{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:10:44Z","timestamp":1773375044102,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,11]],"date-time":"2021-07-11T00:00:00Z","timestamp":1625961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,11]]},"DOI":"10.1145\/3460319.3464799","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T22:18:43Z","timestamp":1625782723000},"page":"478-490","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Challenges and opportunities: an in-depth empirical study on configuration error injection testing"],"prefix":"10.1145","author":[{"given":"Wang","family":"Li","sequence":"first","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Zhouyang","family":"Jia","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Shanshan","family":"Li","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Yuanliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Teng","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Erci","family":"Xu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Ji","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Xiangke","family":"Liao","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. HTTPD configuration manual page. http:\/\/httpd.apache.org\/docs\/2.4\/mod\/directives.html  2020. HTTPD configuration manual page. http:\/\/httpd.apache.org\/docs\/2.4\/mod\/directives.html"},{"key":"e_1_3_2_1_2_1","unstructured":"2020. MySQL configuration manual page. https:\/\/dev.mysql.com\/doc\/refman\/5.6\/en\/server-option-variable-reference.html  2020. MySQL configuration manual page. https:\/\/dev.mysql.com\/doc\/refman\/5.6\/en\/server-option-variable-reference.html"},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Nginx configuration manual page. http:\/\/nginx.org\/en\/docs\/dirindex.html  2020. Nginx configuration manual page. http:\/\/nginx.org\/en\/docs\/dirindex.html"},{"key":"e_1_3_2_1_4_1","unstructured":"2020. PostgreSQL configuration manual page. https:\/\/www.postgresql.org\/docs\/11\/bookindex.html  2020. PostgreSQL configuration manual page. https:\/\/www.postgresql.org\/docs\/11\/bookindex.html"},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Squid configuration manual page. http:\/\/www.squid-cache.org\/Doc\/config\/  2020. Squid configuration manual page. http:\/\/www.squid-cache.org\/Doc\/config\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2020. VSFTPD configuration manual page. https:\/\/security.appspot.com\/vsftpd.html  2020. VSFTPD configuration manual page. https:\/\/security.appspot.com\/vsftpd.html"},{"key":"e_1_3_2_1_7_1","first-page":"30","volume-title":"Proceedings of 2016 USENIX Annual Technical Conference (ATC\u201916)","author":"Amvrosiadis George","year":"2016","unstructured":"George Amvrosiadis and Medha Bhadkamkar . 2016 . Getting Back Up: Understanding How Enterprise Data Backups Fail . In Proceedings of 2016 USENIX Annual Technical Conference (ATC\u201916) . Denver, CO. isbn:978-1-93 1971- 30 - 30 George Amvrosiadis and Medha Bhadkamkar. 2016. Getting Back Up: Understanding How Enterprise Data Backups Fail. In Proceedings of 2016 USENIX Annual Technical Conference (ATC\u201916). Denver, CO. isbn:978-1-931971-30-0"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698919"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201912)","author":"Attariyan Mona","year":"2012","unstructured":"Mona Attariyan , Michael Chow , and Jason Flinn . 2012 . X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201912) . Hollywood, CA, USA. https:\/\/doi.org\/10.5555\/2387880.2387910 Mona Attariyan, Michael Chow, and Jason Flinn. 2012. X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201912). Hollywood, CA, USA. https:\/\/doi.org\/10.5555\/2387880.2387910"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1404014.1404037"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924960"},{"key":"e_1_3_2_1_12_1","unstructured":"Augeas. 2018. Augeas - a configuration API.. http:\/\/augeas.net\/  Augeas. 2018. Augeas - a configuration API.. http:\/\/augeas.net\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00874ED3V01Y201809CAC046"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154448.3154453"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987583"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741963"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330197"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1416944.1416946"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"e_1_3_2_1_22_1","volume-title":"What Takes Us Down? USENIX ;login:, 37, 5","author":"Kendrick Stuart","year":"2012","unstructured":"Stuart Kendrick . 2012. What Takes Us Down? USENIX ;login:, 37, 5 ( 2012 ), Oct., 37\u201345. https:\/\/www.usenix.org\/publications\/login\/october-2012-volume-37-number-5\/what-takes-us-down Stuart Kendrick. 