{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T14:32:25Z","timestamp":1754145145936,"version":"3.41.2"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"ISSTA","funder":[{"name":"Guangdong Basic and Applied Basic Re-search Foundation","award":["No. 2024A1515030022"],"award-info":[{"award-number":["No. 2024A1515030022"]}]},{"name":"the FundamentalResearch Funds for the Central Universities","award":["No.2024ZYGXZR097"],"award-info":[{"award-number":["No.2024ZYGXZR097"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. ACM Softw. Eng."],"published-print":{"date-parts":[[2025,6,22]]},"abstract":"<jats:p>In Software Product Lines (SPLs), localizing buggy feature interactions helps developers identify the root cause of test failures, thereby reducing their workload. This task is challenging because the number of potential interactions grows exponentially with the number of features, resulting in a vast search space, especially for large SPLs. Previous approaches have partially addressed this issue by constructing and examining potential feature interactions based on suspicious feature selections (e.g., those present in failed configurations but not in passed ones). However, these approaches often overlook the causal relationship between buggy feature interaction and test failures, resulting in an excessive search space and high-cost fault localization. To address this, we propose a low-cost Counterfactual Reasoning-Based Fault Localization (CRFL) approach for SPLs, which enhances fault localization efficiency by reducing both the search space and redundant computations. Specifically, CRFL employs counterfactual reasoning to infer suspicious feature selections and utilizes symmetric uncertainty to filter out irrelevant feature interactions. Additionally, CRFL incorporates two findings to prevent the repeated generation and examination of the same feature interactions. We evaluate the performance of our approach using eight publicly available SPL systems. To enable comparisons on larger real-world SPLs, we generate multiple buggy mutants for both BerkeleyDB and TankWar. Experimental results show that our approach reduces the search space by 51%\u223c73% for small SPLs (with 6\u223c9 features) and by 71%\u223c88% for larger SPLs (with 13\u223c99 features). The average runtime of our approach is approximately 15.6 times faster than that of a state-of-the-art method. Furthermore, when combined with statement-level localization techniques, CRFL can efficiently localize buggy statements, demonstrating its ability to accurately identify buggy feature interactions.<\/jats:p>","DOI":"10.1145\/3728917","type":"journal-article","created":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T10:52:56Z","timestamp":1750589576000},"page":"940-962","source":"Crossref","is-referenced-by-count":0,"title":["A Low-Cost Feature Interaction Fault Localization Approach for Software Product Lines"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5281-6090","authenticated-orcid":false,"given":"Haining","family":"Wang","sequence":"first","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2118-4825","authenticated-orcid":false,"given":"Yi","family":"Xiang","sequence":"additional","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1617-4147","authenticated-orcid":false,"given":"Han","family":"Huang","sequence":"additional","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7435-6080","authenticated-orcid":false,"given":"Jie","family":"Cao","sequence":"additional","affiliation":[{"name":"iSOFT INFRASTRUCTURE SOFTWARE CO., LTD., Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3368-0723","authenticated-orcid":false,"given":"Kaichen","family":"Chen","sequence":"additional","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1512-487X","authenticated-orcid":false,"given":"Xiaowei","family":"Yang","sequence":"additional","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,22]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Raja Ben Abdessalem Annibale Panichella and Shiva Nejati. 2018. Testing autonomous cars for feature interaction failures using many-objective search. In ASE\u201918. 143\u2013154. https:\/\/doi.org\/10.1145\/3238147.3238192 10.1145\/3238147.3238192","DOI":"10.1145\/3238147.3238192"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Rui Abreu Peter Zoeteweij and Arjan JC Van Gemund. 2009. Spectrum-based multiple fault localization. In ASE\u201909. 