A delta-oriented approach to support the safe reuse of black-box code rewriters

被引:1
|
作者
Benni, Benjamin [1 ]
Mosser, Sebastien [2 ]
Moha, Naouel [2 ]
Riveill, Michel [1 ]
机构
[1] Univ Cote Azur, SPARKS, CNRS, Comp Sci,I3S, Nice, France
[2] Univ Quebec Montreal, Montreal, PQ, Canada
关键词
code rewriting; conflict detection; rule composition; software reuse; GRAPH TRANSFORMATION; SOFTWARE;
D O I
10.1002/smr.2208
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Large-scale corrective and perfective maintenance is often automated thanks to rewriting rules using tools such as Python2to3, Spoon, or Coccinelle. Such tools consider these rules as black-boxes and compose multiple rules by chaining them: giving the output of a given rewriting rule as input to the next one. It is up to the developer to identify the right order (if it exists) among all the different rules to yield the right program. In this paper, we define a formal model compatible with the black-box assumption that reifies the modifications (Delta s) made by each rule. Leveraging these Delta s, we propose a way to safely compose multiple rules when applied to the same program by (a) ensuring the isolated application of the different rules and (b) identifying unexpected behaviors that were silently ignored before. We assess this approach on two large-scale case studies: (a) identifying conflicts in the Linux source-code automated maintenance and (b) fixing energy antipatterns existing in Android applications available on GitHub.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Black-Box Reconstruction Attacks on LLMs: A Preliminary Study in Code Summarization
    Russodivito, Marco
    Spina, Angelica
    Scalabrino, Simone
    Oliveto, Rocco
    QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, QUATIC 2024, 2024, 2178 : 391 - 398
  • [22] A Practical Black-Box Attack on Source Code Authorship Identification Classifiers
    Liu, Qianjun
    Ji, Shouling
    Liu, Changchang
    Wu, Chunming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3620 - 3633
  • [23] AUTOMOTIVE THERMAL COMFORT CONTROL - A BLACK-BOX APPROACH
    Kranz, J.
    van Niekerk, T. I.
    Holdack-Janssen, H. F. G.
    Gruhler, G.
    SAIEE AFRICA RESEARCH JOURNAL, 2012, 103 (02): : 66 - 76
  • [24] A black-box approach to performance analysis of grid middleware
    Alexius, Per
    Elahi, B. Maryam
    Hedman, Fredrik
    Mucci, Phillip
    Netzer, Gilbert
    Shah, Zeeshan Ali
    EURO-PAR 2007 WORKSHOPS: PARALLEL PROCESSING, 2008, 4854 : 62 - 71
  • [25] Alternative Ruleset Discovery to Support Black-Box Model Predictions*
    Sasaki, Yoichi
    Okajima, Yuzuru
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (06) : 1130 - 1141
  • [26] FairLens: Auditing black-box clinical decision support systems
    Panigutti, Cecilia
    Perotti, Alan
    Panisson, Andre
    Bajardi, Paolo
    Pedreschi, Dino
    INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (05)
  • [27] An Efficient Black-Box Support of Advanced Coverage Criteria for Klee
    Berthier, Nicolas
    De Oliveira, Steven
    Kosmatov, Nikolai
    Longuet, Delphine
    Soulat, Romain
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1706 - 1715
  • [28] A New Approach to Black-Box Concurrent Secure Computation
    Garg, Sanjam
    Kiyoshima, Susumu
    Pandey, Omkant
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 566 - 599
  • [29] An evolutionary approach to black-box optimization on matrix manifolds?
    He, Xiaoyu
    Zhou, Yuren
    Chen, Zefeng
    Jiang, Siyu
    APPLIED SOFT COMPUTING, 2020, 97 (97)
  • [30] NARX approach to black-box modeling of circuit elements
    Maio, IA
    Stievano, IS
    Canavero, FG
    ISCAS '98 - PROCEEDINGS OF THE 1998 INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-6, 1998, : B411 - B414