{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:13:58Z","timestamp":1726053238775},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030309220"},{"type":"electronic","value":"9783030309237"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30923-7_8","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T23:04:08Z","timestamp":1569971048000},"page":"135-152","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["STAD: Stack Trace Based Automatic Software Misconfiguration Diagnosis via Value Dependency Graph"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lintao","family":"Xian","sequence":"additional","affiliation":[]},{"given":"Zhongwen","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"8_CR1","unstructured":"Attariyan, M., Chow, M., Flinn, J.: X-ray: automating root-cause diagnosis of performance anomalies in production software. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI 2012, pp. 307\u2013320. USENIX Association, Berkeley (2012)"},{"key":"8_CR2","unstructured":"Attariyan, M., Flinn, J.: Automating configuration troubleshooting with dynamic information flow analysis. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 237\u2013250. USENIX Association, Berkeley (2010)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Behrang, F., Cohen, M.B., Orso, A.: Users beware: preference inconsistencies ahead. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, pp. 295\u2013306. ACM (2015)","DOI":"10.1145\/2786805.2786869"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-78800-3_27","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"P Boonstoppel","year":"2008","unstructured":"Boonstoppel, P., Cadar, C., Engler, D.: RWset: attacking path explosion in constraint-based test generation. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 351\u2013366. Springer, Heidelberg (2008). \n                    https:\/\/doi.org\/10.1007\/978-3-540-78800-3_27"},{"issue":"2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TSE.2014.2363469","volume":"41","author":"N Chen","year":"2015","unstructured":"Chen, N., Kim, S.: STAR: stack trace based automatic crash reproduction via symbolic execution. IEEE Trans. Softw. Eng. 41(2), 198\u2013220 (2015). \n                    https:\/\/doi.org\/10.1109\/TSE.2014.2363469","journal-title":"IEEE Trans. Softw. Eng."},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Dong, Z., Andrzejak, A., Lo, D., Costa, D.: ORPLocator: identifying read points of configuration options via static analysis. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp. 185\u2013195, October 2016. \n                    https:\/\/doi.org\/10.1109\/ISSRE.2016.37","DOI":"10.1109\/ISSRE.2016.37"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Dong, Z., Andrzejak, A., Shao, K.: Practical and accurate pinpointing of configuration errors using static analysis. In: 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 171\u2013180, September 2015. \n                    https:\/\/doi.org\/10.1109\/ICSM.2015.7332463","DOI":"10.1109\/ICSM.2015.7332463"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Dong, Z., Ghanavati, M., Andrzejak, A.: Automated diagnosis of software misconfigurations based on static analysis. In: 2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 162\u2013168, November 2013. \n                    https:\/\/doi.org\/10.1109\/ISSREW.2013.6688897","DOI":"10.1109\/ISSREW.2013.6688897"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Gunawi, H.S., et al.: What bugs live in the cloud? A study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, SOCC 2014, pp. 7:1\u20137:14. ACM, New York (2014). \n                    https:\/\/doi.org\/10.1145\/2670979.2670986","DOI":"10.1145\/2670979.2670986"},{"key":"8_CR10","unstructured":"Jiang, W., Hu, C., Pasupathy, S., Kanevsky, A., Li, Z., Zhou, Y.: Understanding customer problem troubleshooting from storage system logs. In: Proccedings of the 7th Conference on File and Storage Technologies, FAST 2009, pp. 43\u201356. USENIX Association, Berkeley (2009)"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Keller, L., Upadhyaya, P., Candea, G.: ConfErr: a tool for assessing resilience to human configuration errors. In: 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), pp. 157\u2013166, June 2008. \n                    https:\/\/doi.org\/10.1109\/DSN.2008.4630084","DOI":"10.1109\/DSN.2008.4630084"},{"key":"8_CR12","unstructured":"O\u2019Donnell, L.: Millions of records exposed in Veeam misconfigured server (2018). \n                    https:\/\/threatpost.com\/millions-of-records-exposed-in-veeam-misconfigured-server\/137361\/\n                    \n                  . Accessed 11 Sept 2018"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Rabkin, A., Katz, R.: Precomputing possible configuration error diagnoses. In: Proceedings of the 2011 26th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2011, pp. 193\u2013202. IEEE Computer Society, Washington (2011). \n                    https:\/\/doi.org\/10.1109\/ASE.2011.6100053","DOI":"10.1109\/ASE.2011.6100053"},{"key":"8_CR14","doi-asserted-by":"publisher","unstructured":"Rabkin, A., Katz, R.: Static extraction of program configuration options. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, pp. 131\u2013140. ACM, New York (2011). \n                    https:\/\/doi.org\/10.1145\/1985793.1985812","DOI":"10.1145\/1985793.1985812"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Weise, D., Crew, R.F., Ernst, M., Steensgaard, B.: Value dependence graphs: representation without taxation. In: Proceedings of the 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 297\u2013310. ACM (1994)","DOI":"10.1145\/174675.177907"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Xiao, X., Xie, T., Tillmann, N., de Halleux, J.: Precise identification of problems for structural test generation. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, pp. 611\u2013620. ACM, New York (2011). \n                    https:\/\/doi.org\/10.1145\/1985793.1985876","DOI":"10.1145\/1985793.1985876"},{"key":"8_CR17","doi-asserted-by":"publisher","unstructured":"Xu, T., et al.: Do not blame users for misconfigurations. In: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, SOSP 2013, pp. 244\u2013259. ACM, New York (2013). \n                    https:\/\/doi.org\/10.1145\/2517349.2522727","DOI":"10.1145\/2517349.2522727"},{"issue":"4","key":"8_CR18","doi-asserted-by":"publisher","first-page":"70:1","DOI":"10.1145\/2791577","volume":"47","author":"T Xu","year":"2015","unstructured":"Xu, T., Zhou, Y.: Systems approaches to tackling configuration errors: a survey. ACM Comput. Surv. 47(4), 70:1\u201370:41 (2015). \n                    https:\/\/doi.org\/10.1145\/2791577","journal-title":"ACM Comput. Surv."},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Yin, Z., Ma, X., Zheng, J., Zhou, Y., Bairavasundaram, L.N., Pasupathy, S.: An empirical study on configuration errors in commercial and open source systems. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011, pp. 159\u2013172. ACM, New York (2011). \n                    https:\/\/doi.org\/10.1145\/2043556.2043572","DOI":"10.1145\/2043556.2043572"},{"key":"8_CR20","unstructured":"Yong-ik, L., Kim, M.: Server error in Amazon cloud network disrupts web-based services in Korea (2018). \n                    https:\/\/pulsenews.co.kr\/view.php?year=2018&no=732347\n                    \n                  . Accessed 23 Nov 2018"},{"key":"8_CR21","unstructured":"Yuan, D., et al.: Simple testing can prevent most critical failures: an analysis of production failures in distributed data-intensive systems. In: Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, OSDI 2014, pp. 249\u2013265. USENIX Association, Berkeley (2014)"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Zhang, J., et al.: EnCore: exploiting system environment and correlation information for misconfiguration detection. In: Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2014, pp. 687\u2013700. ACM, New York (2014). \n                    https:\/\/doi.org\/10.1145\/2541940.2541983","DOI":"10.1145\/2541940.2541983"},{"key":"8_CR23","doi-asserted-by":"publisher","unstructured":"Zhang, S.: ConfDiagnoser: an automated configuration error diagnosis tool for Java software. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 1438\u20131440, May 2013. \n                    https:\/\/doi.org\/10.1109\/ICSE.2013.6606737","DOI":"10.1109\/ICSE.2013.6606737"}],"container-title":["Lecture Notes in Computer Science","Model Checking Software"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30923-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T23:25:16Z","timestamp":1569972316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30923-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030309220","9783030309237"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30923-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPIN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Model Checking Software","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spin2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/track\/spin-2019\/spin-2019-papers","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}