Skip to main content

Showing 1–41 of 41 results for author: Kästner, C

  1. arXiv:2410.12071  [pdf, ps, other

    cs.SE cs.LG

    Beyond the Comfort Zone: Emerging Solutions to Overcome Challenges in Integrating LLMs into Software Products

    Authors: Nadia Nahar, Christian Kästner, Jenna Butler, Chris Parnin, Thomas Zimmermann, Christian Bird

    Abstract: Large Language Models (LLMs) are increasingly embedded into software products across diverse industries, enhancing user experiences, but at the same time introducing numerous challenges for developers. Unique characteristics of LLMs force developers, who are accustomed to traditional software development and evaluation, out of their comfort zones as the LLM components shatter standard assumptions… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

    Comments: 10 pages, 2 tables

  2. arXiv:2409.09261  [pdf, other

    cs.SE cs.AI cs.CL cs.LG

    What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data Slicing

    Authors: Chenyang Yang, Yining Hong, Grace A. Lewis, Tongshuang Wu, Christian Kästner

    Abstract: Machine learning models make mistakes, yet sometimes it is difficult to identify the systematic problems behind the mistakes. Practitioners engage in various activities, including error analysis, testing, auditing, and red-teaming, to form hypotheses of what can go (or has gone) wrong with their models. To validate these hypotheses, practitioners employ data slicing to identify relevant examples.… ▽ More

    Submitted 13 September, 2024; originally announced September 2024.

  3. arXiv:2408.16529  [pdf, other

    cs.CR

    S3C2 Summit 2023-11: Industry Secure Supply Chain Summit

    Authors: Nusrat Zahan, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie Williams

    Abstract: Cyber attacks leveraging or targeting the software supply chain, such as the SolarWinds and the Log4j incidents, affected thousands of businesses and their customers, drawing attention from both industry and government stakeholders. To foster open dialogue, facilitate mutual sharing, and discuss shared challenges encountered by stakeholders in securing their software supply chain, researchers from… ▽ More

    Submitted 29 August, 2024; originally announced August 2024.

    Comments: 8 pages, 1 figure

  4. arXiv:2406.00127  [pdf, ps, other

    stat.ML cs.LG

    Training on the Edge of Stability Is Caused by Layerwise Jacobian Alignment

    Authors: Mark Lowell, Catharine Kastner

    Abstract: During neural network training, the sharpness of the Hessian matrix of the training loss rises until training is on the edge of stability. As a result, even nonstochastic gradient descent does not accurately model the underlying dynamical system defined by the gradient flow of the training loss. We use an exponential Euler solver to train the network without entering the edge of stability, so that… ▽ More

    Submitted 31 May, 2024; originally announced June 2024.

  5. arXiv:2405.08762  [pdf, other

    cs.CR

    S3C2 Summit 2024-03: Industry Secure Supply Chain Summit

    Authors: Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kastner, Alexandros Kapravelos, Dominik Wermke, Laurie Williams

    Abstract: Supply chain security has become a very important vector to consider when defending against adversary attacks. Due to this, more and more developers are keen on improving their supply chains to make them more robust against future threats. On March 7th, 2024 researchers from the Secure Software Supply Chain Center (S3C2) gathered 14 industry leaders, developers and consumers of the open source eco… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: This is our WIP paper on the Summit. More versions will be released soon

  6. arXiv:2311.11123  [pdf, other

    cs.SE cs.CL

    (Why) Is My Prompt Getting Worse? Rethinking Regression Testing for Evolving LLM APIs

    Authors: Wanqin Ma, Chenyang Yang, Christian Kästner

    Abstract: Large Language Models (LLMs) are increasingly integrated into software applications. Downstream application developers often access LLMs through APIs provided as a service. However, LLM APIs are often updated silently and scheduled to be deprecated, forcing users to continuously adapt to evolving models. This can cause performance regression and affect prompt design choices, as evidenced by our ca… ▽ More

    Submitted 6 February, 2024; v1 submitted 18 November, 2023; originally announced November 2023.

