{"id":"https://openalex.org/W1968847337","doi":"https://doi.org/10.1145/1101908.1101948","title":"Locating faulty code using failure-inducing chops","display_name":"Locating faulty code using failure-inducing chops","publication_year":2005,"publication_date":"2005-11-07","ids":{"openalex":"https://openalex.org/W1968847337","doi":"https://doi.org/10.1145/1101908.1101948","mag":"1968847337"},"language":"en","primary_location":{"id":"doi:10.1145/1101908.1101948","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1101908.1101948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067083421","display_name":"Neelam Gupta","orcid":"https://orcid.org/0000-0002-0417-2454"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Neelam Gupta","raw_affiliation_strings":["University of Arizona, Tucson, AZ"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101790301","display_name":"Haifeng He","orcid":"https://orcid.org/0000-0002-4382-2253"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haifeng He","raw_affiliation_strings":["University of Arizona, Tucson, AZ"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100362465","display_name":"Xiangyu Zhang","orcid":"https://orcid.org/0000-0003-2138-4608"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiangyu Zhang","raw_affiliation_strings":["University of Arizona, Tucson, AZ"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100699251","display_name":"Rajiv Gupta","orcid":"https://orcid.org/0000-0002-9348-3974"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rajiv Gupta","raw_affiliation_strings":["University of Arizona, Tucson, AZ"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067083421"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":15.2334,"has_fulltext":false,"cited_by_count":186,"citation_normalized_percentile":{"value":0.99247918,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"263","last_page":"272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.8986820578575134},{"id":"https://openalex.org/keywords/program-slicing","display_name":"Program slicing","score":0.8817363977432251},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8200016021728516},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6101082563400269},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.5011787414550781},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4922257959842682},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.475670725107193},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.46901315450668335},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4345121383666992},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.417053759098053},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.41658106446266174},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.402690052986145},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.342599481344223},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.22399193048477173}],"concepts":[{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.8986820578575134},{"id":"https://openalex.org/C91071405","wikidata":"https://www.wikidata.org/wiki/Q1413145","display_name":"Program slicing","level":3,"score":0.8817363977432251},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8200016021728516},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6101082563400269},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.5011787414550781},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4922257959842682},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.475670725107193},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.46901315450668335},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4345121383666992},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.417053759098053},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.41658106446266174},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.402690052986145},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.342599481344223},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.22399193048477173},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1101908.1101948","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1101908.1101948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.188.8559","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.8559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://pag.csail.mit.edu/reading-group/gupta05chops.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.84.7415","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.7415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucr.edu/~gupta/research/Publications/Comp/ase05.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8199999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1534516911","https://openalex.org/W1535300117","https://openalex.org/W1537098769","https://openalex.org/W1843474218","https://openalex.org/W1984248430","https://openalex.org/W1984846967","https://openalex.org/W2012523719","https://openalex.org/W2026117800","https://openalex.org/W2036196659","https://openalex.org/W2108278741","https://openalex.org/W2110066339","https://openalex.org/W2116409384","https://openalex.org/W2121081915","https://openalex.org/W2129663982","https://openalex.org/W2134691366","https://openalex.org/W2136568800","https://openalex.org/W2140077136","https://openalex.org/W2145377152","https://openalex.org/W2146796140","https://openalex.org/W2148329403","https://openalex.org/W2151139698","https://openalex.org/W2155479707","https://openalex.org/W2160510992","https://openalex.org/W2162045655","https://openalex.org/W2166007208","https://openalex.org/W2170224888","https://openalex.org/W2170364043","https://openalex.org/W2293624369","https://openalex.org/W4233793161","https://openalex.org/W4246906397","https://openalex.org/W6632060891","https://openalex.org/W6656765965","https://openalex.org/W6680507135","https://openalex.org/W6681921123","https://openalex.org/W6683485974"],"related_works":["https://openalex.org/W2080412071","https://openalex.org/W2011854888","https://openalex.org/W1996791333","https://openalex.org/W2026117800","https://openalex.org/W4234735799","https://openalex.org/W1992550622","https://openalex.org/W2764797736","https://openalex.org/W772318632","https://openalex.org/W1528649993","https://openalex.org/W3022626626"],"abstract_inverted_index":{"Software":[0],"debugging":[1,32,55,81],"is":[2,77],"the":[3,35,51,58,70,101,109,112,117,139,155,162,168,172,209],"process":[4],"of":[5,53,60,116,135,157,198],"locating":[6],"and":[7,62,98,129],"correcting":[8],"faulty":[9,15,73,133,173],"code.":[10,74,174],"Prior":[11],"techniques":[12,21],"to":[13,33,67,78,83,92,120,142,161,170,180,204],"locate":[14,171],"code":[16,210],"either":[17],"use":[18,30,79,89],"program":[19,26,39,65],"analysis":[20],"such":[22,188],"as":[23,189],"backward":[24,63,113],"dynamic":[25,64,96,106,114,163],"slicing":[27,66],"or":[28],"exclusively":[29],"delta":[31,54,80],"analyze":[34],"state":[36],"changes":[37],"during":[38],"execution.":[40],"In":[41],"this":[42,90,104],"paper,":[43],"we":[44],"present":[45],"a":[46,85,94,122],"new":[47],"approach":[48,76],"that":[49,149],"integrates":[50],"potential":[52],"algorithm":[56,82],"with":[57,108,132,183],"benefit":[59],"forward":[61,95,105],"narrow":[68],"down":[69],"search":[71,158],"for":[72],"Our":[75,146],"identify":[84],"minimal":[86],"failure-inducing":[87,123,150,194],"input,":[88],"input":[91],"compute":[93,121],"slice":[97,107,115],"then":[99],"intersect":[100],"statements":[102,110,206],"in":[103,111,196],"erroneous":[118],"output":[119],"chop.":[124],"We":[125,175],"implemented":[126],"our":[127,144,178],"technique":[128,179],"conducted":[130],"experiments":[131,147],"versions":[134],"several":[136,181,197],"programs":[137,182],"from":[138],"Siemens":[140],"suite":[141],"evaluate":[143],"technique.":[145],"show":[148],"chops":[151],"can":[152],"greatly":[153],"reduce":[154],"size":[156],"space":[159],"compared":[160],"slices":[164],"without":[165],"significantly":[166],"compromising":[167],"capability":[169],"also":[176],"applied":[177],"known":[184],"memory":[185,212],"related":[186],"bugs":[187],"buffer":[190],"overflow":[191],"bugs.":[192],"The":[193],"chop":[195],"these":[199],"cases":[200],"contained":[201],"only":[202],"2":[203],"4":[205],"which":[207],"included":[208],"causing":[211],"corruption.":[213]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":12},{"year":2013,"cited_by_count":15},{"year":2012,"cited_by_count":15}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
