Discovering Faults in Idiom- Based Exception Handling. Magiel Bruntink, Arie van Deursen & Tom Tourwé

Size: px
Start display at page:

Download "Discovering Faults in Idiom- Based Exception Handling. Magiel Bruntink, Arie van Deursen & Tom Tourwé"

Transcription

1 Discovering Faults in Idiom- Based Exception Handling Magiel Bruntink, Arie van Deursen & Tom Tourwé

2 Implementing crosscutting concerns by means of idioms is fault prone 1. what are crosscutting concerns? 2. what are idioms, which idioms do we study and why are they fault prone? 3. how can we detect the faults?

3 Implementing crosscutting concerns by means of idioms is fault prone 1. what are crosscutting concerns? 2. what are idioms, which idioms do we study and why are they fault prone? 3. how can we detect the faults?

4 Separation of concerns Any given problem involves different kinds of concerns, which should be identified and separated to cope with complexity and to achieve the required engineering quality factors, such as adaptability, maintainability, extendibility and reusability E.W. Dijkstra, A Discipline of Programming, 1976.

5 Tyranny of the dominant decomposition No matter how (well) a software system is decomposed into modular units, some functionality will always crosscut that decomposition a program can be modularised in only one way at a time not all concerns align with that modularisation P. Tarr et al, N degrees of separation: multidimensional separation of concerns, 1999.

6 Crosscutting concerns are concerns that cut across the dominant decomposition of the software and lead to scattering, i.e. same (similar) functionality implemented in different modular units tangling, i.e. one modular unit implementing many different concerns

7 Implementing crosscutting concerns by means of idioms is fault prone 1. what are crosscutting concerns? 2. what are idioms, which idioms do we study and why are they fault prone? 3. how can we detect the faults?

8 Idioms are a prescribed way of implementing functionality... coding conventions design patterns cookbooks etc... and are often used to implement crosscutting concerns in the absence of aspects

9 Idiom-Based Exception Handling void f(int a, int *b) { g(a); h(b); LOG(CCXA_error, r);

10 Idiom-Based Exception Handling LOG(CCXA_error, r); error variable

11 Idiom-Based Exception Handling catch error returned LOG(CCXA_error, r);

12 Idiom-Based Exception Handling LOG(CCXA_error, r); if not OK, link to a new error and state context info

13 Idiom-Based Exception Handling only continue if OK LOG(CCXA_error, r);

14 Idiom-Based Exception Handling LOG(CCXA_error, r); return error

15 Idiom-based EH is fault prone because it is inherently complex... informally described and documented... not enforced by automatic tools... hard(er) to test

16 Implementing crosscutting concerns by means of idioms is fault prone 1. what are crosscutting concerns? 2. what are idioms, which idioms do we study and why are they fault prone? 3. how can we detect the faults?

17 Detecting faults In every function look for a variable that is used to hold exceptions... identify a possible way of executing that function that leads to undesired situations 1. What are error variables? 2. What are ways of executing a function? 3. What are undesired situations?

18 1. Error variable identification An error variable is a variable that has type int and is initialised to OK is only assigned to constants and/or results of function calls can only be used in comparisons, returns or LOG calls

19 1. Error variable identification An error variable is a variable that has type int and is initialised to OK is only assigned to constants and/or results of function calls can only be used in comparisons, returns or LOG calls

20 1. Error variable identification An error variable is a variable that has type int and is initialised to OK is only assigned to constants and/or results of function calls can only be used in comparisons, returns or LOG calls

21 2. Path identification G. A. Kildall. A unified approach to global program optimization

22 2. Path identification G. A. Kildall. A unified approach to global program optimization

23 3. Detecting undesired situations SMELL = State Machine for Exception Linking & Logging entry Track the value of the error variable by accept assignedok assignedconstant assignedunknown assignednot-ok reject writing the exception handling idiom as a DFA evaluating the DFA along all possible executions of a function D. Engler et al. Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions

