{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:10:46Z","timestamp":1773375046193,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Natural Science Foundation of China","award":["62202511"],"award-info":[{"award-number":["62202511"]}]},{"name":"the Guangdong Basic and Applied Basic Research Foundation","award":["2022A1515011713"],"award-info":[{"award-number":["2022A1515011713"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3650212.3652106","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:44:25Z","timestamp":1726055065000},"page":"13-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1317-8957","authenticated-orcid":false,"given":"Shiwen","family":"Shan","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, Zhuhai City, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8798-5667","authenticated-orcid":false,"given":"Yintong","family":"Huo","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3338-8561","authenticated-orcid":false,"given":"Yuxin","family":"Su","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Zhuhai City, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8370-644X","authenticated-orcid":false,"given":"Yichen","family":"Li","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3787-1673","authenticated-orcid":false,"given":"Dan","family":"Li","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Zhuhai City, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7878-4330","authenticated-orcid":false,"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Zhuhai City, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10)","author":"Attariyan Mona","year":"2010","unstructured":"Mona Attariyan and Jason Flinn. 2010. Automating configuration troubleshooting with dynamic information flow analysis. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Yinfang Chen Huaibing Xie Minghua Ma Yu Kang Xin Gao Liu Shi Yunjie Cao Xuedong Gao Hao Fan and Ming Wen. 2023. Empowering Practical Root Cause Analysis by Large Language Models for Cloud Incidents. arXiv preprint arXiv:2305.15778.","DOI":"10.1145\/3627703.3629553"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.67"},{"key":"e_1_3_2_1_4_1","volume-title":"2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE). 185\u2013195","author":"Dong Zhen","year":"2016","unstructured":"Zhen Dong, Artur Andrzejak, David Lo, and Diego Costa. 2016. Orplocator: Identifying read points of configuration options via static analysis. In 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE). 185\u2013195."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"e_1_3_2_1_7_1","unstructured":"GPT-4. 2023. gpt-4. https:\/\/openai.com\/gpt-4 Accessed: 2023-11-23"},{"key":"e_1_3_2_1_8_1","unstructured":"Apache Hadoop. 2023. Apache Hadoop. https:\/\/hadoop.apache.org\/ Accessed: 2023-11-23"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_10_1","volume-title":"A survey on automated log analysis for reliability engineering. ACM computing surveys (CSUR), 54, 6","author":"He Shilin","year":"2021","unstructured":"Shilin He, Pinjia He, Zhuangbin Chen, Tianyi Yang, Yuxin Su, and Michael R Lyu. 2021. A survey on automated log analysis for reliability engineering. ACM computing surveys (CSUR), 54, 6 (2021), 1\u201337."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2010.5452747"},{"key":"e_1_3_2_1_13_1","volume-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE). 391\u2013402","author":"Huo Yintong","year":"2023","unstructured":"Yintong Huo, Cheryl Lee, Yuxin Su, Shiwen Shan, Jinyang Liu, and Michael R Lyu. 2023. EvLog: Identifying Anomalous Logs over Software Evolution. In 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE). 391\u2013402."},{"key":"e_1_3_2_1_14_1","volume-title":"2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 497\u2013509","author":"Huo Yintong","year":"2023","unstructured":"Yintong Huo, Yichen Li, Yuxin Su, Pinjia He, Zifan Xie, and Michael R Lyu. 2023. Autolog: A log sequence synthesis framework for anomaly detection. In 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 497\u2013509."},{"key":"e_1_3_2_1_15_1","volume-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). 881\u2013893","author":"Huo Yintong","year":"2023","unstructured":"Yintong Huo, Yuxin Su, Cheryl Lee, and Michael R Lyu. 2023. Semparser: A semantic parser for log analytics. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). 881\u2013893."},{"key":"e_1_3_2_1_16_1","volume-title":"LogVm: Variable Semantics Miner for Log Messages. In 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). 124\u2013125","author":"Huo Yintong","year":"2022","unstructured":"Yintong Huo, Yuxin Su, and Michael Lyu. 2022. LogVm: Variable Semantics Miner for Log Messages. In 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). 124\u2013125."