메뉴 건너뛰기




Volumn 6183 LNCS, Issue , 2010, Pages 26-51

Debugging model-transformation failures using dynamic tainting

Author keywords

dynamic tainting; fault localization; input model faults; Model driven engineering

Indexed keywords

EMPIRICAL STUDIES; FAULT LOCALIZATION; HIGH DEGREE OF ACCURACY; INPUT MODELS; MODEL ELEMENTS; MODEL-DRIVEN ENGINEERING; ON DYNAMICS; SEARCH SPACES; SOFTWARE APPLICATIONS;

EID: 77955014521     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14107-2_3     Document Type: Conference Paper
Times cited : (13)

References (23)
  • 4
    • 0003353852 scopus 로고
    • Design maintenance systems
    • Baxter, I.D.: Design maintenance systems. ACM Commun. 35(4), 73-89 (1992)
    • (1992) ACM Commun. , vol.35 , Issue.4 , pp. 73-89
    • Baxter, I.D.1
  • 6
    • 85008249099 scopus 로고    scopus 로고
    • Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting
    • Clause, J., Orso, A.: Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting. In: Proc. of the Intl. Symp. on Softw. Testing and Analysis, pp. 249-259 (2009)
    • (2009) Proc. of the Intl. Symp. on Softw. Testing and Analysis , pp. 249-259
    • Clause, J.1    Orso, A.2
  • 14
    • 70350655967 scopus 로고    scopus 로고
    • Establishing correspondences between models with the epsilon comparison language
    • Kolovos, D.: Establishing correspondences between models with the epsilon comparison language. In: Model Driven Architecture-Foundations and Applications, pp. 146-157
    • Model Driven Architecture-Foundations and Applications , pp. 146-157
    • Kolovos, D.1
  • 17
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proc. of the Network and Distributed System Security Symp. (2005)
    • (2005) Proc. of the Network and Distributed System Security Symp.
    • Newsome, J.1    Song, D.X.2
  • 18
    • 18744365284 scopus 로고    scopus 로고
    • Generating test cases for web services using data perturbation
    • Offutt, J., Xu, W.: Generating test cases for web services using data perturbation. Softw. Eng. Notes 29(5), 1-10 (2004)
    • (2004) Softw. Eng. Notes , vol.29 , Issue.5 , pp. 1-10
    • Offutt, J.1    Xu, W.2
  • 20
    • 33344465743 scopus 로고    scopus 로고
    • Model-driven engineering
    • Schmidt, D.C.: Model-driven engineering. IEEE Computer 39(2), 25-31 (2006)
    • (2006) IEEE Computer , vol.39 , Issue.2 , pp. 25-31
    • Schmidt, D.C.1
  • 21
  • 22
    • 67649986887 scopus 로고    scopus 로고
    • Transformation language integration based on profiles and higher order transformations
    • Gaševič, D., Lámmel, R., Van Wyk, E. (eds.) SLE 2008. Springer, Heidelberg
    • Van Gorp, P., Keller, A., Janssens, D.: Transformation language integration based on profiles and higher order transformations. In: Gaševič, D., Lámmel, R., Van Wyk, E. (eds.) SLE 2008. LNCS, vol.5452, pp. 208-226. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5452 , pp. 208-226
    • Van Gorp, P.1    Keller, A.2    Janssens, D.3
  • 23
    • 0036472476 scopus 로고    scopus 로고
    • Simplifying and isolating failure-inducing input
    • Zeller, A., Hildebrandt, R.: Simplifying and isolating failure-inducing input. IEEE Trans. Software Eng. 28(2), 183-200 (2002)
    • (2002) IEEE Trans. Software Eng. , vol.28 , Issue.2 , pp. 183-200
    • Zeller, A.1    Hildebrandt, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.