    Comments: conference version

  7. arXiv:2310.09668  [pdf, other

    cs.CL cs.SE

    Beyond Testers' Biases: Guiding Model Testing with Knowledge Bases using LLMs

    Authors: Chenyang Yang, Rishabh Rustogi, Rachel Brower-Sinning, Grace A. Lewis, Christian Kästner, Tongshuang Wu

    Abstract: Current model testing work has mostly focused on creating test cases. Identifying what to test is a step that is largely ignored and poorly supported. We propose Weaver, an interactive tool that supports requirements elicitation for guiding model testing. Weaver uses large language models to generate knowledge bases and recommends concepts from them interactively, allowing testers to elicit requir… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

  8. arXiv:2308.06850  [pdf, other

    cs.CR

    S3C2 Summit 2023-06: Government Secure Supply Chain Summit

    Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.16557, arXiv:2307.15642

  9. arXiv:2308.04328  [pdf, other

    cs.SE

    The Product Beyond the Model -- An Empirical Study of Repositories of Open-Source ML Products

    Authors: Nadia Nahar, Haoran Zhang, Grace Lewis, Shurui Zhou, Christian Kästner

    Abstract: Machine learning (ML) components are increasingly incorporated into software products for end-users, but developers face challenges in transitioning from ML prototypes to products. Academics have limited access to the source of commercial ML products, hindering research progress to address these challenges. In this study, first and foremost, we contribute a dataset of 262 open-source ML products f… ▽ More

    Submitted 15 August, 2024; v1 submitted 8 August, 2023; originally announced August 2023.

    Journal ref: 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE)

  10. arXiv:2307.16557  [pdf, other

    cs.CR

    S3C2 Summit 2023-02: Industry Secure Supply Chain Summit

    Authors: Trevor Dunlap, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kastner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.15642

  11. arXiv:2307.15642  [pdf, other

    cs.CR

    S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit

    Authors: Mindy Tran, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kastner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  12. arXiv:2304.00078  [pdf, other

    cs.SE cs.LG

    A Meta-Summary of Challenges in Building Products with ML Components -- Collecting Experiences from 4758+ Practitioners

    Authors: Nadia Nahar, Haoran Zhang, Grace Lewis, Shurui Zhou, Christian Kästner

    Abstract: Incorporating machine learning (ML) components into software products raises new software-engineering challenges and exacerbates existing challenges. Many researchers have invested significant effort in understanding the challenges of industry practitioners working on building products with ML components, through interviews and surveys with practitioners. With the intention to aggregate and presen… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: 15 pages, 2 figures, 3 tables, published in CAIN 2023

    Journal ref: 2023 IEEE/ACM 2nd International Conference on AI Engineering -- Software Engineering for AI (CAIN)

  13. arXiv:2303.01998  [pdf, other

    cs.SE cs.AI

    MLTEing Models: Negotiating, Evaluating, and Documenting Model and System Qualities

    Authors: Katherine R. Maffey, Kyle Dotterrer, Jennifer Niemann, Iain Cruickshank, Grace A. Lewis, Christian Kästner

    Abstract: Many organizations seek to ensure that machine learning (ML) and artificial intelligence (AI) systems work as intended in production but currently do not have a cohesive methodology in place to do so. To fill this gap, we propose MLTE (Machine Learning Test and Evaluation, colloquially referred to as "melt"), a framework and implementation to evaluate ML models and systems. The framework compiles… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: Accepted to the NIER Track of the 45th International Conference on Software Engineering (ICSE 2023)

  14. arXiv:2211.06409  [pdf, other

    cs.AI cs.SE

    Capabilities for Better ML Engineering

    Authors: Chenyang Yang, Rachel Brower-Sinning, Grace A. Lewis, Christian Kästner, Tongshuang Wu

    Abstract: In spite of machine learning's rapid growth, its engineering support is scattered in many forms, and tends to favor certain engineering stages, stakeholders, and evaluation preferences. We envision a capability-based framework, which uses fine-grained specifications for ML model behaviors to unite existing efforts towards better ML engineering. We use concrete scenarios (model design, debugging, a… ▽ More

    Submitted 10 February, 2023; v1 submitted 11 November, 2022; originally announced November 2022.

