Browse > Article
http://dx.doi.org/10.7236/JIIBC.2015.15.4.9

Runtime Fault Detection Method based on Context Insensitive Behavioral Model for Legacy Software Systems  

Kim, Suntae (Dept. of Software Engineering, Chunbuk National University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.15, no.4, 2015 , pp. 9-18 More about this Journal
Abstract
In recent years, the number of applications embedded in the various devices such as a smart phone is getting larger. Due to the frequent changes of states in the execution environment, various malfunctions may occur. In order to handle the issue, this paper suggests an approach to detecting method-level failures in the legacy software systems. We can determine if the software executes the abnormal behavior based on the behavior model. However, when we apply the context-sensitive behavior model to the method-level, several problems happen such as false alarms and monitoring overhead. To tackle those issues, we propose CIBFD (Context-Insensitive Behavior Model-based Failure Detection) method. Through the case studies, we compare CIBFD method with the existing method. In addition, we analyze the effectiveness of the method for each application domains.
Keywords
Legacy Software System; Fault Detection; self-adaptive software;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Kindberg, T. and Fox, A., "System Software for Ubiquitous Computing," IEEE Pervasive Computing, Vol. 1, No. 1, pp. 70-81, 2002.   DOI
2 Kim, J. S., Park, S. Y. and Sugumaran, V., "Contextual Problem Detection and Management during Software Execution in Complex Environments," Industrial Management & Data Systems, Vol. 106, No. 4, pp. 540-561, 2006.   DOI
3 DARPA, "Self Adaptive Software," BAA 98-12, Proposer Information Pamphlet, www.darpa.mil/ito/Solicitations/PIP_9812.html, 1997.
4 IBM, "An Architectural Blueprint for Autonomic Computing, Third edition," Tech. Report, 2005.
5 Horn, P., "Autonomic Computing: IBM's Perspective on the State of Information Technology," IBM Corporation, 2001.
6 Wong, W. E. and Debroy, V., "Software Fault Localization," IEEE Reliability Society 2009 Annual Technology Report, January 2010.
7 Kephart, J. O. and Chess, D. M., "The Vision of Autonomic Computing," IEEE Computer, Vol. 36, No. 11, pp. 41-52, 2003.   DOI
8 Kim, M., Kannan, S., Lee, I., Sokolsky, O. and Viswanathan, M., "Java-MaC: a Run-time Assurance Tool for Java Programs," Electronic Notes in Theoretical Computer Science, Vol. 55, Issue 2, pp. 218-235, 2001.   DOI
9 Hlady, M., Kovacevic, R., Li, J. J., Pekilis, B. R., Prairie, D., Savor, T., Seviora, R. E., Simser, D. and Vorobiev, A., "An Approach to Automatic Detection of Software Failures," Proceedings of 6th International Symposium on Software Reliability Engineering, pp. 24-27, 1995.
10 Mariani, L., Pastore, F. and Pezze, M., "Dynamic Analysis for Diagnosing Integration Faults," IEEE Trans. On Software Engineering, Vol. 37, Issue 4, pp. 486-508, 2011.   DOI
11 Chang, H., Mariani, L. and Pezze, M., "In-Field Healing of Integration Problems with COTS Components," Proceedings of ICSE 2009, pp. 166-176, 2009.
12 Cook, J. E. and Wolf, A. L., "Discovering Models of Software Processes from Event-Based Data," ACM Trans. On Software Engineering and Methodology, Vol. 7, Issue 3, pp. 215-249, 1998.   DOI
13 Fischmeister, S. and Lam, P., "Time-Aware Instrumentation of Embedded Software," IEEE Trans. on Industrial Informatics, Vol. 6, No. 4, pp. 652-663, 2010.   DOI
14 Kanstren, T., "Towards A Taxonomy of Dynamic Invariants in Software Behavior," Proceeding of 2nd International Conference on Pervasive Patterns and Applications, pp. 20-27, 2010.
15 Y. Yang, B. Chang, "A Probability Embedded Expert System to Detect and Resolve Network Faults Intelligently," International Journal of Internet, Broadcasting and Communication, Vol 11, No 2, pp135-143, 2011