Show simple item record

dc.contributor.advisorRamanathan, Murali Krishna
dc.contributor.authorSamak, Malavika
dc.date.accessioned2018-01-01T14:26:03Z
dc.date.accessioned2018-07-31T04:38:47Z
dc.date.available2018-01-01T14:26:03Z
dc.date.available2018-07-31T04:38:47Z
dc.date.issued2018-01-01
dc.date.submitted2016
dc.identifier.urihttps://etd.iisc.ac.in/handle/2005/2943
dc.identifier.abstracthttp://etd.iisc.ac.in/static/etd/abstracts/3805/G27829-Abs.pdfen_US
dc.description.abstractDetecting concurrency bugs can be challenging due to the intricacies associated with their manifestation. These intricacies correspond to identifying the methods that need to be invoked concurrently, the inputs passed to these methods and the interleaving of the threads that cause the erroneous behavior. Neither fuzzing-based testing techniques nor over-approximate static analyses are well positioned to detect subtle concurrency defects while retaining high accuracy alongside satisfactory coverage. While dynamic analysis techniques have been proposed to overcome some of the challenges in detecting concurrency bugs, we observe that their success is critically dependent on the availability of effective multithreaded clients. Without a priori knowledge of the defects, manually constructing defect-revealing multithreaded clients is non-trivial. In this thesis, we design an approach to address the problem of automatically generate clients for detecting concurrency bugs in multithreaded libraries. The key insight underlying our design is that a subset of the properties observed when the defects manifest in a concur-rent execution can also be observed in a sequential execution. The input to our approach is a library implementation and a sequential testsuite, and the output is a set of multithreaded clients that can be used to reveal defects in the input library implementation. Dynamic defect detectors can execute the clients and analyze the resulting traces to report various kinds of defects including deadlocks, data races and atomicity violations. Furthermore, the clients can also be used by testing frameworks to report assertion violations. We propose two variants of our design – (a) path-agnostic client generation, and (b) path-aware client generation. The path-agnostic client generation process helps in detection of potential bugs present in the paths executed by the input sequential testsuite. It does not attempt to explore newer paths by satisfying path conditions either by modifying the input or by scheduling the threads appropriately. The generated clients are used to expose deadlocks, data races and atomicity violations. Our analysis analyzes the execution traces obtained from executing the input sequential clients and produces a concurrent client program that drives shared objects via library methods calls to states conducive for triggering deadlocks, data races or atomicity violations. For path-aware client generation, our approach explores newer paths that are not covered by the input sequential testsuite to generate clients. For this purpose, we design a directed, iterative and scalable engine that combines the strengths of static and dynamic analysis to help synthesize both multithreaded clients and schedules that violate complex correctness conditions expressed by the developer. Apart from the library implementation and the sequential testsuite as input, this engine also accepts a specification of correctness as input. Then, it iteratively refines each client from the input sequential testsuite to generate an ex-ecution that can break the input specification. Each step of the iterative process includes statically identifying sub-goals towards the goal of failing the specification, generating a plan toward meeting these goals, and merging of the paths traversed dynamically with the plan computed statically via constraint solving to generate a new client. The engine reports full reproduction scenarios, guaranteed to be true, for the bugs it finds. We have implemented prototypes that incorporate the aforementioned ideas and validated them by applying them on 29 well-tested concurrent classes from popular Java libraries, including the latest version of JDK. We are able to automatically generate clients that helped expose more than 300 concurrency bugs including deadlocks, data races, atomicity violations and assertion violations. We reported many previously unknown bugs to the developers of these libraries resulting in either fixes to the code or changes to the documentation pertaining to the thread-safe behavior of the relevant classes. On average, the time taken to analyze a class and generate clients for it is less than two minutes. We believe that the demonstrated effectiveness of our prototypes in helping expose deep bugs in popular Java libraries makes the design, proposed in this thesis, a vital cog in the future development and deployment of dynamic concurrency bug detectors.en_US
dc.language.isoen_USen_US
dc.relation.ispartofseriesG27829en_US
dc.subjectConcurrency Bugsen_US
dc.subjectDynamic Analysisen_US
dc.subjectProgram Synthesisen_US
dc.subjectDeadlock Detectionen_US
dc.subjectBytecode Instrumentationen_US
dc.subjectTargeted Client Synthesisen_US
dc.subjectDynamic Deadlock Detectionen_US
dc.subjectMultithreaded Client Synthesisen_US
dc.subjectAtomicity Violationsen_US
dc.subjectShared Memoryen_US
dc.subjectDynamic Concurrency Bug Detectorsen_US
dc.subjectRacy Testsen_US
dc.subjectBug Detectionen_US
dc.subject.classificationComputer Scienceen_US
dc.titleTargeted Client Synthesis for Detecting Concurrency Bugsen_US
dc.typeThesisen_US
dc.degree.namePhDen_US
dc.degree.levelDoctoralen_US
dc.degree.disciplineFaculty of Engineeringen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record