  15. arXiv:2209.03345  [pdf, other

    cs.SE

    Data Leakage in Notebooks: Static Detection and Better Processes

    Authors: Chenyang Yang, Rachel A Brower-Sinning, Grace A. Lewis, Christian Kästner

    Abstract: Data science pipelines to train and evaluate models with machine learning may contain bugs just like any other code. Leakage between training and test data can lead to overestimating the model's accuracy during offline evaluations, possibly leading to deployment of low-quality models in production. Such leakage can happen easily by mistake or by following poor practices, but may be tedious and cha… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  16. arXiv:2204.06425  [pdf, other

    cs.SE cs.HC cs.LG

    Aspirations and Practice of Model Documentation: Moving the Needle with Nudging and Traceability

    Authors: Avinash Bhat, Austin Coursey, Grace Hu, Sixian Li, Nadia Nahar, Shurui Zhou, Christian Kästner, Jin L. C. Guo

    Abstract: The documentation practice for machine-learned (ML) models often falls short of established practices for traditional software, which impedes model accountability and inadvertently abets inappropriate or misuse of models. Recently, model cards, a proposal for model documentation, have attracted notable attention, but their impact on the actual practice is unclear. In this work, we systematically s… ▽ More

    Submitted 8 February, 2023; v1 submitted 13 April, 2022; originally announced April 2022.

    Comments: To be published in proceedings of CHI 2023

  17. arXiv:2203.10356  [pdf, other

    cs.SE

    On Debugging the Performance of Configurable Software Systems: Developer Needs and Tailored Tool Support

    Authors: Miguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel, Christian Kästner

    Abstract: Determining whether a configurable software system has a performance bug or it was misconfigured is often challenging. While there are numerous debugging techniques that can support developers in this task, there is limited empirical evidence of how useful the techniques are to address the actual needs that developers have when debugging the performance of configurable software systems; most techn… ▽ More

    Submitted 19 March, 2022; originally announced March 2022.

  18. arXiv:2110.10234  [pdf, other

    cs.SE cs.LG

    Collaboration Challenges in Building ML-Enabled Systems: Communication, Documentation, Engineering, and Process

    Authors: Nadia Nahar, Shurui Zhou, Grace Lewis, Christian Kästner

    Abstract: The introduction of machine learning (ML) components in software projects has created the need for software engineers to collaborate with data scientists and other specialists. While collaboration can always be challenging, ML introduces additional challenges with its exploratory model development process, additional skills and knowledge needed, difficulties testing ML systems, need for continuous… ▽ More

    Submitted 10 February, 2022; v1 submitted 19 October, 2021; originally announced October 2021.

    Comments: 22 pages, 10 figures, 5 tables

  19. arXiv:2105.06449  [pdf, other

    cs.SE cs.LG

    Feature Interactions on Steroids: On the Composition of ML Models

    Authors: Christian Kästner, Eunsuk Kang, Sven Apel

    Abstract: The lack of specifications is a key difference between traditional software engineering and machine learning. We discuss how it drastically impacts how we think about divide-and-conquer approaches to system design, and how it impacts reuse, testing and debugging activities. Traditionally, specifications provide a cornerstone for compositional reasoning and for the divide-and-conquer strategy of ho… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

    ACM Class: D.2.1; D.2.2; I.2.6

  20. arXiv:2103.05769  [pdf, other

    cs.CR cs.SE

    Containing Malicious Package Updates in npm with a Lightweight Permission System

    Authors: Gabriel Ferreira, Limin Jia, Joshua Sunshine, Christian Kästner

    Abstract: The large amount of third-party packages available in fast-moving software ecosystems, such as Node.js/npm, enables attackers to compromise applications by pushing malicious updates to their package dependencies. Studying the npm repository, we observed that many packages in the npm repository that are used in Node.js applications perform only simple computations and do not need access to filesyst… ▽ More

    Submitted 7 March, 2021; originally announced March 2021.

    Comments: 13 pages

  21. arXiv:2101.05362  [pdf, other

    cs.SE

    White-Box Analysis over Machine Learning: Modeling Performance of Configurable Systems

    Authors: Miguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel, Christian Kästner

    Abstract: Performance-influence models can help stakeholders understand how and where configuration options and their interactions influence the performance of a system. With this understanding, stakeholders can debug performance behavior and make deliberate configuration decisions. Current black-box techniques to build such models combine various sampling and learning strategies, resulting in tradeoffs bet… ▽ More

    Submitted 13 January, 2021; originally announced January 2021.

