RESEARCH NOTES-GMRepair: Graph Mining Template-Based Automated Software Repair

被引:0
|
作者
Cao, Heling [1 ,2 ,3 ,4 ]
Guo, Yanlong [1 ,2 ,3 ,4 ]
Wang, Yun [1 ,2 ,3 ,4 ]
Tian, Fangchao [1 ,2 ,3 ,4 ]
Wang, Zhaolong [1 ,2 ,3 ,4 ]
Chu, Yonghe [1 ,2 ,3 ,4 ]
Deng, Miaolei [1 ,2 ,3 ,4 ]
Wang, Panpan [1 ,2 ,3 ,4 ]
He, Zhenghao [1 ,2 ,3 ,4 ]
Wei, Shuting [1 ,2 ,3 ,4 ]
机构
[1] Henan Univ Technol, Key Lab Grain Informat Proc & Control, Minist Educ, Zhengzhou 450001, Peoples R China
[2] Henan Univ Technol, Henan Key Lab Grain Photoelect Detect & Control, Zhengzhou 450001, Peoples R China
[3] Henan Univ Technol, Coll Informat Sci & Engn, Zhengzhou 450001, Peoples R China
[4] Henan Int Joint Lab Grain Informat Proc, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Software bug repair; repair templates; genetic programming; test case sequencing; PROGRAM REPAIR;
D O I
10.1142/S0218194025500068
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing scale and complexity of software recently, automated software bug repair has grown in importance. However, the current automated software bug repair process suffers from issues such as coarse-grained repair granularity and poor patch quality. To address these problems, we propose a graph mining template-based automatic software repair (GMRepair) to improve the performance of automated software bug repair. First, this approach adopts the Ochiai fault localization technique to locate and generate a list of suspicious defect statements. We utilize the GumTree tool to parse the bug and repair program files, generating edit scripts. These edit scripts are then transformed into a graphical representation. Second, we utilize a frequent graph miner to obtain graph mining templates by matching the context of the suspicious statements with the context of the graph mining templates, generating an initial population for them. The buggy program is evolved using genetic programming through mutation and crossover operations, generating new individuals. Finally, we sequentially pass the candidate patches (CPs) through corresponding test cases and prioritize the test cases using priority sorting techniques. Patches that fail to pass the test cases are filtered out, and the patches that pass the test cases are output. We conducted the experiments using two datasets, QuixBugs and Defects4J. In Defects4J, the GMRepair successfully repaired 41 defects, while in QuixBugs, it successfully repaired 15 defects. Compared to the existing methods, GMRepair offers a higher success rate and efficiency in defect repair.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] Template-based automated service provisioning - Supporting the agreement-driven service life-cycle
    Ludwig, H
    Gimpel, H
    Dan, A
    Kearney, B
    SERVICE-ORIENTED COMPUTING - ICSOC 2005, PROCEEDINGS, 2005, 3826 : 283 - 295
  • [42] Graph-based data mining algorithm research
    Hu, Zuoting
    Dong, Lanfang
    Wang, Xun
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (03): : 76 - 78
  • [43] Research of Data Graph Mining based on Telecommunication Customers
    Gao, Shang
    Li, Meimei
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 402 - +
  • [44] Mining Event Logic Graph from Open Q&A Site for Automated Program Repair
    Hou, Chuanjia
    Liu, Xiaotong
    Yu, Hao
    Jia, Tong
    Li, Ying
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 1167 - 1168
  • [45] Template-Based Federated Multiview Domain Alignment for Predicting Heterogeneous Brain Graph Evolution Trajectories from Baseline
    Gundogdu, Emircan
    Rekik, Islem
    PREDICTIVE INTELLIGENCE IN MEDICINE, PRIME 2023, 2023, 14277 : 14 - 24
  • [46] Knowledge Graph based Automated Generation of Test Cases in Software Engineering
    Nayak, Anmol
    Kesri, Vaibhav
    Dubey, Rahul Kumar
    PROCEEDINGS OF THE 7TH ACM IKDD CODS AND 25TH COMAD (CODS-COMAD 2020), 2020, : 289 - 295
  • [47] Research on Software Defect Prediction Based on Data Mining
    Chen, Yuan
    Shen, Xiang-heng
    Du, Peng
    Ge, Bing
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 563 - 567
  • [48] An automated template-based adaptive threshold approach for measuring ventricular volume enlargement in mouse brain MR microscopy
    Lin, Lan
    Wu, Shuicai
    JOURNAL OF MICROSCOPY, 2012, 248 (03) : 260 - 265
  • [49] VulRepair: A T5-Based Automated Software Vulnerability Repair
    Fu, Michael
    Tantithamthavorn, Chakkrit
    Trung Le
    Van Nguyen
    Dinh Phung
    PROCEEDINGS OF THE 30TH ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2022, 2022, : 935 - 947
  • [50] Research on Automatic Vulnerability Mining Model Based on Knowledge Graph
    Chen, Ze
    Zuo, Xiaojun
    Hou, Botao
    Dong, Na
    Chang, Jie
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2020, 29 (7-8)