Systems approaches to tackling configuration errors: A survey

T Xu, Y Zhou - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
In recent years, configuration errors (ie, misconfigurations) have become one of the
dominant causes of system failures, resulting in many severe service outages and …

Learning software configuration spaces: A systematic literature review

JA Pereira, M Acher, H Martin, JM Jézéquel… - Journal of Systems and …, 2021 - Elsevier
Most modern software systems (operating systems like Linux or Android, Web browsers like
Firefox or Chrome, video encoders like ffmpeg, x264 or VLC, mobile and cloud applications …

Bestconfig: tapping the performance potential of systems via automatic configuration tuning

Y Zhu, J Liu, M Guo, Y Bao, W Ma, Z Liu… - Proceedings of the …, 2017 - dl.acm.org
An ever increasing number of configuration parameters are provided to system users. But
many users have used one configuration setting across different workloads, leaving …

Trade-offs in continuous integration: assurance, security, and flexibility

M Hilton, N Nelson, T Tunnell, D Marinov… - Proceedings of the 2017 …, 2017 - dl.acm.org
Continuous integration (CI) systems automate the compilation, building, and testing of
software. Despite CI being a widely used activity in software engineering, we do not know …

Early detection of configuration errors to reduce failure damage

T Xu, X Jin, P Huang, Y Zhou, S Lu, L Jin… - … USENIX Symposium on …, 2016 - usenix.org
Early detection is the key to minimizing failure damage induced by configuration errors,
especially those errors in configurations that control failure handling and fault tolerance …

Finding Faster Configurations Using FLASH

V Nair, Z Yu, T Menzies, N Siegmund… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Finding good configurations of a software system is often challenging since the number of
configuration options can be large. Software engineers often make poor choices about …

Investigating system operators' perspective on security misconfigurations

C Dietrich, K Krombholz, K Borgolte… - Proceedings of the 2018 …, 2018 - dl.acm.org
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …

Transfer learning for performance modeling of configurable systems: An exploratory analysis

P Jamshidi, N Siegmund, M Velez… - 2017 32nd IEEE …, 2017 - ieeexplore.ieee.org
Modern software systems provide many configuration options which significantly influence
their non-functional properties. To understand and predict the effect of configuration options …

Distance-based sampling of software configuration spaces

C Kaltenecker, A Grebhahn… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Configurable software systems provide a multitude of configuration options to adjust and
optimize their functional and non-functional properties. For instance, to find the fastest …

Using bad learners to find good configurations

V Nair, T Menzies, N Siegmund, S Apel - … of the 2017 11th joint meeting …, 2017 - dl.acm.org
Finding the optimally performing configuration of a software system for a given setting is
often challenging. Recent approaches address this challenge by learning performance …