},{"key":"e_1_3_2_1_17_1","unstructured":"Zhihan Jiang Jinyang Liu Zhuangbin Chen Yichen Li Junjie Huang Yintong Huo Pinjia He Jiazhen Gu and Michael R Lyu. 2023. LLMParser: A LLM-based Log Parsing Framework. arXiv preprint arXiv:2310.01796."},{"key":"e_1_3_2_1_18_1","unstructured":"Jira. 2023. Jira. https:\/\/www.atlassian.com\/software\/jira Accessed: 2023-11-23"},{"key":"e_1_3_2_1_19_1","unstructured":"Sungmin Kang Gabin An and Shin Yoo. 2023. A Preliminary Evaluation of LLM-Based Fault Localization. arXiv preprint arXiv:2308.05487."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678773"},{"key":"e_1_3_2_1_22_1","volume-title":"2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 1699\u20131704","author":"Le Van-Hoang","year":"2023","unstructured":"Van-Hoang Le and Hongyu Zhang. 2023. Log Parsing: How Far Can ChatGPT Go? In 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 1699\u20131704."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering. 1\u201312","author":"Li Junqiang","year":"2024","unstructured":"Junqiang Li, Senyi Li, Keyao Li, Falin Luo, Hongfang Yu, Shanshan Li, and Xiang Li. 2024. ECFuzz: Effective Configuration Fuzzing for Large-Scale Systems. In Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering. 1\u201312."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464799"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00018"},{"key":"e_1_3_2_1_26_1","unstructured":"Yichen Li Yintong Huo Zhihan Jiang Renyi Zhong Pinjia He Yuxin Su and Michael R Lyu. 2023. Exploring the effectiveness of llms in automated logging generation: An empirical study. arXiv preprint arXiv:2307.05950."},{"key":"e_1_3_2_1_27_1","volume-title":"Go Static: Contextualized Logging Statement Generation. arXiv preprint arXiv:2402.12958.","author":"Li Yichen","year":"2024","unstructured":"Yichen Li, Yintong Huo, Renyi Zhong, Zhihan Jiang, Jinyang Liu, Junjie Huang, Jiazhen Gu, Pinjia He, and Michael R Lyu. 2024. Go Static: Contextualized Logging Statement Generation. arXiv preprint arXiv:2402.12958."},{"key":"e_1_3_2_1_28_1","volume-title":"CRSExtractor: Automated configuration option read sites extraction towards IoT cloud infrastructure. Heliyon, 9, 4","author":"Liu Yuhao","year":"2023","unstructured":"Yuhao Liu, Wei Wang, Yan Jia, Sihan Xu, and Zheli Liu. 2023. CRSExtractor: Automated configuration option read sites extraction towards IoT cloud infrastructure. Heliyon, 9, 4 (2023)."},{"key":"e_1_3_2_1_29_1","unstructured":"Stack Overflow. 2023. Stack Overflow. https:\/\/stackoverflow.com\/ Accessed: 2023-11-23"},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/owasp.org\/Top10\/A05_2021-Security_Misconfiguration\/ Accessed","author":"Security Misconfiguration OWASP.","year":"2023","unstructured":"OWASP. 2021. A05:2021 \u2013 Security Misconfiguration. https:\/\/owasp.org\/Top10\/A05_2021-Security_Misconfiguration\/ Accessed: November 23, 2023"},{"key":"e_1_3_2_1_31_1","volume-title":"OWASP Top 10 Vulnerabilities","author":"OWASP.","year":"2022","unstructured":"OWASP. 2022. OWASP Top 10 Vulnerabilities in 2022. https:\/\/www.spiceworks.com\/it-security\/vulnerability-management\/articles\/owasp-top-ten-vulnerabilities\/##_001 Accessed: November 23, 2023"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3339002"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Yun Peng Chaozheng Wang Wenxuan Wang Cuiyun Gao and Michael R Lyu. 2023. Generative Type Inference for Python. arXiv preprint arXiv:2307.09163.","DOI":"10.1109\/ASE56229.2023.00031"},{"key":"e_1_3_2_1_34_1","unstructured":"The Open Web Application Security Project. 2023. The Open Web Application Security Project. https:\/\/owasp.org\/ Accessed: 2023-11-23"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"e_1_3_2_1_36_1","volume-title":"Misconfiguration Brings Down Entire .SE Domain in Sweden. https:\/\/circleid.com\/posts\/misconfiguration_brings_down_entire_se_domain_in_sweden\/ Accessed","author":"Reporter ID","year":"2023","unstructured":"CircleID Reporter. 2009. Misconfiguration Brings Down Entire .SE Domain in Sweden. https:\/\/circleid.com\/posts\/misconfiguration_brings_down_entire_se_domain_in_sweden\/ Accessed: November 23, 2023"},{"key":"e_1_3_2_1_37_1","volume-title":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). 1\u201312","author":"Wang Teng","year":"2018","unstructured":"Teng Wang, Xiaodong Liu, Shanshan Li, Xiangke Liao, Wang Li, and Qing Liao. 2018. MisconfDoctor: diagnosing misconfiguration via log-based configuration testing. In 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). 1\u201312."},{"key":"e_1_3_2_1_38_1","volume-title":"Michael Pradel, and Lingming Zhang.","author":"Xia Chunqiu Steven","year":"2023","unstructured":"Chunqiu Steven Xia, Matteo Paltenghi, Jia Le Tian, Michael Pradel, and Lingming Zhang. 2023. Universal fuzzing via large language models. arXiv preprint arXiv:2308.04748."