Did we miss something important? studying and exploring variable-aware log abstraction

Z Li, C Luo, TH Chen, W Shang, S He… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Due to the sheer size of software logs, developers rely on automated techniques for log
analysis. One of the first and most important steps of automated log analysis is log …

Exploring the effectiveness of llms in automated logging generation: An empirical study

Y Li, Y Huo, Z Jiang, R Zhong, P He, Y Su… - arXiv preprint arXiv …, 2023 - arxiv.org
Automated logging statement generation techniques facilitate developers in writing
appropriate logging statements that document software behaviors. Current retrieval-based …

UniLog: Automatic Logging via LLM and In-Context Learning

J Xu, Z Cui, Y Zhao, X Zhang, S He, P He, L Li… - Proceedings of the 46th …, 2024 - dl.acm.org
Logging, which aims to determine the position of logging statements, the verbosity levels,
and the log messages, is a crucial process for software reliability enhancement. In recent …

Are They All Good? Studying Practitioners' Expectations on the Readability of Log Messages

Z Li, AR Chen, X Hu, X Xia, TH Chen… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Developers write logging statements to generate logs that provide run-time information for
various tasks. The readability of log messages in the logging statements (ie, the descriptive …

Learning graph-based code representations for source-level functional similarity detection

J Liu, J Zeng, X Wang, Z Liang - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Detecting code functional similarity forms the basis of various software engineering tasks.
However, the detection is challenging as functionally similar code fragments can be …

Go Static: Contextualized Logging Statement Generation

Y Li, Y Huo, R Zhong, Z Jiang, J Liu, J Huang… - arXiv preprint arXiv …, 2024 - arxiv.org
Logging practices have been extensively investigated to assist developers in writing
appropriate logging statements for documenting software behaviors. Although numerous …

Palantír: Optimizing attack provenance with hardware-enhanced system observability

J Zeng, C Zhang, Z Liang - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
System auditing is the foundation of attack provenance to investigate root causes and
ramifications of cyber-attacks. However, provenance tracking on coarse-grained audit logs …

[PDF][PDF] A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We?

Z Jiang, J Liu, J Huang, Y Li, Y Huo, J Gu… - Proceedings of the …, 2024 - zbchern.github.io
Log data have facilitated various tasks of software development and maintenance, such as
testing, debugging and diagnosing. Due to the unstructured nature of logs, log parsing is …

Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation

Y Jiang, J Liu, J Ba, RHC Yap, Z Liang… - Proceedings of the 46th …, 2024 - dl.acm.org
Graph Database Management Systems (GDBMSs) store graphs as data. They are used
naturally in applications such as social networks, recommendation systems and program …

Generate Complete Logging Statements with an Efficient End-to-End Approach

X Xie, Z Cai, S Chen, J Xuan - arXiv preprint arXiv:2311.02862, 2023 - arxiv.org
Logs are significant in modern software systems, aiding in various maintenance tasks. To
make better use of these logs, many methods have been proposed to help developers draft …