ORBS and the limits of static slicing

Cited 136 time in webofscience Cited 0 time in scopus
  • Hit : 297
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorBinkley, Davidko
dc.contributor.authorGold, Nicolasko
dc.contributor.authorHarman, Markko
dc.contributor.authorIslam, Syedko
dc.contributor.authorKrinke, Jensko
dc.contributor.authorYoo, Shinko
dc.date.accessioned2017-06-20T01:59:31Z-
dc.date.available2017-06-20T01:59:31Z-
dc.date.created2017-06-19-
dc.date.created2017-06-19-
dc.date.created2017-06-19-
dc.date.created2017-06-19-
dc.date.issued2015-09-27-
dc.identifier.citationIEEE 15th International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, pp.1 - 10-
dc.identifier.urihttp://hdl.handle.net/10203/224155-
dc.description.abstractObservation-based slicing is a recently-introduced, language-independent slicing technique based on the dependencies observable from program behaviour. Due to the well-known limits of dynamic analysis, we may only compute an under-approximation of the true observation-based slice. However, because the observation-based slice captures all possible dependence that can be observed, even such approximations can yield insight into the limitations of static slicing. For example, a static slice, S, that is strictly smaller than the corresponding observation based slice is potentially unsafe. We present the results of three sets of experiments on 12 different programs, including benchmarks and larger programs, which investigate the relationship between static and observation-based slicing. We show that, in extreme cases, observation-based slices can find the true minimal static slice, where static techniques cannot. For more typical cases, our results illustrate the potential for observation-based slicing to highlight limitations in static slicers. Finally, we report on the sensitivity of observation-based slicing to test quality.-
dc.languageEnglish-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleORBS and the limits of static slicing-
dc.typeConference-
dc.identifier.wosid000377087300001-
dc.identifier.scopusid2-s2.0-84963612786-
dc.type.rimsCONF-
dc.citation.beginningpage1-
dc.citation.endingpage10-
dc.citation.publicationnameIEEE 15th International Working Conference on Source Code Analysis and Manipulation, SCAM 2015-
dc.identifier.conferencecountryGE-
dc.identifier.conferencelocationUniversity of Bremen-
dc.identifier.doi10.1109/SCAM.2015.7335396-
dc.contributor.localauthorYoo, Shin-
dc.contributor.nonIdAuthorBinkley, David-
dc.contributor.nonIdAuthorGold, Nicolas-
dc.contributor.nonIdAuthorHarman, Mark-
dc.contributor.nonIdAuthorIslam, Syed-
dc.contributor.nonIdAuthorKrinke, Jens-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 136 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0