24 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

25 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

26 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

27 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

28 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

29 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

30 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

31 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

32 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

33 3. Detecting undesired situations entry accept assignedok assignedconstant assignedunknown assignednot-ok reject

34 Experimental results Reported deviations False positives unintended deviations kloc CC CC CC CC CC CC Total

35 Experimental results Reported deviations False positives unintended deviations kloc CC CC CC CC CC CC Total unintended deviations/kloc

36 Experimental results Reported deviations False positives unintended deviations kloc CC CC CC CC CC CC Total < 25% false positives

37 Implementing crosscutting concerns by means of idioms is fault prone 1. We described the exception handling idiom precisely by means of a state machine 2. We implemented a static checker that verifies the correct use of the idiom 3. We showed experimental results of running the tool on ASMLs code base

38 Outlook Study alternatives/improvements to the idiom, and define (automated) migration path Generalise findings toward other idioms Generalise findings toward other software

39 Outlook Study alternatives/improvements to the idiom, and define (automated) migration path Generalise findings toward other idioms Generalise findings toward other software Interested in helping us?

Example Concerns (I) Example Concerns (II) Characteristics. Composition Risks. Isolating Crosscutting Concerns in Embedded Systems.

Example Concerns (I) Example Concerns (II) Characteristics. Composition Risks. Isolating Crosscutting Concerns in Embedded Systems. Isolating Crosscutting s in Embedded Systems Arie van Deursen Example s (I) a) Every public function should check its parameters before using them.... b) Every public function should trace itself just

More information

25 Nov Arent Janszoon Ernststraat 595-H NL-1082 LD Amsterdam

25 Nov Arent Janszoon Ernststraat 595-H NL-1082 LD Amsterdam 25 Nov 2008 Arent Janszoon Ernststraat 595-H NL-1082 LD Amsterdam info@sig.nl www.sig.nl Renovation of Idiomatic Crosscutting Concerns in Embedded Systems Magiel Bruntink 25 Nov 2008 Arent Janszoon Ernststraat

More information

Employing Query Technologies for Crosscutting Concern Comprehension

Employing Query Technologies for Crosscutting Concern Comprehension Employing Query Technologies for Crosscutting Concern Comprehension Marius Marin Accenture The Netherlands Marius.Marin@accenture.com Abstract Common techniques for improving comprehensibility of software

More information

Discovering Faults in Idiom-Based Exception Handling

Discovering Faults in Idiom-Based Exception Handling Discovering Faults in Idiom-Based Exception Handling Magiel Bruntink Magiel.Bruntink@cwi.nl Arie van Deursen Arie.van.Deursen@cwi.nl Tom Tourwé Tom.Tourwe@cwi.nl ABSTRACT In this paper, we analyse the

More information

Discovering Faults in Idiom-Based Exception Handling

Discovering Faults in Idiom-Based Exception Handling Discovering Faults in Idiom-Based Exception Handling Magiel Bruntink Centrum voor Wiskunde en Informatica P.O. Box 94079 1090 GB Amsterdam, The Netherlands Magiel.Bruntink@cwi.nl Arie van Deursen Software

More information

Multi-Dimensional Separation of Concerns and IBM Hyper/J

Multi-Dimensional Separation of Concerns and IBM Hyper/J Multi-Dimensional Separation of Concerns and IBM Hyper/J Technical Research Report Barry R. Pekilis Bell Canada Software Reliability Laboratory Electrical and Computer Engineering University of Waterloo

More information

Sort-based Refactoring of Crosscutting Concerns to Aspects

Sort-based Refactoring of Crosscutting Concerns to Aspects Sort-based Refactoring of Crosscutting Concerns to Aspects Robin van der Rijst Delft University of Technology rvdrijst@gmail.com Marius Marin Accenture Marius.Marin@accenture.com Arie van Deursen Delft

More information

SERG. Sort-based Refactoring of Crosscutting Concerns to Aspects

SERG. Sort-based Refactoring of Crosscutting Concerns to Aspects Delft University of Technology Software Engineering Research Group Technical Report Series Sort-based Refactoring of Crosscutting Concerns to Aspects Robin van der Rijst, Marius Marin, and Arie van Deursen

