Loading...
Please wait, while we are loading the content...
Similar Documents
ABSTRACT Inference and enforcement of data structure consistency specifications
| Content Provider | CiteSeerX |
|---|---|
| Author | Demsky, Brian Ernst, Michael D. Guo, Philip J. Mccamant, Stephen Perkins, Jeff H. Rinard, Martin |
| Abstract | Corrupt data structures are an important cause of unacceptable program execution. Data structure repair (which eliminates inconsistencies by updating corrupt data structures to conform to consistency constraints) promises to enable many programs to continue to execute acceptably in the face of otherwise fatal data structure corruption errors. A key issue is obtaining an accurate and comprehensive data structure consistency specification. We present a new technique for obtaining data structure consistency specifications for data structure repair. Instead of requiring the developer to manually generate such specifications, our approach automatically generates candidate data structure consistency properties using the Daikon invariant detection tool. The developer then reviews these properties, potentially rejecting or generalizing overly specific properties to obtain a specification suitable for automatic enforcement via data structure repair. We have implemented this approach and applied it to three sizable benchmark programs: CTAS (an air-traffic control system), BIND (a widely-used Internet name server) and Freeciv (an interactive game). Our results indicate that (1) automatic constraint generation produces constraints that enable programs to execute successfully through data structure consistency errors, (2) compared to manual specification, automatic generation can produce more comprehensive sets of constraints that cover a larger range of data structure consistency properties, and (3) reviewing the properties is relatively straightforward and requires substantially less programmer effort than manual generation, primarily because it reduces the need to examine the program text to understand its operation and extract the relevant consistency constraints. Moreover, when evaluated by a hostile third party “Red Team ” contracted to evaluate the effectiveness of the technique, our data structure inference and enforcement tools successfully prevented several otherwise fatal attacks. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Data Structure Consistency Specification Abstract Inference Data Structure Repair Corrupt Data Structure Key Issue Specific Property Comprehensive Data Structure Consistency Specification Automatic Generation Manual Specification Data Structure Consistency Property Enable Program Specification Suitable Daikon Invariant Detection Tool Candidate Data Structure Consistency Property Data Structure Consistency Error Data Structure Inference New Technique Widely-used Internet Name Server Automatic Constraint Generation Sizable Benchmark Program Relevant Consistency Constraint Manual Generation Interactive Game Enforcement Tool Automatic Enforcement Hostile Third Party Red Team Unacceptable Program Execution Fatal Attack Comprehensive Set Important Cause Program Text Many Program Air-traffic Control System Programmer Effort |
| Content Type | Text |