88\u201399. https:\/\/doi.org\/10.1109\/ASE.2009.25 10.1109\/ASE.2009.25","DOI":"10.1109\/ASE.2009.25"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Mustafa Al-Hajjaji Jens Meinicke and Sebastian Krieter. 2016. Tool demo: testing configurable systems with featureIDE. In GPCE\u201916. 173\u2013177. https:\/\/doi.org\/10.1145\/2993236.2993254 10.1145\/2993236.2993254","DOI":"10.1145\/2993236.2993254"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.03.014"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070523"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Sven Apel Sergiy Kolesnikov and Norbert Siegmund. 2013. Exploring feature interactions in the wild: the new feature-interaction challenge. In FOSD\u201913. 1\u20138. https:\/\/doi.org\/10.1145\/2528265.2528267 10.1145\/2528265.2528267","DOI":"10.1145\/2528265.2528267"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Sven Apel Hendrik Speidel and Philipp Wendler. 2011. Detection of feature interactions using feature-aware verification. In ASE\u201911. 372\u2013375. https:\/\/doi.org\/10.1109\/ASE.2011.6100075 10.1109\/ASE.2011.6100075","DOI":"10.1109\/ASE.2011.6100075"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.03.008"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","unstructured":"George K Baah Andy Podgurski and Mary Jean Harrold. 2010. Causal inference for statistical fault localization. In ISSTA\u201910. 73\u201384. https:\/\/doi.org\/10.1145\/1831708.1831717 10.1145\/1831708.1831717","DOI":"10.1145\/1831708.1831717"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09845-4"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Thorsten Berger Daniela Lettner and Julia Rubin. 2015. What is a feature? a qualitative study of features in industrial software product lines. In SPLC\u201915. 16\u201325.","DOI":"10.1145\/2791060.2791108"},{"key":"e_1_2_1_13_1","article-title":"Counterfactual Reasoning and Learning Systems: The Example of Computational Advertising","volume":"14","author":"Bottou L\u00e9on","year":"2013","unstructured":"L\u00e9on Bottou, Jonas Peters, Joaquin Qui\u00f1onero-Candela, and Denis X Charles. 2013. Counterfactual Reasoning and Learning Systems: The Example of Computational Advertising.. J. Mach. Learn. Res., 14, 11 (2013).","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00352-3"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/35.229532","article-title":"Feature interactions in telecommunications systems","volume":"31","author":"Jane Cameron E","year":"1993","unstructured":"E Jane Cameron and Hugo Velthuijsen. 1993. Feature interactions in telecommunications systems. IEEE Commun. Mag., 31, 8 (1993), 18\u201323.","journal-title":"IEEE Commun. Mag."},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Pei Cao and Zhe Wang. 2004. Efficient top-k query calculation in distributed networks. In PODC\u201904. 206\u2013215.","DOI":"10.1145\/1011767.1011798"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","unstructured":"J\u00fcrgen Cito Isil Dillig and Vijayaraghavan Murali. 2022. Counterfactual explanations for models of code. In ICSE-SEIP\u201922. 125\u2013134. https:\/\/doi.org\/10.1145\/3510457.3513081 10.1145\/3510457.3513081","DOI":"10.1145\/3510457.3513081"},{"volume-title":"Software product lines","author":"Clements Paul","key":"e_1_2_1_18_1","unstructured":"Paul Clements and Linda Northrop. 2002. Software product lines. Addison-Wesley Boston."},{"key":"e_1_2_1_19_1","volume-title":"Feature selection for classification. Intelligent data analysis, 1, 1-4","author":"Dash Manoranjan","year":"1997","unstructured":"Manoranjan Dash and Huan Liu. 1997. Feature selection for classification. Intelligent data analysis, 1, 1-4 (1997), 131\u2013156."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Clemens Dubslaff Kallistos Weis and Christel Baier. 2022. Causality in configurable software systems. In ICSE\u201922. 325\u2013337. https:\/\/doi.org\/10.1145\/3510003.3510200 10.1145\/3510003.3510200","DOI":"10.1145\/3510003.3510200"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611667"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Shuzheng Gao Cuiyun Gao and Chaozheng Wang. 2023. Two sides of the same coin: Exploiting the impact of identifiers in neural code comprehension. In ICSE\u201923. 1933\u20131945. https:\/\/doi.org\/10.1109\/ICSE48619.2023.00164 10.1109\/ICSE48619.2023.00164","DOI":"10.1109\/ICSE48619.2023.00164"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Brady J Garvin and Myra B Cohen. 