Static detection of silent misconfigurations with deep interaction analysis

J Zhang, R Piskac, E Zhai, T Xu - Proceedings of the ACM on …, 2021 - dl.acm.org
The behavior of large systems is guided by their configurations: users set parameters in the
configuration file to dictate which corresponding part of the system code is executed …

Causality in configurable software systems

C Dubslaff, K Weis, C Baier, S Apel - Proceedings of the 44th …, 2022 - dl.acm.org
Detecting and understanding reasons for defects and inadvertent behavior in software is
challenging due to their increasing complexity. In configurable software systems, the …

Static extraction of program configuration options

A Rabkin, R Katz - Proceedings of the 33rd International Conference on …, 2011 - dl.acm.org
Many programs use a key-value model for configuration options. We examined how this
model is used in seven open source Java projects totaling over a million lines of code. We …

Why pcs are fragile and what we can do about it: A study of windows registry problems

A Ganapathi, YM Wang, N Lao… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
Software configuration problems are a major source of failures in computer systems. In this
paper, we present a new framework for categorizing configuration problems. We apply this …

Does your configuration code smell?

T Sharma, M Fragkoulis, D Spinellis - Proceedings of the 13th …, 2016 - dl.acm.org
Infrastructure as Code (IaC) is the practice of specifying computing system configurations
through code, and managing them through traditional software engineering methods. The …

Infrastructure from code: The next generation of cloud lifecycle automation

I Aviv, R Gafni, S Sherman, B Aviv, A Sterkin… - IEEE …, 2022 - ieeexplore.ieee.org
We identify 14 fundamental cloud infrastructure procedures (CIPs) applicable to software
development processes on the public cloud and their associated challenges. We then …

Automatic conformance checking for migrating software systems to cloud infrastructures and platforms

S Frey, W Hasselbring… - Journal of Software …, 2013 - Wiley Online Library
The migration of software systems to IaaS (infrastructure as a service)‐or PaaS (platform as
a service)‐based cloud environments enables SaaS providers to benefit from the cloud's …

A comparative study of vulnerability reporting by software composition analysis tools

N Imtiaz, S Thorn, L Williams - Proceedings of the 15th ACM/IEEE …, 2021 - dl.acm.org
Background: Modern software uses many third-party libraries and frameworks as
dependencies. Known vulnerabilities in these dependencies are a potential security risk …

ConfSeer: leveraging customer support knowledge bases for automated misconfiguration detection

R Potharaju, J Chan, L Hu, C Nita-Rotaru… - Proceedings of the …, 2015 - dl.acm.org
We introduce ConfSeer, an automated system that detects potential configuration issues or
deviations from identified best practices by leveraging a knowledge base (KB) of technical …

Orplocator: Identifying read points of configuration options via static analysis

Z Dong, A Andrzejak, D Lo… - 2016 IEEE 27th …, 2016 - ieeexplore.ieee.org
Configuration options are widely used for customizing the behavior and initial settings of
software applications, server processes, and operating systems. Their distinctive property is …