- Mining software behaviors to understand software functionalities [ICSE'10, ICSE'11]
- Mining software bug reports, bug signatures to locate bugs [KDD'09, ICSE'10]
- Monitoring software behaviors to detect security threats [RV'11]
- Inferring software programming rules to detect programming bugs [ICFEM'11]
LM MINER
A generic specification miner for software implementation. LM mines interaction protocols among objects in the format of call sequences. LM supports specifications in form of sequential pattern, temporal logic or live sequence chart. LM accepts execution traces or an executable program (Java or Binary) as inputs. [ICSE'10]
NORT
A tool for establishing signatures of normal behaving applications and monitoring the current behavior of applications to check against the learned specifications. [RV'11]
COPPICE
A mutation framework for inferring legitimate API rules. COPPICE infers interaction rules between objects in the format of call sequences. COPPICE supports specifications in form of temporal logic and receives an executable Java program as input. [ICFEM'11]
HIMPS
An efficient system for discovering predicated bug signatures to assist in debugging. HIMPS leverages the hierarchical instrumentation technique to efficiently discover bug signatures from execution traces. [ISSTA'14]
-
Efficient Predicated Bug Signature Mining via Hierarchical Instrumentation
Zhiqiang Zuo, Siau-Cheng Khoo and Chengnian Sun
In the 2014 International Symposium on Software Testing and Analysis (ISSTA'14), San Jose, CA, USA, July, 2014
[Abstract] [Text] -
Extracting Significant Specifications from Mining through Mutation Testing
Anh Cuong Nguyen and Siau-Cheng Khoo
In 13rd International Conference on Formal Engineering Methods (ICFEM'11), Durham, England, October, 2011
[Abstract] [Text] -
NORT: Runtime Anomaly-based Monitoring of Malicious Behavior for Windows
Narcisa Andreea Milea, Siau-Cheng Khoo, David Lo and Cristi Pop
In 2nd International Conference on Runtime Verification (RV'11), San Francisco, CA, USA, September 2011
[Abstract] [Text] -
Mining Message Sequence Graphs
Sandeep Kumar, Siau-Cheng Khoo, Abhik Roychoudhury and David Lo
In 33rd International Conference on Software Engineering (ICSE'11), Waikiki, Honolulu, HI, USA, May 2011
[Abstract] [Text] -
A Discriminative Model Approach for Accurate Duplicate Bug Report Retrieval
Chengnian Sun, David Lo, Xiaoyin Wang, Jing Jiang and Siau-Cheng Khoo
In 32nd International Conference on Software Engineering (ICSE'10), Cape Town, South Africa, May 2010
[Abstract] [Text] -
LM: A Miner for Scenario-Based Specifications [Tool Paper]
Tuan Anh Doan, David Lo, Shahar Maoz and Siau-Cheng Khoo
In 32nd International Conference on Software Engineering (ICSE'10), Cape Town, South Africa, May 2010
[Abstract] [Text] -
Classification of Software Behaviors for Failure Detection: a Discriminative Pattern Mining Approach
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo and Chengnian Sun
In 15th International Conference on Knowledge Discovery and Data Mining (KDD'09), Paris, France, June 2009
[Abstract] [Text]
- Dr. Siau-Cheng Khoo, Associate Professor, School of Computing, National University of Singapore
- Dr. David Lo, Assistant Professor, School of Information Systems, Singapore Management University
- Sandeep Kumar, Ph.D Candidate, School of Computing, National University of Singapore
- Chengnian Sun, Ph.D Candidate, School of Computing, National University of Singapore
- Narcisa Andreea Milea, Ph.D Candidate, School of Computing, National University of Singapore
- Zhiqiang Zuo, Ph.D Candidate, School of Computing, National University of Singapore
- Anh Cuong Nguyen, Research Assistant, School of Computing, National University of Singapore
Last updated on 1st Nov, 2011.