2011. Feature interaction faults revisited: An exploratory study. In ISSRE\u201911. 90\u201399.","DOI":"10.1109\/ISSRE.2011.25"},{"key":"e_1_2_1_24_1","article-title":"Causes and explanations: A structural-model approach. Part I: Causes. Br","author":"Halpern Joseph Y","year":"2005","unstructured":"Joseph Y Halpern and Judea Pearl. 2005. Causes and explanations: A structural-model approach. Part I: Causes. Br. J. Philos. Sci..","journal-title":"J. Philos. Sci.."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","unstructured":"Xue Han and Tingting Yu. 2016. An empirical study on performance bugs for highly configurable software systems. In ESEM\u201916. 1\u201310. https:\/\/doi.org\/10.1145\/2961111.2962602 10.1145\/2961111.2962602","DOI":"10.1145\/2961111.2962602"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2023.3280810"},{"key":"e_1_2_1_27_1","volume-title":"CADET: Debugging and fixing misconfigurations using counterfactual reasoning. arXiv preprint arXiv:2010.06061.","author":"Iqbal Md Shahriar","year":"2021","unstructured":"Md Shahriar Iqbal, Rahul Krishna, and Mohammad Ali Javidian. 2021. CADET: Debugging and fixing misconfigurations using counterfactual reasoning. arXiv preprint arXiv:2010.06061."},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Md Shahriar Iqbal Rahul Krishna and Mohammad Ali Javidian. 2022. Unicorn: reasoning about configurable system performance through the lens of causality. In EuroSys\u201922. 199\u2013217.","DOI":"10.1145\/3492321.3519575"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380377"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","unstructured":"Fabian Keller Lars Grunske and Simon Heiden. 2017. A critical evaluation of spectrum-based fault localization techniques on a large-scale software system. In QRS\u201917. 114\u2013125. https:\/\/doi.org\/10.1109\/QRS.2017.22 10.1109\/QRS.2017.22","DOI":"10.1109\/QRS.2017.22"},{"key":"e_1_2_1_31_1","unstructured":"Sergiy Kolesnikov Norbert Siegmund and Christian K\u00e4stner. 2017. On the relation of external and internal feature interactions: A case study. arXiv preprint arXiv:1712.07440."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.24"},{"key":"e_1_2_1_33_1","unstructured":"Xiangyu Li and Alessandro Orso. 2020. More accurate dynamic slicing for better supporting software debugging. In ICST\u201920. 28\u201338."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9146-7"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","unstructured":"Bryan J Muscedere Robert Hackman and Davood Anbarnam. 2019. Detecting feature-interaction symptoms in automotive software using lightweight analysis. In SANER\u201919. 175\u2013185. https:\/\/doi.org\/10.1109\/SANER.2019.8668042 10.1109\/SANER.2019.8668042","DOI":"10.1109\/SANER.2019.8668042"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Kien-Tuan Ngo Thu-Trang Nguyen and Son Nguyen. 2021. Variability fault localization: a benchmark. In SPLC\u201921. 120\u2013125. https:\/\/doi.org\/10.1145\/3461001.3473058 10.1145\/3461001.3473058","DOI":"10.1145\/3461001.3473058"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","unstructured":"Son Nguyen. 2019. Configuration-dependent fault localization. In ICSE-Companion\u201919. 156\u2013158. https:\/\/doi.org\/10.1109\/ICSE-Companion.2019.00065 10.1109\/ICSE-Companion.2019.00065","DOI":"10.1109\/ICSE-Companion.2019.00065"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3113859"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107080"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","unstructured":"Adrian Nistor Tian Jiang and Lin Tan. 2013. Discovering reporting and fixing performance bugs. In MSR\u201913. 237\u2013246. https:\/\/doi.org\/10.1109\/MSR.2013.6624035 10.1109\/MSR.2013.6624035","DOI":"10.1109\/MSR.2013.6624035"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","unstructured":"Spencer Pearson Jos\u00e9 Campos and Ren\u00e9 Just. 2017. Evaluating and improving fault localization. In ICSE\u201917. 609\u2013620. https:\/\/doi.org\/10.1109\/ICSE.2017.62 10.1109\/ICSE.2017.62","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0197-y"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.136"},{"key":"e_1_2_1_45_1","volume-title":"ECOOP","author":"Robak Silva","year":"2001","unstructured":"Silva Robak and Bogdan Franczyk. 2001. Feature interaction and composition problems in software product lines. In ECOOP 2001."