    Comments: Accepted for publication at ICSE'21

  22. arXiv:2005.06091  [pdf, other

    cs.LG cs.SE

    Understanding the Nature of System-Related Issues in Machine Learning Frameworks: An Exploratory Study

    Authors: Yang Ren, Gregory Gay, Christian Kästner, Pooyan Jamshidi

    Abstract: Modern systems are built using development frameworks. These frameworks have a major impact on how the resulting system executes, how configurations are managed, how it is tested, and how and where it is deployed. Machine learning (ML) frameworks and the systems developed using them differ greatly from traditional frameworks. Naturally, the issues that manifest in such frameworks may differ as wel… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

    Comments: 12 pages, 7 figures

  23. arXiv:2004.02000  [pdf, other

    cs.SE

    Efficiently Finding Higher-Order Mutants

    Authors: Chu-Pan Wong, Jens Meinicke, Leo Chen, João P. Diniz, Christian Kästner, Eduardo Figueiredo

    Abstract: Higher-order mutation has the potential for improving major drawbacks of traditional first-order mutation, such as by simulating more realistic faults or improving test optimization techniques. Despite interest in studying promising higher-order mutants, such mutants are difficult to find due to the exponential search space of mutation combinations. State-of-the-art approaches rely on genetic sear… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

  24. arXiv:2001.06691  [pdf, other

    cs.SE cs.AI cs.LG

    Teaching Software Engineering for AI-Enabled Systems

    Authors: Christian Kästner, Eunsuk Kang

    Abstract: Software engineers have significant expertise to offer when building intelligent systems, drawing on decades of experience and methods for building systems that are scalable, responsive and robust, even when built on unreliable components. Systems with artificial-intelligence or machine-learning (ML) components raise new challenges and require careful engineering. We designed a new course to teach… ▽ More

    Submitted 18 January, 2020; originally announced January 2020.

    Comments: to be published in ICSE-SEET 2020

  25. arXiv:1912.01843  [pdf, other

    math.OC

    Learning-based Funnel-MPC for output-constrained nonlinear systems

    Authors: Thomas Berger, Carolin Kästner, Karl Worthmann

    Abstract: We exploit an adaptive control technique, namely funnel control, in order to establish both initial and recursive feasibility in Model Predictive Control (MPC) for output-constrained nonlinear systems. Moreover, we show that the resulting feedback controller outperforms the funnel controller both w.r.t. the required sampling rate for a zero-order-hold implementation and required control action. We… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

  26. arXiv:1910.11433  [pdf, other

    cs.SE

    How Do Code Changes Evolve in Different Platforms? A Mining-based Investigation

    Authors: Markos Viggiato, Johnatan Oliveira, Eduardo Figueiredo, Pooyan Jamshidi, Christian Kästner

    Abstract: Code changes are performed differently in the mobile and non-mobile platforms. Prior work has investigated the differences in specific platforms. However, we still lack a deeper understanding of how code changes evolve across different software platforms. In this paper, we present a study aiming at investigating the frequency of changes and how source code, build and test changes co-evolve in mobi… ▽ More

    Submitted 24 October, 2019; originally announced October 2019.

    Comments: 35th IEEE International Conference on Software Maintenance and Evolution (ICSME)

  27. arXiv:1905.09760  [pdf, other

    cs.SE

    Design Dimensions for Software Certification: A Grounded Analysis

    Authors: Gabriel Ferreira, Christian Kästner, Joshua Sunshine, Sven Apel, William Scherlis

    Abstract: In many domains, software systems cannot be deployed until authorities judge them fit for use in an intended operating environment. Certification standards and processes have been devised and deployed to regulate operations of software systems and prevent their failures. However, practitioners are often unsatisfied with the efficiency and value proposition of certification efforts. In this study,… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

    Comments: 16 pages

  28. arXiv:1905.02066  [pdf, other

    cs.SE

    ConfigCrusher: Towards White-Box Performance Analysis for Configurable Systems

    Authors: Miguel Velez, Pooyan Jamshidi, Florian Sattler, Norbert Siegmund, Sven Apel, Christian Kastner

    Abstract: Stakeholders of configurable systems are often interested in knowing how configuration options influence the performance of a system to facilitate, for example, the debugging and optimization processes of these systems. Several black-box approaches can be used to obtain this information, but they either sample a large number of configurations to make accurate predictions or miss important performa… ▽ More

    Submitted 14 July, 2020; v1 submitted 6 May, 2019; originally announced May 2019.

