A Program Synthesis Approach for Adding Architectural Tactics to An Existing Code Base

被引:0
|
作者
Shokri, Ali [1 ]
机构
[1] Rochester Inst Technol, Dept Software Engn, Rochester, NY 14623 USA
基金
美国国家科学基金会;
关键词
Program Synthesis; Architectural Tactic; Framework Specification Model; API Usage Model;
D O I
10.1109/ASE51524.2021.9678705
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Automatically constructing a program based on given specifications has been studied for decades. Despite the advances in the field of Program Synthesis, the current approaches suffer from a twofold issue: highly relying on the programmer for providing the specifications, and leaving the task of incorporating the synthesized code in an existing code base to program developers. Due to its program-wide effects, synthesizing an architectural tactic and reusing it in a program is even more challenging. Architectural tactics need to be synthesized based on the context of different locations of the program, broken down to smaller pieces, and added to corresponding locations in the code. Moreover, each piece needs to establish correct data- and control-dependencies to its surrounding environment as well as to the other synthesized pieces. This is an error-prone and challenging task, especially for novice program developers. In this paper, we introduce a novel program synthesis approach that synthesizes and adds architectural tactics to an existing code base.
引用
收藏
页码:1388 / 1390
页数:3
相关论文
共 50 条
  • [1] Detecting, Tracing, and Monitoring Architectural Tactics in Code
    Mirakhorli, Mehdi
    Cleland-Huang, Jane
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2016, 42 (03) : 206 - 221
  • [2] Inferring Architectural Evolution from Source Code Analysis A Tool-Supported Approach for the Detection of Architectural Tactics
    Kapto, Christel
    El Boussaidi, Ghizlane
    Kpodjedo, Segla
    Tibermacine, Chouki
    SOFTWARE ARCHITECTURE, ECSA 2016, 2016, 9839 : 149 - 165
  • [3] ArchTacRV: Detecting and Runtime Verifying Architectural Tactics in Code
    Ge, Ning
    Wang, Ze
    Zhang, Li
    Zhao, Jiuang
    Zhou, Yufei
    Liu, Zewei
    2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2022), 2022, : 566 - 576
  • [4] Does BERT Understand Code? - An Exploratory Study on the Detection of Architectural Tactics in Code
    Keim, Jan
    Kaplan, Angelika
    Koziolek, Anne
    Mirakhorli, Mehdi
    SOFTWARE ARCHITECTURE (ECSA 2020), 2020, 12292 : 220 - 228
  • [5] Revitalizing an existing honor code program
    Melgoza P.
    Smith J.
    Innovative Higher Education, 2008, 32 (4) : 209 - 219
  • [6] Can Latent Topics in Source Code Predict Missing Architectural Tactics?
    Gopalakrishnan, Raghuram
    Sharma, Palak
    Mirakhorli, Mehdi
    Galster, Matthias
    2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2017, : 15 - 26
  • [7] Interaction-sensitive Synthesis of Architectural Tactics in Connector Designs
    Keuler, Thorsten
    Webel, Christian
    2009 JOINT WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE AND EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE, 2009, : 321 - 324
  • [8] An Architectural approach to preventing code injection attacks
    Riley, Ryan
    Jiang, Xuxian
    Xu, Dongyan
    37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 30 - +
  • [9] An Architectural Approach to Preventing Code Injection Attacks
    Riley, Ryan
    Jiang, Xuxian
    Xu, Dongyan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (04) : 351 - 365
  • [10] USING AN ARCHITECTURAL KNOWLEDGE BASE TO GENERATE CODE FOR PARALLEL COMPUTERS
    TERRANO, AE
    DUNN, SM
    PETERS, JE
    COMMUNICATIONS OF THE ACM, 1989, 32 (09) : 1065 - 1072