[Remote] Mining Resource-Operation Knowledge to Support Resource Leak Detection
Resource leaks, which are caused by acquired resources not being released, often result in performance degradation and system crashes. Resource leak detection mainly relies on two essential components. First, identify the potential pairs of the Resource Acquisition API method and the corresponding Resource Release API method (\textit{RAR pairs} for short); then based on the RAR pairs, analyze the code to check whether the release API is not subsequently called after the acquisition API.
While the majority of existing resource leak detection techniques are concentrated on proposing more precise and more scalable code analysis, a few of them focus on building a more \textit{complete} RAR pair pool. In particular, existing techniques only consider RAR pairs that are manually predefined or mined from project-specific code corpus. Such RAR pairs have limited coverage in libraries/APIs and might miss potential RAR pairs in the code, which further limits the effectiveness of the subsequent analysis.
To build a more complete RAR pair pool for resource leak detection, in this work, we propose to represent resource-operation knowledge as \textbf{abstract resource acquisition/release operation pairs} (\textit{Abs-RAR pairs} for short), and mine such Abs-RAR pairs from a large code corpus. Based on this idea, we propose MiROK, a novel approach for \textbf{Mi}ning \textbf{R}esource \textbf{O}peration \textbf{K}nowledge, which aims at constructing a better RAR pair pool to support resource leak detection. Given a large code corpus, MiROK first mines Abs-RAR pairs with novel rule-based pair expansion and learning-based pair identification strategies, and then instantiates these Abs-RAR pairs into concrete RAR pairs. We implement MiROK and apply it to mine RAR pairs from a large code corpus of 1,454,224 Java methods and 20,000 Maven libraries. We then perform an extensive evaluation to investigate the mining effectiveness of MiROK and the practical usage of its mined RAR pairs for supporting resource leak detection. Our results show that MiROK mines 1,313 new Abs-RAR pairs and instantiates them into 10,766 RAR pairs with a high precision (i.e., 93.3%). In addition, we feed our mined RAR pairs to existing resource leak analysis approaches, and help them detect more resource leak defects in both online code examples and open-source projects. Our results indicate both the high quality and practical usage of our mined RAR pairs.
Wed 6 DecDisplayed time zone: Pacific Time (US & Canada) change
16:00 - 18:00 | Fault Diagnosis and Root Cause Analysis IIIndustry Papers / Research Papers at Golden Gate A Chair(s): Yun Lin Shanghai Jiao Tong University | ||
16:00 15mTalk | DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers Research Papers Xianglin Yang Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yifan Zhang National University of Singapore, Linpeng Huang Shanghai Jiao Tong University, Jin Song Dong National University of Singapore, Hong Mei Peking University Media Attached | ||
16:15 15mTalk | AG3: Automated Game GUI Text Glitch Detection Based on Computer Vision Industry Papers Xiaoyun Liang ByteDance, Jiayi Qi ByteDance, Yongqiang Gao ByteDance, Chao Peng ByteDance, China, Ping Yang Bytedance Network Technology DOI Media Attached | ||
16:30 15mTalk | TransMap: Pinpointing Mistakes in Neural Code Translation Research Papers Bo Wang National University of Singapore, Ruishi Li National University of Singapore, Mingkai Li National University of Singapore, Prateek Saxena National University of Singapore Media Attached | ||
16:45 15mTalk | Dynamic Prediction of Delays in Software Projects Using Delay Patterns and Bayesian Modeling Research Papers Elvan Kula Delft University of Technology, Eric Greuter ING, Arie van Deursen Delft University of Technology, Georgios Gousios Endor Labs & Delft University of Technology Pre-print Media Attached | ||
17:00 15mTalk | Commit-level, Neural Vulnerability Detection and Assessment Research Papers Yi Li New Jersey Institute of Technology, Aashish Yadavally The University of Texas at Dallas, Jiaxing Zhang New Jersey Institute of Technology, Shaohua Wang Central University of Finance and Economics , Tien N. Nguyen University of Texas at Dallas Media Attached | ||
17:15 15mTalk | [Remote] Mining Resource-Operation Knowledge to Support Resource Leak Detection Research Papers Chong Wang Nanyang Technological University, Yiling Lou Fudan University, Xin Peng Fudan University, Jianan Liu Fudan University, Baihan Zou Fudan University Media Attached | ||
17:30 15mTalk | [Remote] Detection Is Better Than Cure: A Cloud Incidents Perspective Industry Papers Vaibhav Ganatra Microsoft, Anjaly Parayil Microsoft, Supriyo Ghosh Microsoft, Yu Kang Microsoft Research, Minghua Ma Microsoft Research, Chetan Bansal Microsoft Research, Suman Nath Microsoft Research, Jonathan Mace Microsoft DOI Media Attached | ||
17:45 7mTalk | [Remote] Diffusion-Based Time Series Data Imputation for Cloud Failure Prediction at Microsoft 365 Industry Papers Fangkai Yang Microsoft Research, Wenjie Yin KTH Royal Institute of Technology, Lu Wang Microsoft Research, Tianci Li Microsoft, Pu Zhao Microsoft Research, Bo Liu Beijing Institute of Technology, Paul Wang Microsoft 365, Bo Qiao Microsoft Research, Yudong Liu Microsoft Research, Mårten Björkman KTH Royal Institute of Technology, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research DOI Media Attached |