  29. arXiv:1903.03920  [pdf, other

    cs.AI cs.RO

    Machine Learning Meets Quantitative Planning: Enabling Self-Adaptation in Autonomous Robots

    Authors: Pooyan Jamshidi, Javier Cámara, Bradley Schmerl, Christian Kästner, David Garlan

    Abstract: Modern cyber-physical systems (e.g., robotics systems) are typically composed of physical and software components, the characteristics of which are likely to change over time. Assumptions about parts of the system made at design time may not hold at run time, especially when a system is deployed for long periods (e.g., over decades). Self-adaptation is designed to find reconfigurations of systems… ▽ More

    Submitted 9 March, 2019; originally announced March 2019.

    Comments: 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2019 )

  30. arXiv:1809.04193  [pdf, other

    cs.PL cs.SE

    Faster Variational Execution with Transparent Bytecode Transformation

    Authors: Chu-Pan Wong, Jens Meinicke, Lukas Lazarek, Christian Kästner

    Abstract: Variational execution is a novel dynamic analysis technique for exploring highly configurable systems and accurately tracking information flow. It is able to efficiently analyze many configurations by aggressively sharing redundancies of program executions. The idea of variational execution has been demonstrated to be effective in exploring variations in the program, especially when the configurat… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

  31. arXiv:1807.03837  [pdf, other

    cs.SE

    Understanding Differences among Executions with Variational Traces

    Authors: Jens Meinicke, Chu-Pan Wong, Christian Kästner, Gunter Saake

    Abstract: One of the main challenges of debugging is to understand why the program fails for certain inputs but succeeds for others. This becomes especially difficult if the fault is caused by an interaction of multiple inputs. To debug such interaction faults, it is necessary to understand the individual effect of the input, how these inputs interact and how these interactions cause the fault. The differen… ▽ More

    Submitted 10 July, 2018; originally announced July 2018.

  32. arXiv:1712.07440  [pdf, other

    cs.SE

    On the Relation of External and Internal Feature Interactions: A Case Study

    Authors: Sergiy Kolesnikov, Norbert Siegmund, Christian Kästner, Sven Apel

    Abstract: Detecting feature interactions is imperative for accurately predicting performance of highly-configurable systems. State-of-the-art performance prediction techniques rely on supervised machine learning for detecting feature interactions, which, in turn, relies on time consuming performance measurements to obtain training data. By providing information about potentially interacting features, we can… ▽ More

    Submitted 22 January, 2018; v1 submitted 20 December, 2017; originally announced December 2017.

  33. arXiv:1709.02280  [pdf, other

    stat.ML cs.PF cs.SE

    Transfer Learning for Performance Modeling of Configurable Systems: An Exploratory Analysis

    Authors: Pooyan Jamshidi, Norbert Siegmund, Miguel Velez, Christian Kästner, Akshay Patel, Yuvraj Agarwal

    Abstract: Modern software systems provide many configuration options which significantly influence their non-functional properties. To understand and predict the effect of configuration options, several sampling and learning strategies have been proposed, albeit often with significant cost to cover the highly dimensional configuration space. Recently, transfer learning has been applied to reduce the effort… ▽ More

    Submitted 7 September, 2017; originally announced September 2017.

    Comments: To appear in 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), 12 pages

  34. arXiv:1706.09357  [pdf, other

    cs.SE

    Differential Testing for Variational Analyses: Experience from Developing KConfigReader

    Authors: Christian Kästner

    Abstract: Differential testing to solve the oracle problem has been applied in many scenarios where multiple supposedly equivalent implementations exist, such as multiple implementations of a C compiler. If the multiple systems disagree on the output for a given test input, we have likely discovered a bug without every having to specify what the expected output is. Research on variational analyses (or varia… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.

  35. arXiv:1704.00234  [pdf, other

    cs.SE

    Transfer Learning for Improving Model Predictions in Highly Configurable Software

    Authors: Pooyan Jamshidi, Miguel Velez, Christian Kästner, Norbert Siegmund, Prasad Kawthekar

    Abstract: Modern software systems are built to be used in dynamic environments using configuration capabilities to adapt to changes and external uncertainties. In a self-adaptation context, we are often interested in reasoning about the performance of the systems under different configurations. Usually, we learn a black-box model based on real measurements to predict the performance of the system given a sp… ▽ More

    Submitted 20 April, 2017; v1 submitted 1 April, 2017; originally announced April 2017.

