Funding provided by:
Using Clone Detection to Identify
Bugs in Concurrent Software
Kevin Jalbert, Jeremy S. Bradbury
Softw...
ICSM 2010  Timișoara, Romania
Concurrent Software
• Concurrent software has multiple threads that
can be interleaved in m...
ICSM 2010  Timișoara, Romania
Concurrent Software
• Concurrent software has multiple threads that
can be interleaved in m...
ICSM 2010  Timișoara, Romania
Concurrency Bug Detection
• Concurrency Testing
• Costly dynamic analysis tools
• Trade-off...
ICSM 2010  Timișoara, Romania 5
Concurrency Testing
with IBM ConTest
• A typical testing
process using
ConTest [EFN+02]
[...
ICSM 2010  Timișoara, Romania
”
“
Active Testing
Active testing uses a randomized thread
scheduler to verify if warnings ...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 7
What kind of predictive program analysis
can we use to i...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 8
What kind of predictive program analysis
can we use to i...
ICSM 2010  Timișoara, Romania
Clone Detection
• Ability to find similar code fragments within
source code
• Able to find ...
ICSM 2010  Timișoara, Romania
Goal
• Identify potential concurrency bugs in software
using clone detection to localize te...
ICSM 2010  Timișoara, Romania
Key Tasks
1. Identification of concurrency bugs
2. Using clone detection of existing bugs
(...
ICSM 2010  Timișoara, Romania
Identification of Concurrency Bugs
• An identified bug is abstracted to create a bug
patter...
ICSM 2010  Timișoara, Romania
Bug Patterns and Clone Detection
• Clone detection is used to identify clones of a
bug patt...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 14
Walkthrough
• Pattern Knowledge
• User knowledge
• User...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 15
Walkthrough
• Bug Pattern Creation
• Easy way to specif...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 16
Bug Pattern Creator
• General bug pattern
information
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 17
Bug Pattern Creator
• Code fragments
required for this ...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 18
Bug Pattern Creator
• Terms from code
fragments are
com...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 19
Walkthrough
• Bug Patterns
• Contains bug pattern
infor...
ICSM 2010  Timișoara, Romania
Example Data Race Bug Pattern
© 2010 K. Jalbert, J.S. Bradbury 20
ICSM 2010  Timișoara, Romania
Example Data Race Bug Pattern
© 2010 K. Jalbert, J.S. Bradbury 21
ICSM 2010  Timișoara, Romania
Example Data Race Bug Pattern
© 2010 K. Jalbert, J.S. Bradbury 22
ICSM 2010  Timișoara, Romania
Example Deadlock Bug Pattern
<bugPattern id="1">
...
<originalFragment fragmentId="0">
<ter...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 24
Walkthrough
• Bug Pattern Code
Fragments
• The actual c...
ICSM 2010  Timișoara, Romania
Example Deadlock Code Fragments
synchronized ( lock1 ){
synchronized ( lock2 ){
var1 = obj....
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 26
Walkthrough
• Source Code
• The source code of
the syst...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 27
Walkthrough
• Clone Detection
(ConQAT[JDH09])
• Designe...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 28
Walkthrough
• Cloned Fragment
Grouping
• Forms valid bu...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 29
Walkthrough
• All Possible Bug
Pattern Matches
• Possib...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 30
Walkthrough
• Finding Terms in
Cloned Fragments
• Type ...
ICSM 2010  Timișoara, Romania
Finding Terms in Cloned Fragments
synchronized ( lock1 ){
synchronized ( lock2 ){
var1 = ob...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 32
Walkthrough
• Rule Evaluation
• The rule is evaluated
t...
ICSM 2010  Timișoara, Romania
Rule Evaluation
• ( F0.lock1 == F1.lock1 && F0.lock2 == F1.lock2 )
• Original bug pattern r...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 34
Walkthrough
• Potential Bugs
• A XML list of high-
pote...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 35
Walkthrough
• Report Generation
• Process to transform
...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 36
Walkthrough
• HTML Report
• A readable report of
the po...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 37
HTML Report
• Summary statistics
• High-level view of
p...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 38
Walkthrough
• Test Cases
• A testing suite that
covers ...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 39
Walkthrough
• Test Potential Bugs
• Using a dynamic
tes...
ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 40
Walkthrough
• Real Bugs
• A report of real found
bugs i...
ICSM 2010  Timișoara, Romania
Proposed Experimental Evaluation
• In order to comprehensively evaluate our active
testing ...
ICSM 2010  Timișoara, Romania
Conclusion
• The use of clone detection and bug patterns
should increase testing effectiven...
ICSM 2010  Timișoara, Romania
Future Work
• Additional work is needed to finish the active
testing process.
• Experimenta...
Funding provided by:
Using Clone Detection to Identify
Bugs in Concurrent Software
Kevin Jalbert, Jeremy S. Bradbury
Softw...
Upcoming SlideShare
Loading in …5
×

Using Clone Detection to Identify Bugs in Concurrent Software

828 views
746 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
828
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Using Clone Detection to Identify Bugs in Concurrent Software

  1. 1. Funding provided by: Using Clone Detection to Identify Bugs in Concurrent Software Kevin Jalbert, Jeremy S. Bradbury Software Quality Research Group University of Ontario Institute of Technology Oshawa, Ontario, Canada {kevin.jalbert, jeremy.bradbury}@uoit.ca http://faculty.uoit.ca/bradbury/sqrg/
  2. 2. ICSM 2010  Timișoara, Romania Concurrent Software • Concurrent software has multiple threads that can be interleaved in many different ways • The different interleavings make concurrent software difficult to test and debug © 2010 K. Jalbert, J.S. Bradbury 2
  3. 3. ICSM 2010  Timișoara, Romania Concurrent Software • Concurrent software has multiple threads that can be interleaved in many different ways • The different interleavings make concurrent software difficult to test and debug • Data Races – two or more threads access unprotected shared data, resulting in inconsistent access to the shared data • Deadlock – the order of lock acquisition prevents other threads from acquiring the needed lock © 2010 K. Jalbert, J.S. Bradbury 3
  4. 4. ICSM 2010  Timișoara, Romania Concurrency Bug Detection • Concurrency Testing • Costly dynamic analysis tools • Trade-off between effectiveness and efficiency © 2010 K. Jalbert, J.S. Bradbury 4 Example Testing Tools: IBM ConTest Microsoft CHESS NASA Java Pathfinder …
  5. 5. ICSM 2010  Timișoara, Romania 5 Concurrency Testing with IBM ConTest • A typical testing process using ConTest [EFN+02] [EFN+02] O. Edelstein, E. Farchi, Y. Nir, G.Ratsaby, and S. Ur. Multithreaded java program test generation. IBM Systems Journal, 41(1):111– 125, 2002. Run Test Fix Bug Finish Check Results Correct Problem Check Coverage Target Not Reached 1. Rerun Test with heuristically generated interleaving 2. Record interleaving 3. Update Coverage Rerun test using replay Reached © 2010 K. Jalbert, J.S. Bradbury
  6. 6. ICSM 2010  Timișoara, Romania ” “ Active Testing Active testing uses a randomized thread scheduler to verify if warnings reported by a predictive program analysis are real bugs. - P. Joshi, M. Naik, C.-S. Park, and K. Sen [JNPS09] © 2010 K. Jalbert, J.S. Bradbury [JNPS09] P. Joshi, M. Naik, C.-S. Park, and K. Sen, “CalFuzzer:an extensible active testing framework for concurrent programs,” in Proc. of the 21st International Conference on Computer Aided Verification (CAV’09), 2009, pp. 675–681. Example: CalFuzzer 6
  7. 7. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 7 What kind of predictive program analysis can we use to improve testing with ConTest?
