Transfer learning for performance modeling of configurable systems: An exploratory analysis

P Jamshidi, N Siegmund, M Velez… - 2017 32nd IEEE …, 2017 - ieeexplore.ieee.org
Modern software systems provide many configuration options which significantly influence
their non-functional properties. To understand and predict the effect of configuration options …

Challenges and opportunities: an in-depth empirical study on configuration error injection testing

W Li, Z Jia, S Li, Y Zhang, T Wang, E Xu… - Proceedings of the 30th …, 2021 - dl.acm.org
Configuration error injection testing (CEIT) could systematically evaluate software reliability
and diagnosability to runtime configuration errors. This paper explores the challenges and …

Understanding and discovering software configuration dependencies in cloud and datacenter systems

Q Chen, T Wang, O Legunsen, S Li, T Xu - … of the 28th ACM Joint Meeting …, 2020 - dl.acm.org
A large percentage of real-world software configuration issues, such as misconfigurations,
involve multiple interdependent configuration parameters. However, existing techniques and …

An evolutionary study of configuration design and implementation in cloud systems

Y Zhang, H He, O Legunsen, S Li… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Many techniques were proposed for detecting software misconfigurations in cloud systems
and for diagnosing unintended behavior caused by such misconfigurations. Detection and …

Towards continuous access control validation and forensics

C Xiang, Y Wu, B Shen, M Shen, H Huang… - Proceedings of the …, 2019 - dl.acm.org
Access control is often reported to be" profoundly broken" in real-world practices due to
prevalent policy misconfigurations introduced by system administrators (sysadmins). Given …

Characterizing the occurrence of dockerfile smells in open-source software: An empirical study

Y Wu, Y Zhang, T Wang, H Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Dockerfile plays an important role in the Docker-based software development process, but
many Dockerfile codes are infected with smells in practice. Understanding the occurrence of …

Visualizing distributed system executions

I Beschastnikh, P Liu, A Xing, P Wang, Y Brun… - ACM Transactions on …, 2020 - dl.acm.org
Distributed systems pose unique challenges for software developers. Understanding the
system's communication topology and reasoning about concurrent activities of system hosts …

An exploratory study of logging configuration practice in java

C Zhi, J Yin, S Deng, M Ye, M Fu… - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
Logging components are an integral element of software systems. These logging
components receive the logging requests generated by the logging code and process these …

Mining container image repositories for software configuration and beyond

T Xu, D Marinov - Proceedings of the 40th International Conference on …, 2018 - dl.acm.org
This paper introduces the idea of mining container image repositories for configuration and
other deployment information of software systems. Unlike traditional software repositories …

Multiview: Finding Blind Spots in {Access-Deny} Issues Diagnosis

B Shen, T Shan, Y Zhou - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Access-deny issues are hard to fix because it implies both availability and security
requirements. On one hand, system administrators (sysadmins) need to make a change …