2012. What Takes Us Down? USENIX ;login:, 37, 5 (2012), Oct., 37\u201345. https:\/\/www.usenix.org\/publications\/login\/october-2012-volume-37-number-5\/what-takes-us-down"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2865962"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084226.3084244"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834419"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2838344.2839461"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_31_1","volume-title":"Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl.","author":"Miller Barton P.","year":"1995","unstructured":"Barton P. Miller , David Koski , Cjin Pheow Lee , Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl. 1995 . Fuzz Revisited : A Re-examination of the Reliability of UNIX Utilities and Services. University of Wisconsin-Madison, Computer Sciences Department . Barton P. Miller, David Koski, Cjin Pheow Lee, Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl. 1995. Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services. University of Wisconsin-Madison, Computer Sciences Department."},{"key":"e_1_3_2_1_32_1","unstructured":"MySQL Parameter. 2019. MySQL parameter from Innodb and myisam. https:\/\/dev.mysql.com\/doc\/refman\/5.5\/en\/innodb-parameters.html  MySQL Parameter. 2019. MySQL parameter from Innodb and myisam. https:\/\/dev.mysql.com\/doc\/refman\/5.5\/en\/innodb-parameters.html"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201904)","author":"Nagaraja Kiran","unstructured":"Kiran Nagaraja , F\u00e1bio Oliveira , Ricardo Bianchini , Richard P. Martin , and Thu D. Nguyen . 2004. Understanding and Dealing with Operator Mistakes in Internet Services . In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201904) . San Francisco, CA, USA. https:\/\/doi.org\/10.5555\/1251254.1251259 Kiran Nagaraja, F\u00e1bio Oliveira, Ricardo Bianchini, Richard P. Martin, and Thu D. Nguyen. 2004. Understanding and Dealing with Operator Mistakes in Internet Services. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201904). San Francisco, CA, USA. https:\/\/doi.org\/10.5555\/1251254.1251259"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167289"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS\u201903)","author":"Oppenheimer David","unstructured":"David Oppenheimer , Archana Ganapathi , and David A. Patterson . 2003. Why Do Internet Services Fail, and What Can Be Done About It? In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS\u201903) . Seattle, WA, USA. https:\/\/doi.org\/10.5555\/1251460.1251461 David Oppenheimer, Archana Ganapathi, and David A. Patterson. 2003. Why Do Internet Services Fail, and What Can Be Done About It? In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS\u201903). Seattle, WA, USA. https:\/\/doi.org\/10.5555\/1251460.1251461"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360600"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824079"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.73"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133888"},{"key":"e_1_3_2_1_44_1","volume-title":"Probabilistic Automated Language Learning for Configuration Files. In 28th International Conference on Computer Aided Verification (CAV\u201916)","author":"Santolucito Mark","year":"2016","unstructured":"Mark Santolucito , Ennan Zhai , and Ruzica Piskac . 2016 . Probabilistic Automated Language Learning for Configuration Files. In 28th International Conference on Computer Aided Verification (CAV\u201916) . Toronto, Canada. https:\/\/doi.org\/10.1007\/978-3-319-41540-65 Mark Santolucito, Ennan Zhai, and Ruzica Piskac. 2016. Probabilistic Automated Language Learning for Configuration Files. In 28th International Conference on Computer Aided Verification (CAV\u201916). Toronto, Canada. https:\/\/doi.org\/10.1007\/978-3-319-41540-65"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815401"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00019"},{"key":"e_1_3_2_1_48_1","volume-title":"Coskun","author":"Tuncer Ozan","year":"2018","unstructured":"Ozan Tuncer , Nilton Bila , Canturk Isci , and Ayse K . Coskun . 2018 . ConfEx: An Analytics Framework for Text-Based Software Configurations in the Cloud. IBM Research . Ozan Tuncer, Nilton Bila, Canturk Isci, and Ayse K. Coskun. 2018. ConfEx: An Analytics Framework for Text-Based Software Configurations in the Cloud. IBM Research."},{"key":"e_1_3_2_1_49_1","unstructured":"Whoosh. 2018. Whoosh 2.7.4 documentation.. https:\/\/whoosh.readthedocs.io\/en\/latest  Whoosh. 2018. Whoosh 2.7.4 documentation.. https:\/\/whoosh.readthedocs.io\/en\/latest"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026925"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025999"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950369"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644865.2541983"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771817"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2016.35"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.60"}],"event":{"name":"ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Denmark","acronym":"ISSTA '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464799","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460319.3464799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:31Z","timestamp":1750193311000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464799"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,11]]},"references-count":57,"alternative-id":["10.1145\/3460319.3464799","10.1145\/3460319"],"URL":"https:\/\/doi.org\/10.1145\/3460319.3464799","relation":{},"subject":[],"published":{"date-parts":[[2021,7,11]]},"assertion":[{"value":"2021-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}