  8. 8. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 8 What kind of predictive program analysis can we use to improve testing with ConTest? Clone Detection
  9. 9. ICSM 2010  Timișoara, Romania Clone Detection • Ability to find similar code fragments within source code • Able to find Type I-III clones I. Exact II. Near-exact III. Gapped © 2010 K. Jalbert, J.S. Bradbury 9
  10. 10. ICSM 2010  Timișoara, Romania Goal • Identify potential concurrency bugs in software using clone detection to localize testing effort © 2010 K. Jalbert, J.S. Bradbury 10
  11. 11. ICSM 2010  Timișoara, Romania Key Tasks 1. Identification of concurrency bugs 2. Using clone detection of existing bugs (and bug patterns) 3. Localize testing efforts within the thread interleaving space © 2010 K. Jalbert, J.S. Bradbury 11
  12. 12. ICSM 2010  Timișoara, Romania Identification of Concurrency Bugs • An identified bug is abstracted to create a bug pattern • Concurrency bug patterns require: • Code fragments involved in the bug • Interaction between the code fragments that causes the bug • Specifically, we are interested in the interaction between objects in the code fragments © 2010 K. Jalbert, J.S. Bradbury 12
  13. 13. ICSM 2010  Timișoara, Romania Bug Patterns and Clone Detection • Clone detection is used to identify clones of a bug pattern’s code fragments • The results of clone detection is a set of clones for each code fragment. • We classify a set of clones that match a bug pattern’s code fragments as either high- or low- potential for being an actual concurrency bug • (high-potential bug matches also satisfy rules that define the interactions between the code fragments of the bug pattern) © 2010 K. Jalbert, J.S. Bradbury 13
  14. 14. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 14 Walkthrough • Pattern Knowledge • User knowledge • User experience Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  15. 15. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 15 Walkthrough • Bug Pattern Creation • Easy way to specify and maintain bug patterns using the Bug Pattern Creator Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  16. 16. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 16 Bug Pattern Creator • General bug pattern information
  17. 17. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 17 Bug Pattern Creator • Code fragments required for this bug pattern • Ability to highlight terms (objects that interact)
  18. 18. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 18 Bug Pattern Creator • Terms from code fragments are combined into a rule • Defines the interactions between code fragments • Uses Boolean operators and properties
  19. 19. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 19 Walkthrough • Bug Patterns • Contains bug pattern information that is represented in XML Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  20. 20. ICSM 2010  Timișoara, Romania Example Data Race Bug Pattern © 2010 K. Jalbert, J.S. Bradbury 20
  21. 21. ICSM 2010  Timișoara, Romania Example Data Race Bug Pattern © 2010 K. Jalbert, J.S. Bradbury 21
  22. 22. ICSM 2010  Timișoara, Romania Example Data Race Bug Pattern © 2010 K. Jalbert, J.S. Bradbury 22
  23. 23. ICSM 2010  Timișoara, Romania Example Deadlock Bug Pattern <bugPattern id="1"> ... <originalFragment fragmentId="0"> <term id="F0.lock1"/> <term id="F0.lock2"/> </originalFragment> <originalFragment fragmentId="1"> <term id="F1.lock2"/> <term id="F1.lock1"/> </originalFragment> <rule>(F0.lock1 == F1.lock1 && F0.lock2 == F1.lock2)</rule> </bugPattern> © 2010 K. Jalbert, J.S. Bradbury 23
  24. 24. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 24 Walkthrough • Bug Pattern Code Fragments • The actual code fragments that composes the bug pattern Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  25. 25. ICSM 2010  Timișoara, Romania Example Deadlock Code Fragments synchronized ( lock1 ){ synchronized ( lock2 ){ var1 = obj.read ( ) ; } } synchronized ( lock2 ){ synchronized ( lock1){ var1 = obj.read ( ) ; } } © 2010 K. Jalbert, J.S. Bradbury 25
  26. 26. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 26 Walkthrough • Source Code • The source code of the system under observation Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  27. 27. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 27 Walkthrough • Clone Detection (ConQAT[JDH09]) • Designed for research • Detects type I-III clones between source code and bug pattern code fragments Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend [JDH09] E. Juergens, F. Deissenboeck, and B. Hummel, “CloneDetective – a workbench for clone detection research,” in Proc. of the 31st International Conference on Software Engineering (ICSE’09), 2009, pp. 603–606.