More information

Control-Flow-Graph-Based Aspect Mining

Control-Flow-Graph-Based Aspect Mining Control-Flow-Graph-Based Aspect Mining Jens Krinke FernUniversität in Hagen, Germany krinke@acm.org Silvia Breu NASA Ames Research Center, USA silvia.breu@gmail.com Abstract Aspect mining tries to identify

More information

Software Construction

Software Construction Lecture 2: Decomposition and Java Methods Software Construction in Java for HSE Moscow Tom Verhoeff Eindhoven University of Technology Department of Mathematics & Computer Science Software Engineering

More information

Testing During Refactoring: Adding Aspects to Legacy Systems

Testing During Refactoring: Adding Aspects to Legacy Systems Testing During Refactoring: Adding Aspects to Legacy Systems Michael Mortensen Hewlett-Packard 3404 E. Harmony Road, MS 88 Fort Collins, CO 80528 Sudipto Ghosh, James M. Bieman Computer Science Department

More information

Refactoring Catalog for Legacy software using C and Aspect Oriented Language

Refactoring Catalog for Legacy software using C and Aspect Oriented Language Refactoring Catalog for Legacy software using C and Aspect Oriented Language S.A.M Rizvi and Zeba Khanam, Jamia Millia Islamia, New Delhi, India Abstract- This paper explores the combination of AOP and

More information

Implementing Producers/Consumers Problem Using Aspect-Oriented Framework

Implementing Producers/Consumers Problem Using Aspect-Oriented Framework Implementing Producers/Consumers Problem Using Aspect-Oriented Framework 1 Computer Science Department School of Science Bangkok University Bangkok, Thailand netipan@iit.edu Paniti Netinant 1, 2 and Tzilla

More information

CSE P 501 Exam 8/5/04

CSE P 501 Exam 8/5/04 Name There are 7 questions worth a total of 65 points. Please budget your time so you get to all of the questions. Keep your answers brief and to the point. You may refer to the following references: Course

More information

An Integrated Crosscutting Concern Migration Strategy and its Semi-Automated Application to JHOTDRAW

An Integrated Crosscutting Concern Migration Strategy and its Semi-Automated Application to JHOTDRAW Automated Software Engineering manuscript No. (will be inserted by the editor) An Integrated Crosscutting Concern Migration Strategy and its Semi-Automated Application to JHOTDRAW Marius Marin Arie van

More information

AOSD Explained: ASPECT-ORIENTED SYSTEM DEVELOPMENT

AOSD Explained: ASPECT-ORIENTED SYSTEM DEVELOPMENT Explained: ASPECT-ORIENTED SYSTEM DEVELOPMENT Background & Implications Professor Emeritus Birkbeck College 1 AOSD - Background AOSD - Aspect-Oriented Software Development, AOSD - Aspect-Oriented System

More information

"Learn to do Verification with AOP? We've just learned OOP!"

Learn to do Verification with AOP? We've just learned OOP! "Learn to do Verification with AOP? We've just learned OOP!" Dr David Robinson, Jason Sprott, Gordon Allan Verilab Ltd. david.robinson@verilab.com, jason.sprott@verilab.com, gordon.allan@verilab.com ABSTRACT:

More information

CS558 Programming Languages

CS558 Programming Languages CS558 Programming Languages Winter 2017 Lecture 7b Andrew Tolmach Portland State University 1994-2017 Values and Types We divide the universe of values according to types A type is a set of values and

More information

Improving Software Modularity using AOP

Improving Software Modularity using AOP B Vasundhara 1 & KV Chalapati Rao 2 1 Dept. of Computer Science, AMS School of Informatics, Hyderabad, India 2 CVR College of Engineering, Ibrahimpatnam, India E-mail : vasu_venki@yahoo.com 1, chalapatiraokv@gmail.com