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.17"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2015.38"},{"key":"e_1_3_2_1_41_1","article-title":"Real-Time Diagnosis of Configuration Errors for Software of AI Server Infrastructure","author":"Xu Guangquan","year":"2023","unstructured":"Guangquan Xu, Xinru Ding, Sihan Xu, Yan Jia, Shaoying Liu, Shicheng Feng, and Xi Zheng. 2023. Real-Time Diagnosis of Configuration Errors for Software of AI Server Infrastructure. IEEE Transactions on Dependable and Secure Computing.","journal-title":"IEEE Transactions on Dependable and Secure Computing."},{"key":"e_1_3_2_1_42_1","volume-title":"2024 IEEE\/ACM 46th International Conference on Software Engineering (ICSE). 129\u2013140","author":"Xu Junjielong","year":"2023","unstructured":"Junjielong Xu, Ziang Cui, Yuan Zhao, Xu Zhang, Shilin He, Pinjia He, Liqun Li, Yu Kang, Qingwei Lin, and Yingnong Dang. 2023. UniLog: Automatic Logging via LLM and In-Context Learning. In 2024 IEEE\/ACM 46th International Conference on Software Engineering (ICSE). 129\u2013140."},{"key":"e_1_3_2_1_43_1","volume-title":"DivLog: Log Parsing with Prompt Enhanced In-Context Learning. In 2024 IEEE\/ACM 46th International Conference on Software Engineering (ICSE). 983\u2013983","author":"Xu Junjielong","year":"2024","unstructured":"Junjielong Xu, Ruichun Yang, Yintong Huo, Chengyu Zhang, and Pinjia He. 2024. DivLog: Log Parsing with Prompt Enhanced In-Context Learning. In 2024 IEEE\/ACM 46th International Conference on Software Engineering (ICSE). 983\u2013983."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786852"},{"key":"e_1_3_2_1_45_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Xu Tianyin","year":"2016","unstructured":"Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, and Shankar Pasupathy. 2016. Early detection of configuration errors to reduce failure damage. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 619\u2013634."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791577"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953981"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616355"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217972"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110360"},{"key":"e_1_3_2_1_54_1","volume-title":"2013 35th International Conference on Software Engineering (ICSE). 312\u2013321","author":"Zhang Sai","year":"2013","unstructured":"Sai Zhang and Michael D Ernst. 2013. Automated diagnosis of software configuration errors. In 2013 35th International Conference on Software Engineering (ICSE). 312\u2013321."},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 36th international conference on software engineering. 152\u2013163","author":"Zhang Sai","year":"2014","unstructured":"Sai Zhang and Michael D Ernst. 2014. Which configuration option should I change? In Proceedings of the 36th international conference on software engineering. 152\u2013163."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771817"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_1_58_1","first-page":"1","article-title":"Fuzzing configurations of program options","volume":"32","author":"Zhang Zenong","year":"2023","unstructured":"Zenong Zhang, George Klees, Eric Wang, Michael Hicks, and Shiyi Wei. 2023. Fuzzing configurations of program options. ACM Transactions on Software Engineering and Methodology, 32, 2 (2023), 1\u201321.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"e_1_3_2_1_59_1","volume-title":"2021 IEEE\/ACM 29th International Conference on Program Comprehension (ICPC). 94\u2013105","author":"Zhou Shulin","year":"2021","unstructured":"Shulin Zhou, Xiaodong Liu, Shanshan Li, Zhouyang Jia, Yuanliang Zhang, Teng Wang, Wang Li, and Xiangke Liao. 2021. Confinlog: Leveraging software logs to infer configuration constraints. In 2021 IEEE\/ACM 29th International Conference on Program Comprehension (ICPC). 94\u2013105."},{"key":"e_1_3_2_1_60_1","volume-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE). 355\u2013366","author":"Zhu Jieming","year":"2023","unstructured":"Jieming Zhu, Shilin He, Pinjia He, Jinyang Liu, and Michael R Lyu. 2023. Loghub: A large collection of system log datasets for ai-driven log analytics. In 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE). 355\u2013366."}],"event":{"name":"ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Vienna Austria","acronym":"ISSTA '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650212.3652106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:06Z","timestamp":1750287006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":60,"alternative-id":["10.1145\/3650212.3652106","10.1145\/3650212"],"URL":"https:\/\/doi.org\/10.1145\/3650212.3652106","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}