An extensive replication study of the ABLoTS approach for bug localization

被引:1
作者
Niu, Feifei [1 ]
Zhang, Enshuo [1 ]
Mayr-Dorn, Christoph [2 ]
Assuncao, Wesley Klewerton Guez [3 ]
Huang, Liguo [4 ]
Ge, Jidong [1 ]
Luo, Bin [1 ]
Egyed, Alexander [2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China
[2] Johannes Kepler Univ Linz, Inst Software Syst Engn, Linz, Austria
[3] North Carolina State Univ, Dept Comp Sci, Raleigh, NC USA
[4] Southern Methodist Univ, Dept Comp Sci, Dallas, TX USA
基金
奥地利科学基金会;
关键词
Bug localization; Information retrieval; Replication study; Composer; FAULT LOCALIZATION; INFORMATION; CODE;
D O I
10.1007/s10664-024-10537-6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Bug localization is the task of recommending source code locations (typically files) that contain the cause of a bug and hence need to be changed to fix the bug. Along these lines, information retrieval-based bug localization (IRBL) approaches have been adopted, which identify the most bug-prone files from the source code space. In current practice, a series of state-of-the-art IRBL techniques leverage the combination of different components (e.g., similar reports, version history, and code structure) to achieve better performance. ABLoTS is a recently proposed approach with the core component, TraceScore, that utilizes requirements and traceability information between different issue reports (i.e., feature requests and bug reports) to identify buggy source code snippets with promising results. To evaluate the accuracy of these results and obtain additional insights into the practical applicability of ABLoTS, we conducted a replication study of this approach with the original dataset and also on two extended datasets (i.e., additional Java dataset and Python dataset). The original dataset consists of 11 open source Java projects with 8,494 bug reports. The extended Java dataset includes 16 more projects comprising 25,893 bug reports and corresponding source code commits. The extended Python dataset consists of 12 projects with 1,289 bug reports. While we find that the TraceScore component, which is the core of ABLoTS, produces comparable or even better results with the extended datasets, we also find that we cannot reproduce the ABLoTS results, as reported in its original paper, due to an overlooked side effect of incorrectly choosing a cut-off date that led to test data leaking into training data with significant effects on performance. Additionally, we conduct experiments to assess the performance of various composers that aggregate scores from different components, revealing that Logistic Regression, fixed weight, and CombSUM outperform the other composers across all three datasets, while decision tree and random forest exhibited subpar performance.
引用
收藏
页数:37
相关论文
共 78 条
  • [1] A Large-Scale Comparative Evaluation of IR-Based Tools for Bug Localization
    Akbar, Shayan A.
    Kak, Avinash C.
    [J]. 2020 IEEE/ACM 17TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2020, : 21 - 31
  • [2] Al-Aidaroos AS, 2023, International Journal of Science and Engineering Applications, P108
  • [3] Bug Localization with Combination of Deep Learning and Information Retrieval
    An Ngoc Lam
    Anh Tuan Nguyen
    Hoan Anh Nguyen
    Nguyen, Tien N.
    [J]. 2017 IEEE/ACM 25TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2017, : 218 - 229
  • [4] Combining Deep Learning with Information Retrieval to Localize Buggy Files for Bug Reports
    An Ngoc Lam
    Anh Tuan Nguyen
    Hoan Anh Nguyen
    Nguyen, Tien N.
    [J]. 2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, : 476 - 481
  • [5] [Anonymous], 2022, SCIKIT LEARN
  • [6] Anvik J, 2005, P OOPSLA WORKSH EC T, P35, DOI [10.1145/1117696.1117704, DOI 10.1145/1117696]
  • [7] Anvik J., 2006, P 28 INT C SOFTW ENG, P361, DOI DOI 10.1145/1134285.1134336
  • [8] Aslam J. A., 2001, SIGIR Forum, P276
  • [9] Mitigating Cyber Security Attacks by being Aware of Vulnerabilities and Bugs
    Aslan, Omer
    Samet, Refik
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2017, : 222 - 225
  • [10] Bachmann A, 2009, IWPSE-EVOL 09: ERCIM WORKSHOP ON SOFTWARE EVOLUTION (EVOL) AND INTERNATIONAL WORKSHOP ON PRINCIPLES OF SOFTWARE EVOLUTION (IWPSE), P119