More information

Aspects and Soar: A Behavior Development Model. Jacob Crossman

Aspects and Soar: A Behavior Development Model. Jacob Crossman Aspects and Soar: A Behavior Development Model Jacob Crossman jcrossman@soartech.com Motivation: Why is Soar Useful? Soar Systems are often complex Often require multiple processes Are built of hundreds/thousands

More information

Separation of Concerns. AspectJ. What if the concerns are Cross-Cutting? SoC: Programming Paradigms. Key theme: Modularity and Encapsulation

Separation of Concerns. AspectJ. What if the concerns are Cross-Cutting? SoC: Programming Paradigms. Key theme: Modularity and Encapsulation Separation of Concerns and AspectJ EEC 625 Lecture #16 April 3, 2006 EEC 625: Software Design & Architecture Separation of Concerns Breaking a program into pieces that overlap in functionality as little

More information

Low Level Design Activities. Implementation (Low Level Design) What is a Good Low Level Module? Black Box Aspects. Black box aspects White box aspects

Low Level Design Activities. Implementation (Low Level Design) What is a Good Low Level Module? Black Box Aspects. Black box aspects White box aspects Low Level Design Activities Implementation (Low Level Design) Implement Document Deskcheck Basic Test PVK--HT00 Copyright 1997-1999, jubo@cs.umu.se/epltos@epl.ericsson.se 2 What is a Good Low Level Module?

More information

Aspect-Orientation from Design to Code

Aspect-Orientation from Design to Code Aspect-Orientation from Design to Code Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany groher@informatik.tu-darmstadt.de Thomas Baumgarth Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739

More information

RELIABLE SOFTWARE SYSTEMS

RELIABLE SOFTWARE SYSTEMS gh@jpl.nasa.gov RELIABLE SOFTWARE SYSTEMS +50 1969 2019 LM: less than 10K lines of code (C-equiv) (36K ROM, 2K RAM, 43Khz cycle) Altair: est. 10M lines of code (est. 1GB RAM, est. 1Ghz cycle) 3 orders

More information

Why testing and analysis. Software Testing. A framework for software testing. Outline. Software Qualities. Dependability Properties

Why testing and analysis. Software Testing. A framework for software testing. Outline. Software Qualities. Dependability Properties Why testing and analysis Software Testing Adapted from FSE 98 Tutorial by Michal Young and Mauro Pezze Software is never correct no matter what developing testing technique is used All software must be

More information

Refactoring Idiomatic Exception Handling in C++: Throwing and Catching Exceptions with Aspects

Refactoring Idiomatic Exception Handling in C++: Throwing and Catching Exceptions with Aspects Refactoring Idiomatic Exception Handling in C++: Throwing and Catching Exceptions with Aspects Michael Mortensen Hewlett-Packard, Colorado State Univeristy mortense@cs.colostate.edu Sudipto Ghosh Computer

More information

Introduction to Aspect-Oriented Programming

Introduction to Aspect-Oriented Programming Introduction to Aspect-Oriented Programming LÁSZLÓ LENGYEL, TIHAMÉR LEVENDOVSZKY {lengyel, tihamer}@aut.bme.hu Reviewed Key words: aspect-oriented programming (AOP), crosscutting concerns Aspect-oriented

More information

Aspect-oriented Refactoring of Java Programs

Aspect-oriented Refactoring of Java Programs Miguel P. Monteiro CITI, Departamento de Informática, Faculdade de Ciências e Tecnologia Universidade Nova de Lisboa, Portugal João M. Fernandes Dep. Informática / Centro Algoritmi, Escola de Engenharia

More information

Are the Classes that use Exceptions Defect Prone?

