE-10: Proceedings of the 10th ACM SIGSOFT Symposium on Foundations of Software Engineering (NY, USA: ACM Press, 2002), 81–87.
  • M.B. Dwyer, G.S. Avrunin, & J.C. Corbett, Patterns in property specifications for finite-state verification, in ICSE ’99: Proceedings of the 21st International Conference on Software Engineering (Los Alamitos, CA, USA: IEEE Computer Society Press, 1999), 411–420.
  • D. Beyer, A.J. Chlipala, T.A. Henzinger, R. Jhala, & R. Majumdar, The BLAST query language for software verification, in SAS ’04: Proceedings of the 11th International Static Analysis Symposium (Berlin, Heidelber: Springer-Verlag, 2004), 2–18.
  • C. Liu, E. Ye, & D.J. Richardson, LtRules: an automated software library usage rule extraction tool. In ICSE ’06: Proceedings of the 28th International Conference on Software Engineering, Research Demonstrations, New York, NY, (2006).
  • C. Liu, E. Ye, & D.J. Richardson, Software library usage pattern extraction using a software model checker, in ASE ’06: Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering, Washington, DC, (2006), 301–304.
  • T. Ball, V. Levin, & F. Xie, Automatic creation of environment models via training, in TACAS ’04: Proceedings of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (2004), 93–107.
  • M.D. Ernst, J. Cockrell, W.G. Griswold, & D. Notkin, Dynamically discovering likely program invariants to support program evolution, IEEE Transactions on Software Engineering, 27(2) February 2001, 1–25.
  • S. Hangal & M.S. Lam, Tracking down software bugs using automatic anomaly detection, in ICSE ’02: Proceedings of the 24th International Conference on Software Engineering (NY, USA: ACM Press, 2002), 291–301.
  • R. Alur, P. Cerny, P. Madhusudan, & W. Nam, Synthesis of interface specifications for Java classes, in POPL ’05: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (ACM Press, 2005), 98–109.
  • G. Ammons, R. Bodik, & J.R. Larus, Mining specifications, in POPL ’02: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (New York, NY: ACM Press, 2002), 4–16.
  • D. Engler, D.Y. Chen, S. Hallem, A. Chou, & B. Chelf, Bugs as deviant behavior: a general approach to inferring errors in systems code, in SOSP ’01: Proceedings of the 18th ACM Symposium on Operating Systems Principles (New York, NY: ACM Press, 2001), 57–72.
  • W. Weimer & G. Necula, Mining temporal specifications for error detection, in TACAS ’05: Proceedings of the 11th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (2005).
  • J. Whaley, M.C. Martin, & M.S. Lam, Automatic extraction of object-oriented component interfaces, in ISSTA ’02: Proceedings of the 2002 ACM SIGSOFT International Symposium on Software Testing and Analysis (ACM Press, 2002), 218–228.
  • J. Yang, D. Evans, D. Bhardwaj, T. Bhat, & M. Das, Perracotta: mining temporal API rules from imperfect traces, in ICSE ’06: Proceedings of the 28th International Conference on Software Engineering, New York, NY, (2006).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.