    Comments: To be published in the proceedings of the 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'17)

  36. arXiv:1702.03902  [pdf

    physics.data-an cond-mat.mtrl-sci

    Nanoparticle Size Distribution Quantification: Results of a SAXS Inter-Laboratory Comparison

    Authors: Brian R. Pauw, Claudia Kästner, Andreas F. Thünemann

    Abstract: We present the first world-wide inter-laboratory comparison of small-angle X-ray scattering (SAXS) for nanoparticle sizing. The measurands in this comparison are the mean particle radius, the width of the size distribution and the particle concentration. The investigated sample consists of dispersed silver nanoparticles, surrounded by a stabilizing polymeric shell of poly(acrylic acid). The silver… ▽ More

    Submitted 13 February, 2017; originally announced February 2017.

    Comments: 6 figures, 21 pages

  37. arXiv:1605.07032  [pdf, other

    cs.SE

    Do #ifdefs Influence the Occurrence of Vulnerabilities? An Empirical Study of the Linux Kernel

    Authors: Gabriel Ferreira, Momin Malik, Christian Kästner, Jürgen Pfeffer, Sven Apel

    Abstract: Preprocessors support the diversification of software products with #ifdefs, but also require additional effort from developers to maintain and understand variable code. We conjecture that #ifdefs cause developers to produce more vulnerable code because they are required to reason about multiple features simultaneously and maintain complex mental models of dependencies of configurable code. We e… ▽ More

    Submitted 23 May, 2016; originally announced May 2016.

  38. arXiv:1602.02052  [pdf, other

    cs.SE

    A Comparison of 10 Sampling Algorithms for Configurable Systems

    Authors: Flávio Medeiros, Christian Kästner, Márcio Ribeiro, Rohit Gheyi, Sven Apel

    Abstract: Almost every software system provides configuration options to tailor the system to the target platform and application scenario. Often, this configurability renders the analysis of every individual system configuration infeasible. To address this problem, researchers have proposed a diverse set of sampling algorithms. We present a comparative study of 10 state-of-the-art sampling algorithms regar… ▽ More

    Submitted 16 February, 2016; v1 submitted 5 February, 2016; originally announced February 2016.

    Comments: An extended version of our ICSE 2016 paper, entitled: A Comparison of 10 Sampling Algorithms for Configurable Systems

  39. Reify Your Collection Queries for Modularity and Speed!

    Authors: Paolo G. Giarrusso, Klaus Ostermann, Michael Eichberg, Ralf Mitschke, Tillmann Rendel, Christian Kästner

    Abstract: Modularity and efficiency are often contradicting requirements, such that programers have to trade one for the other. We analyze this dilemma in the context of programs operating on collections. Performance-critical code using collections need often to be hand-optimized, leading to non-modular, brittle, and redundant code. In principle, this dilemma could be avoided by automatic collection-specifi… ▽ More

    Submitted 23 October, 2012; originally announced October 2012.

    Comments: 20 pages

    ACM Class: H.2.3; D.1.1; D.1.5

    Journal ref: Proceedings of the 12th annual international conference on Aspect-oriented software development (AOSD '13), 2013. ACM, New York, NY, USA, 1-12

  40. Towards an efficient prover for the C1 paraconsistent logic

    Authors: Adolfo Neto, Celso A. A. Kaestner, Marcelo Finger

    Abstract: The KE inference system is a tableau method developed by Marco Mondadori which was presented as an improvement, in the computational efficiency sense, over Analytic Tableaux. In the literature, there is no description of a theorem prover based on the KE method for the C1 paraconsistent logic. Paraconsistent logics have several applications, such as in robot control and medicine. These applications… ▽ More

    Submitted 19 February, 2012; originally announced February 2012.

    Comments: 16 pages

    Journal ref: Electronic Notes in Theoretical Computer Science. Volume 256, 2 December 2009, Pages 87-102. Proceedings of the Fourth Workshop on Logical and Semantic Frameworks, with Applications (LSFA 2009)

  41. arXiv:1001.3604  [pdf, other

    cs.SE cs.PL

    Type-Safe Feature-Oriented Product Lines

    Authors: Sven Apel, Christian Kaestner, Armin Groesslinger, Christian Lengauer

    Abstract: A feature-oriented product line is a family of programs that share a common set of features. A feature implements a stakeholder's requirement, represents a design decision and configuration option and, when added to a program, involves the introduction of new structures, such as classes and methods, and the refinement of existing ones, such as extending methods. With feature-oriented decompositi… ▽ More

    Submitted 20 January, 2010; originally announced January 2010.

    Comments: Technical Report of the University of Passau, Germany