Are the Classes that use Exceptions Defect Prone? Are the Classes that use Exceptions Defect Prone? Cristina Marinescu LOOSE Research Group Politehnica University of Timişoara, Romania cristina.marinescu@cs.upt.ro ABSTRACT Exception hling is a mechanism

More information

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz Results obtained by researchers in the aspect-oriented programming are promoting the aim to export these ideas to whole software development

More information

Automated Inference of Pointcuts in Aspect-Oriented Refactoring

Automated Inference of Pointcuts in Aspect-Oriented Refactoring Automated Inference of Pointcuts in Aspect-Oriented Refactoring Prasanth Anbalagan 1 Tao Xie 2 Department of Computer Science, North Carolina State University, Raleigh, NC 27695, USA 1 panbala@ncsu.edu

More information

SEN. Software Engineering. Software ENgineering. Proceedings of the 1st workshop on aspect reverse-engineering

SEN. Software Engineering. Software ENgineering. Proceedings of the 1st workshop on aspect reverse-engineering C e n t r u m v o o r W i s k u n d e e n I n f o r m a t i c a SEN Software Engineering Software ENgineering Proceedings of the 1st workshop on aspect reverse-engineering T Tourwé, M Bruntink, M Marin,

More information

The Reverse Engineering in Oriented Aspect Detection of semantics clones

The Reverse Engineering in Oriented Aspect Detection of semantics clones International Journal of Scientific & Engineering Research Volume 3, Issue 5, May-2012 1 The Reverse Engineering in Oriented Aspect Detection of semantics clones Amel Belmabrouk, Belhadri Messabih Abstract-Attention

More information

DISCUSSING ASPECTS OF AOP

DISCUSSING ASPECTS OF AOP a DISCUSSING ASPECTS OF AOP How would you define AOP? Gregor Kiczales: Aspect-oriented programming is a new evolution in the line of technology for separation of concerns technology that allows design

More information

AOP 101: Intro to Aspect Oriented Programming. Ernest Hill

AOP 101: Intro to Aspect Oriented Programming. Ernest Hill AOP 101: Intro to Aspect Oriented Programming ernesthill@earthlink.net AOP 101-1 AOP 101: Aspect Oriented Programming Goal of Software History of Programming Methodology Remaining Problem AOP to the Rescue

More information

Mobile and Context-aware Interactive Systems

Mobile and Context-aware Interactive Systems Mobile and Context-aware Interactive Systems Gaëlle Calvary Grenoble INP Laboratoire d Informatique de Grenoble (LIG) Core concepts Principles Terminology For more information, see Sara Bouchenak s M1

More information

Phoenix-Based Clone Detection Using Suffix Trees

Phoenix-Based Clone Detection Using Suffix Trees Phoenix-Based Clone Detection Using Suffix Trees Robert Tairas and Jeff Gray Department of Computer and Information Sciences University of Alabama at Birmingham Birmingham, AL 35294 USA {tairasr, gray}@cis.uab.edu

More information

Regression testing. Whenever you find a bug. Why is this a good idea?

Regression testing. Whenever you find a bug. Why is this a good idea? Regression testing Whenever you find a bug Reproduce it (before you fix it!) Store input that elicited that bug Store correct output Put into test suite Then, fix it and verify the fix Why is this a good

More information

Programming Languages

Programming Languages CSE 230: Winter 2008 Principles of Programming Languages Ocaml/HW #3 Q-A Session Push deadline = Mar 10 Session Mon 3pm? Lecture 15: Type Systems Ranjit Jhala UC San Diego Why Typed Languages? Development

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 4, Mai-June 2006 ADDING ASPECT-ORIENTED PROGRAMMING FEATURES TO C#.NET

More information

1B1b Classes in Java Part I

1B1b Classes in Java Part I 1B1b Classes in Java Part I Agenda Defining simple classes. Instance variables and methods. Objects. Object references. 1 2 Reading You should be reading: Part I chapters 6,9,10 And browsing: Part IV chapter

More information

Apache NetBeans 9.0 New and Noteworthy

Apache NetBeans 9.0 New and Noteworthy Apache NetBeans 9.0 New and Noteworthy Note: NetBeans 9 is a work in progress and not released yet. Below is a list of features it will have. NetBeans 9 runtime platforms are only JDK8 and JDK9. Until

More information

A New Genetic Clustering Based Approach in Aspect Mining

A New Genetic Clustering Based Approach in Aspect Mining Proc. of the 8th WSEAS Int. Conf. on Mathematical Methods and Computational Techniques in Electrical Engineering, Bucharest, October 16-17, 2006 135 A New Genetic Clustering Based Approach in Aspect Mining

