Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2025113.2025188acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
demonstration

Synoptic: studying logged behavior with inferred models

Published: 09 September 2011 Publication History

Abstract

Logging is a powerful method for capturing program activity and state during an execution. However, log inspection remains a tedious activity, with developers often piecing together what went on from multiple log lines and across many files. This paper describes Synoptic, a tool that takes logs as input and outputs a finite state machine that models the process generating the logs. The paper overviews the model inference algorithms. Then, it describes the Synoptic tool, which is designed to support a rich log exploration workflow.

References

[1]
Pattern (Java Platform SE 7 b141) http://download.oracle.com/javase/7/docs/api/java/util/regex/Pattern.html. Accessed July 1, 2011.
[2]
M. Acharya, T. Xie, J. Pei, and J. Xu. Mining API Patterns as Partial Orders from Source Code: From Usage Scenarios to Specifications. In Proc. of FSE, 2007.
[3]
I. Beschastnikh, Y. Brun, S. Schneider, M. Sloan, and M. D. Ernst. Leveraging Existing Instrumentation to Automatically Infer Invariant-Constrained Models. In Proc. of FSE, 2011.
[4]
A. W. Biermann and J. A. Feldman. On the Synthesis of Finite-State Machines from Samples of Their Behavior. IEEE Trans. Comput., 21(6):592--597, 1972.
[5]
E. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. Counterexample-guided Abstraction Refinement. In Proc. of CAV, 2000.
[6]
J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. Commun. ACM, 51(1):107--113, 2008.
[7]
M. B. Dwyer, G. S. Avrunin, and J. C. Corbett. Patterns in Property Specifications for Finite-State Verification. In Proc. of ICSE, 1999.
[8]
D. Lo, L. e. Mariani, and M. Pezzè. Automatic Steering of Behavioral Model Inference. In Proc. of FSE, 2009.
[9]
S. Schneider, I. Beschastnikh, S. Chernyak, M. D. Ernst, and Y. Brun. Synoptic: Summarizing System Logs with Refinement. In Proc. of SLAML, 2010.
[10]
J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta: Mining Temporal API Rules from Imperfect Traces. In Proc. of ICSE, 2006.

Cited By

View all
  • (2023)Blindspots in Python and Java APIs Result in Vulnerable CodeACM Transactions on Software Engineering and Methodology10.1145/357185032:3(1-31)Online publication date: 26-Apr-2023
  • (2023)Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code InstrumentationIEEE Transactions on Services Computing10.1109/TSC.2022.314994916:2(996-1010)Online publication date: 1-Mar-2023
  • (2022)Debugging in the brave new world of reconfigurable hardwareProceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3503222.3507701(946-962)Online publication date: 28-Feb-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ESEC/FSE '11: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering
September 2011
548 pages
ISBN:9781450304436
DOI:10.1145/2025113
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. log analysis
  2. model inference
  3. synoptic
  4. temporal invariant mining

Qualifiers

  • Demonstration

Conference

ESEC/FSE'11
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Blindspots in Python and Java APIs Result in Vulnerable CodeACM Transactions on Software Engineering and Methodology10.1145/357185032:3(1-31)Online publication date: 26-Apr-2023
  • (2023)Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code InstrumentationIEEE Transactions on Services Computing10.1109/TSC.2022.314994916:2(996-1010)Online publication date: 1-Mar-2023
  • (2022)Debugging in the brave new world of reconfigurable hardwareProceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3503222.3507701(946-962)Online publication date: 28-Feb-2022
  • (2022)Extracting Formats of Service Messages with Varying PayloadsACM Transactions on Internet Technology10.1145/350315922:3(1-31)Online publication date: 1-Feb-2022
  • (2021)A Review on the Service Virtualisation and Its Structural PillarsApplied Sciences10.3390/app1105238111:5(2381)Online publication date: 8-Mar-2021
  • (2021)A Discovery Method for Hierarchical Software Execution Behavior Models Based on ComponentsScientific Programming10.1155/2021/47883572021Online publication date: 1-Jan-2021
  • (2021)Automated Orchestration of Security Chains Driven by Process Learning*Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning10.1002/9781119675525.ch12(289-319)Online publication date: 3-Sep-2021
  • (2020)Causal testingProceedings of the ACM/IEEE 42nd International Conference on Software Engineering10.1145/3377811.3380377(87-99)Online publication date: 27-Jun-2020
  • (2019)DiffTrace: Efficient Whole-Program Trace Analysis and Diffing for Debugging2019 IEEE International Conference on Cluster Computing (CLUSTER)10.1109/CLUSTER.2019.8891027(1-12)Online publication date: Sep-2019
  • (2019)Incremental Analysis of Large-Scale System Logs for Anomaly Detection2019 IEEE International Conference on Big Data (Big Data)10.1109/BigData47090.2019.9006593(2119-2127)Online publication date: Dec-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media