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2024.107522"},{"key":"e_1_2_1_47_1","doi-asserted-by":"crossref","first-page":"1323","DOI":"10.1109\/TSE.2022.3175752","article-title":"Annotative Software Product Line Analysis Using Variability-Aware Datalog","volume":"49","author":"Shahin Ramy","year":"2022","unstructured":"Ramy Shahin, Murad Akhundov, and Marsha Chechik. 2022. Annotative Software Product Line Analysis Using Variability-Aware Datalog. IEEE Trans. Softw. Eng., 49, 3 (2022), 1323\u20131341.","journal-title":"IEEE Trans. Softw. Eng."},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Tanuja Shailesh Ashalatha Nayak and Devi Prasad. 2018. Performance Prediction of Configurable softwares using Machine learning approach. In iCATccT\u201918. 7\u201310.","DOI":"10.1109\/iCATccT44854.2018.9001957"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","unstructured":"Norbert Siegmund Alexander Grebhahn and Sven Apel. 2015. Performance-influence models for highly configurable systems. In FSE\u201915. 284\u2013294. https:\/\/doi.org\/10.1109\/iCATccT44854.2018.9001957 10.1109\/iCATccT44854.2018.9001957","DOI":"10.1109\/iCATccT44854.2018.9001957"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.01.016"},{"key":"e_1_2_1_51_1","article-title":"Surrogate sample-assisted particle swarm optimization for feature selection on high-dimensional data","author":"Song Xianfang","year":"2022","unstructured":"Xianfang Song, Yong Zhang, and Dunwei Gong. 2022. Surrogate sample-assisted particle swarm optimization for feature selection on high-dimensional data. IEEE Trans. Evol. Comput..","journal-title":"IEEE Trans. Evol. Comput.."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3061152"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3646548.3672590"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","unstructured":"Pablo Valle Aitor Arrieta and Maite Arratibel. 2023. Automated Misconfiguration Repair of Configurable Cyber-Physical Systems with Search: an Industrial Case Study on Elevator Dispatching Algorithms. arXiv preprint arXiv:2301.01487 https:\/\/doi.org\/10.1109\/ICSE-SEIP58684.2023.00042 10.1109\/ICSE-SEIP58684.2023.00042","DOI":"10.1109\/ICSE-SEIP58684.2023.00042"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","unstructured":"Miguel Velez Pooyan Jamshidi and Norbert Siegmund. 2021. White-box analysis over machine learning: Modeling performance of configurable systems. In ICSE\u201921. 1072\u20131084. https:\/\/doi.org\/10.1109\/ICSE43902.2021.00100 10.1109\/ICSE43902.2021.00100","DOI":"10.1109\/ICSE43902.2021.00100"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","unstructured":"Alexander Von Rhein Alexander Grebhahn and Sven Apel. 2015. Presence-condition simplification in highly configurable systems. In ICSE\u201915. 1 178\u2013188. https:\/\/doi.org\/10.1109\/ICSE.2015.39 10.1109\/ICSE.2015.39","DOI":"10.1109\/ICSE.2015.39"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","unstructured":"Tianxin Wei Fuli Feng and Jiawei Chen. 2021. Model-agnostic counterfactual reasoning for eliminating popularity bias in recommender system. 1791\u20131800. https:\/\/doi.org\/10.1145\/3447548.3467289 10.1145\/3447548.3467289","DOI":"10.1145\/3447548.3467289"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3695490"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","unstructured":"Eric Wong Tingting Wei and Yu Qi. 2008. A crosstab-based statistical method for effective fault localization. In ICST\u201908. 42\u201351. https:\/\/doi.org\/10.1109\/ICST.2008.65 10.1109\/ICST.2008.65","DOI":"10.1109\/ICST.2008.65"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","unstructured":"Yi Xiang Han Huang and Yuren Zhou. 2022. Search-based diverse sampling from real-world software product lines. In ICSE\u201922. 1945\u20131957. https:\/\/doi.org\/10.1145\/3510003.3510053 10.1145\/3510003.3510053","DOI":"10.1145\/3510003.3510053"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3308755"}],"container-title":["Proceedings of the ACM on Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3728917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T16:54:57Z","timestamp":1752684897000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728917"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":61,"journal-issue":{"issue":"ISSTA","published-print":{"date-parts":[[2025,6,22]]}},"alternative-id":["10.1145\/3728917"],"URL":"https:\/\/doi.org\/10.1145\/3728917","relation":{},"ISSN":["2994-970X"],"issn-type":[{"type":"electronic","value":"2994-970X"}],"subject":[],"published":{"date-parts":[[2025,6,22]]}}}