  28. 28. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 28 Walkthrough • Cloned Fragment Grouping • Forms valid bug pattern combinations using found clones of bug patterns Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  29. 29. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 29 Walkthrough • All Possible Bug Pattern Matches • Possible concurrency bugs Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  30. 30. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 30 Walkthrough • Finding Terms in Cloned Fragments • Type II and III clone’s terms must be mapped to the appropriate terms Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  31. 31. ICSM 2010  Timișoara, Romania Finding Terms in Cloned Fragments synchronized ( lock1 ){ synchronized ( lock2 ){ var1 = obj.read ( ) ; } } synchronized ( lockB ){ synchronized ( lockA ){ a.add(a); newVar7 = a.read ( ) ; } } © 2010 K. Jalbert, J.S. Bradbury 31 Original Bug Pattern Code Fragment Source Code Clone Code Fragment
  32. 32. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 32 Walkthrough • Rule Evaluation • The rule is evaluated to categories the possible bugs into high- and low-potential bugs Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  33. 33. ICSM 2010  Timișoara, Romania Rule Evaluation • ( F0.lock1 == F1.lock1 && F0.lock2 == F1.lock2 ) • Original bug pattern rule 1 • ( F0.lockB == F1.lockB && F0.lockA == F1.lockA ) • Replace terms with source code clone match terms 2 • ( true == true ) • Evaluate 3 © 2010 K. Jalbert, J.S. Bradbury 33
  34. 34. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 34 Walkthrough • Potential Bugs • A XML list of high- potential bugs, along with source code location Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  35. 35. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 35 Walkthrough • Report Generation • Process to transform XML list of potential bugs into an HTML report Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  36. 36. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 36 Walkthrough • HTML Report • A readable report of the potential bugs Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  37. 37. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 37 HTML Report • Summary statistics • High-level view of potential bugs
  38. 38. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 38 Walkthrough • Test Cases • A testing suite that covers the area of the concurrency bug Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  39. 39. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 39 Walkthrough • Test Potential Bugs • Using a dynamic testing technique like ConTest • Explore thread interleaving space to verify potential bugs Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  40. 40. ICSM 2010  Timișoara, Romania © 2010 K. Jalbert, J.S. Bradbury 40 Walkthrough • Real Bugs • A report of real found bugs is formulated Clone Detection (ConQAT) Source Code Cloned Fragment Grouping Finding Terms in Cloned Fragments Rule Evaluation Report Generation All Possible Bug Pattern Matches Potential Bugs HTML Report Pattern Knowledge Bug Pattern Creation Bug Patterns Bug Pattern Code Fragments Test Potential Bugs Test Cases Real BugsUnder Development Data File User Input Process Legend
  41. 41. ICSM 2010  Timișoara, Romania Proposed Experimental Evaluation • In order to comprehensively evaluate our active testing research we need to satisfy the following three goals: • Ensure that our specification notation for concurrency bug patterns is expressive enough to handle many different types of concurrency bugs. • Assess our bug detection process and the use of clone detection with finding concurrency bugs. • Evaluate the benefits of using the high-potential bugs to localize testing effort. © 2010 K. Jalbert, J.S. Bradbury 41
  42. 42. ICSM 2010  Timișoara, Romania Conclusion • The use of clone detection and bug patterns should increase testing effectiveness by reducing the search space, even with the possibility of false positives. © 2010 K. Jalbert, J.S. Bradbury 42
  43. 43. ICSM 2010  Timișoara, Romania Future Work • Additional work is needed to finish the active testing process. • Experimentation is needed to assess the benefits of our tool when compared to existing active testing tools such as CalFuzzer. © 2010 K. Jalbert, J.S. Bradbury 43
  44. 44. Funding provided by: Using Clone Detection to Identify Bugs in Concurrent Software Kevin Jalbert, Jeremy S. Bradbury Software Quality Research Group University of Ontario Institute of Technology Oshawa, Ontario, Canada {kevin.jalbert, jeremy.bradbury}@uoit.ca http://faculty.uoit.ca/bradbury/sqrg/

×