Fri 19 Jul 2024 14:18 - 14:36 at Mandacaru - Program Analysis and Performance 3 Chair(s): Shaukat Ali

Control-based self-adaptive systems (control-SAS) are susceptible to deviations from their pre-identified nominal models. If this model deviation exceeds a threshold, the optimal performance and theoretical guarantees of the control-SAS can be compromised. Existing approaches detect these deviations by locating the mismatch between the control signal of the managing system and the response output of the managed system. However, \emph{vague observations} may mask a potential mismatch where the explicit system behavior does not reflect the implicit variation of the nominal model. In this paper, we propose the \underline{A}ctive \underline{M}onitoring \underline{M}echanism (\tool for short) as a solution to this issue. The basic intuition of \tool is to stimulate the control-SAS with an active control signal when vague observations might mask model deviations. To determine the appropriate time for triggering the active signals, \tool proposes a stochastic framework to quantify the relationship between the implicit variation of a control-SAS and its explicit observation. Based on this framework, \tool’s monitor and remediator enhance model deviation detection by generating active control signals of well-designed timing and intensity. Results from empirical evaluations on three representative systems demonstrate \tool’s effectiveness ($33.0%$ shorter detection delay, $18.3%$ lower FN rate, $16.7%$ lower FP rate) and usefulness ($19.3%$ lower abnormal rates and $88.2%$ higher utility).

Fri 19 Jul

Displayed time zone: Brasilia, Distrito Federal, Brazil change

14:00 - 15:30
Program Analysis and Performance 3Research Papers at Mandacaru
Chair(s): Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University
14:00
18m
Talk
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-specific Code Embeddings
Research Papers
Zirui Song The Chinese University of Hong Kong, Jiongyi Chen National University of Defense Technology, Kehuan Zhang The Chinese University of Hong Kong
14:18
18m
Talk
Active Monitoring Mechanism for Control-based Self-Adaptive Systems
Research Papers
Yi Qin State Key Laboratory for Novel Software Technology, Nanjing University, Yanxiang Tong State Key Laboratory for Novel Software Technology, Nanjing University, Yifei Xu State Key Laboratory for Novel Software Technology, Nanjing University, Chun Cao State Key Laboratory for Novel Software Technology, Nanjing University, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University
14:36
18m
Talk
Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs
Research Papers
Haoran Liu National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Yan Lei Chongqing University, Yue Yu National University of Defense Technology, Yu Jiang Tsinghua university, Xiaoguang Mao National University of Defense Technology, Liao Xiangke National University of Defense Technology
14:54
18m
Talk
DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization
Research Papers
Chengpeng Wang The Hong Kong University of Science and Technology, Jipeng Zhang The Hong Kong University of Science and Technology, Rongxin Wu School of Informatics, Xiamen University, Charles Zhang The Hong Kong University of Science and Technology
15:12
18m
Talk
Decomposing Software Verification Using Distributed Summary Synthesis
Research Papers
Dirk Beyer LMU Munich, Matthias Kettl LMU Munich, Thomas Lemberger LMU Munich
DOI Media Attached File Attached