Date of Original Version

6-2012

Type

Conference Proceeding

Rights Management

The final publication is available at Springer via http://dx.doi.org/10.1109/ICSE.2012.6227127

Abstract or Description

Programmers using an API often must follow protocols that specify when it is legal to call particular methods. Several techniques have been proposed to find violations of such protocols based on mined specifications. However, existing techniques either focus on single-object protocols or on particular kinds of bugs, such as missing method calls. There is no practical technique to find multi-object protocol bugs without a priori known specifications. In this paper, we combine a dynamic analysis that infers multi-object protocols and a static checker of API usage constraints into a fully automatic protocol conformance checker. The combined system statically detects illegal uses of an API without human-written specifications. Our approach finds 41 bugs and code smells in mature, real-world Java programs with a true positive rate of 51%. Furthermore, we show that the analysis reveals bugs not found by state of the art approaches.

DOI

10.1109/ICSE.2012.6227127

Share

COinS
 

Published In

Proceedings of the International Conference on Software Engineering (ICSE), 12, 925-935.