A delta-oriented approach to support the safe reuse of black-box code rewriters

被引:1
|
作者
Benni, Benjamin [1 ]
Mosser, Sebastien [2 ]
Moha, Naouel [2 ]
Riveill, Michel [1 ]
机构
[1] Univ Cote Azur, SPARKS, CNRS, Comp Sci,I3S, Nice, France
[2] Univ Quebec Montreal, Montreal, PQ, Canada
关键词
code rewriting; conflict detection; rule composition; software reuse; GRAPH TRANSFORMATION; SOFTWARE;
D O I
10.1002/smr.2208
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Large-scale corrective and perfective maintenance is often automated thanks to rewriting rules using tools such as Python2to3, Spoon, or Coccinelle. Such tools consider these rules as black-boxes and compose multiple rules by chaining them: giving the output of a given rewriting rule as input to the next one. It is up to the developer to identify the right order (if it exists) among all the different rules to yield the right program. In this paper, we define a formal model compatible with the black-box assumption that reifies the modifications (Delta s) made by each rule. Leveraging these Delta s, we propose a way to safely compose multiple rules when applied to the same program by (a) ensuring the isolated application of the different rules and (b) identifying unexpected behaviors that were silently ignored before. We assess this approach on two large-scale case studies: (a) identifying conflicts in the Linux source-code automated maintenance and (b) fixing energy antipatterns existing in Android applications available on GitHub.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A Delta-Oriented Approach to Support the Safe Reuse of Black-Box Code Rewriters
    Benni, Benjamin
    Mosser, Sebastien
    Moha, Naouel
    Riveill, Michel
    NEW OPPORTUNITIES FOR SOFTWARE REUSE, 2018, 10826 : 164 - 180
  • [2] Safe Inputs Approximation for Black-Box Systems
    Xue, Bai
    Liu, Yang
    Ma, Lei
    Zhang, Xiyue
    Sun, Meng
    Xie, Xiaofei
    2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2019), 2019, : 180 - 189
  • [3] Advancing Black-Box Reuse in a Multimedia Application Framework
    Wagner, Bernhard
    ERCIM NEWS, 2005, (62): : 54 - 55
  • [4] Log Barriers for Safe Black-box Optimization with Application to Safe Reinforcement Learning
    Usmanova, Ilnura
    As, Yarden
    Kamgarpour, Maryam
    Krause, Andreas
    JOURNAL OF MACHINE LEARNING RESEARCH, 2024, 25
  • [5] Sablas: Learning Safe Control for Black-Box Dynamical Systems
    Qin, Zengyi
    Sun, Dawei
    Fan, Chuchu
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2022, 7 (02) : 1928 - 1935
  • [6] Safe Reinforcement Learning Using Black-Box Reachability Analysis
    Selim, Mahmoud
    Alanwar, Amr
    Kousik, Shreyas
    Gao, Grace
    Pavone, Marco
    Johansson, Karl H.
    arXiv, 2022,
  • [7] A Black-Box Approach for Detecting the Failure Traces
    Meng, You
    Yu, Lang
    Luan, Zhongzhi
    Qian, Depei
    Xie, Ming
    Du, Zhigao
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 252 - 259
  • [8] Safe Reinforcement Learning Using Black-Box Reachability Analysis
    Selim, Mahmoud
    Alanwar, Amr
    Kousik, Shreyas
    Gao, Grace
    Pavone, Marco
    Johansson, Karl H.
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2022, 7 (04) : 10665 - 10672
  • [9] A Black-Box Approach to Latency and Throughput Analysis
    Brahneborg, Daniel
    Afzal, Wasif
    Causevic, Adnan
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 603 - 604
  • [10] Verification of GUI Applications: A Black-Box Approach
    Arlt, Stephan
    Ermis, Evren
    Feo-Arenis, Sergio
    Podelski, Andreas
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: TECHNOLOGIES FOR MASTERING CHANGE, PT I, 2014, 8802 : 236 - 252