Wed 6 Dec 2023 17:15 - 17:30 at Golden Gate A - Fault Diagnosis and Root Cause Analysis II Chair(s): Yun Lin

Resource leaks, which are caused by acquired resources not being released, often result in performance degradation and system crashes. Resource leak detection mainly relies on two essential components. First, identify the potential pairs of the Resource Acquisition API method and the corresponding Resource Release API method (\textit{RAR pairs} for short); then based on the RAR pairs, analyze the code to check whether the release API is not subsequently called after the acquisition API.
While the majority of existing resource leak detection techniques are concentrated on proposing more precise and more scalable code analysis, a few of them focus on building a more \textit{complete} RAR pair pool. In particular, existing techniques only consider RAR pairs that are manually predefined or mined from project-specific code corpus. Such RAR pairs have limited coverage in libraries/APIs and might miss potential RAR pairs in the code, which further limits the effectiveness of the subsequent analysis.

To build a more complete RAR pair pool for resource leak detection, in this work, we propose to represent resource-operation knowledge as \textbf{abstract resource acquisition/release operation pairs} (\textit{Abs-RAR pairs} for short), and mine such Abs-RAR pairs from a large code corpus. Based on this idea, we propose MiROK, a novel approach for \textbf{Mi}ning \textbf{R}esource \textbf{O}peration \textbf{K}nowledge, which aims at constructing a better RAR pair pool to support resource leak detection. Given a large code corpus, MiROK first mines Abs-RAR pairs with novel rule-based pair expansion and learning-based pair identification strategies, and then instantiates these Abs-RAR pairs into concrete RAR pairs. We implement MiROK and apply it to mine RAR pairs from a large code corpus of 1,454,224 Java methods and 20,000 Maven libraries. We then perform an extensive evaluation to investigate the mining effectiveness of MiROK and the practical usage of its mined RAR pairs for supporting resource leak detection. Our results show that MiROK mines 1,313 new Abs-RAR pairs and instantiates them into 10,766 RAR pairs with a high precision (i.e., 93.3%). In addition, we feed our mined RAR pairs to existing resource leak analysis approaches, and help them detect more resource leak defects in both online code examples and open-source projects. Our results indicate both the high quality and practical usage of our mined RAR pairs.

Wed 6 Dec

Displayed time zone: Pacific Time (US & Canada) change

16:00 - 18:00
Fault Diagnosis and Root Cause Analysis IIIndustry Papers / Research Papers at Golden Gate A
Chair(s): Yun Lin Shanghai Jiao Tong University
16:00
15m
Talk
DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers
Research Papers
Xianglin Yang Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yifan Zhang National University of Singapore, Linpeng Huang Shanghai Jiao Tong University, Jin Song Dong National University of Singapore, Hong Mei Peking University
Media Attached
16:15
15m
Talk
AG3: Automated Game GUI Text Glitch Detection Based on Computer Vision
Industry Papers
Xiaoyun Liang ByteDance, Jiayi Qi ByteDance, Yongqiang Gao ByteDance, Chao Peng ByteDance, China, Ping Yang Bytedance Network Technology
DOI Media Attached
16:30
15m
Talk
TransMap: Pinpointing Mistakes in Neural Code Translation
Research Papers
Bo Wang National University of Singapore, Ruishi Li National University of Singapore, Mingkai Li National University of Singapore, Prateek Saxena National University of Singapore
Media Attached
16:45
15m
Talk
Dynamic Prediction of Delays in Software Projects Using Delay Patterns and Bayesian Modeling
Research Papers
Elvan Kula Delft University of Technology, Eric Greuter ING, Arie van Deursen Delft University of Technology, Georgios Gousios Endor Labs & Delft University of Technology
Pre-print Media Attached
17:00
15m
Talk
Commit-level, Neural Vulnerability Detection and Assessment
Research Papers
Yi Li New Jersey Institute of Technology, Aashish Yadavally The University of Texas at Dallas, Jiaxing Zhang New Jersey Institute of Technology, Shaohua Wang Central University of Finance and Economics , Tien N. Nguyen University of Texas at Dallas
Media Attached
17:15
15m
Talk
[Remote] Mining Resource-Operation Knowledge to Support Resource Leak Detection
Research Papers
Chong Wang Nanyang Technological University, Yiling Lou Fudan University, Xin Peng Fudan University, Jianan Liu Fudan University, Baihan Zou Fudan University
Media Attached
17:30
15m
Talk
[Remote] Detection Is Better Than Cure: A Cloud Incidents Perspective
Industry Papers
Vaibhav Ganatra Microsoft, Anjaly Parayil Microsoft, Supriyo Ghosh Microsoft, Yu Kang Microsoft Research, Minghua Ma Microsoft Research, Chetan Bansal Microsoft Research, Suman Nath Microsoft Research, Jonathan Mace Microsoft
DOI Media Attached
17:45
7m
Talk
[Remote] Diffusion-Based Time Series Data Imputation for Cloud Failure Prediction at Microsoft 365
Industry Papers
Fangkai Yang Microsoft Research, Wenjie Yin KTH Royal Institute of Technology, Lu Wang Microsoft Research, Tianci Li Microsoft, Pu Zhao Microsoft Research, Bo Liu Beijing Institute of Technology, Paul Wang Microsoft 365, Bo Qiao Microsoft Research, Yudong Liu Microsoft Research, Mårten Björkman KTH Royal Institute of Technology, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research
DOI Media Attached