More information

Linhas de Produtos de Software

Linhas de Produtos de Software Linhas de Produtos de Software Arquitetura de Software Marco Túlio Valente DCC - UFMG 1 Definição Surgimento do termo: Workshop do SEI, 1996 Ou então: On the Design and Development of Program Families,

More information

LECTURE 3: SOFTWARE DESIGN. Software Engineering Mike Wooldridge

LECTURE 3: SOFTWARE DESIGN. Software Engineering Mike Wooldridge LECTURE 3: SOFTWARE DESIGN Mike Wooldridge 1 Design Computer systems are not monolithic: they are usually composed of multiple, interacting modules. Modularity has long been seen as a key to cheap, high

More information

Experiences with Identifying Aspects in Smalltalk Using Unique Methods

Experiences with Identifying Aspects in Smalltalk Using Unique Methods Experiences with Identifying Aspects in Smalltalk Using Unique Methods Kris Gybels and Andy Kellens Programming Technology Lab Vrije Universiteit Brussel Pleinlaan 2 Belgium {kris.gybels, andy.kellens}@vub.ac.be

More information

Analyzing Exception Flows of Aspect-Oriented Programs *

Analyzing Exception Flows of Aspect-Oriented Programs * Analyzing Exception Flows of Aspect-Oriented Programs * Roberta Coelho 1, Arndt von Staa 1 (PhD supervisor), Awais Rashid 2 (PhD co-supervisor) 1 Computer Science Department, PUC-Rio, Brazil 2 Computing

More information

Retrofitting Legacy Code for Authorization Policy Enforcement

Retrofitting Legacy Code for Authorization Policy Enforcement Retrofitting Legacy Code for Authorization Policy Enforcement Vinod Ganapathy, Trent Jaeger, and Somesh Jha Presented by Kevin Butler CSE 544-13 February 2007 Systems and Internet Infrastructure Security

More information

Laboratorio di Tecnologie dell'informazione

Laboratorio di Tecnologie dell'informazione Laboratorio di Tecnologie dell'informazione Ing. Marco Bertini marco.bertini@unifi.it http://www.micc.unifi.it/bertini/ Code testing: techniques and tools Testing can show the presence of errors, but not

More information

BitRouter s XML State Machine Technology. For Configurable Graphical User Interfaces. Abstract

BitRouter s XML State Machine Technology. For Configurable Graphical User Interfaces. Abstract BitRouter s XML State Machine Technology For Configurable Graphical User Interfaces Abstract Using BitRouter s patent pending XSM Technology, television and set top box designers rapidly prototype and

More information

An Introduction to Aspect-Oriented Programming

An Introduction to Aspect-Oriented Programming An Introduction to Aspect-Oriented Programming By Ken Wing Kuen Lee Reading Assignment COMP 610E 2002 Spring Software Development of E-Business Applications The Hong Kong University of Science

More information

Modularity: what, why and how

Modularity: what, why and how Modularity: what, why and how Stephen Kell Stephen.Kell@cl.cam.ac.uk Computer Laboratory University of Cambridge Modularity... p.1/33 Some problematic code Imagine implementing a syntax tree evaluator.

More information

Assuring Certainty through Effective Regression Testing. Vishvesh Arumugam

Assuring Certainty through Effective Regression Testing. Vishvesh Arumugam Assuring Certainty through Effective Regression Testing Vishvesh Arumugam Agenda Introduction The Problem Magnitude Management Regression Test Efficiency Solution and Approach Test Suite Maintenance Determining

More information

Applying and combining three different aspect mining techniques

Applying and combining three different aspect mining techniques Software Qual J (2006) 14:209 231 DOI 10.1007/s11219-006-9217-3 Applying and combining three different aspect mining techniques M. Ceccato M. Marin K. Mens L. Moonen P. Tonella T. Tourwé C Science + Business

More information

Applying Aspect Oriented Programming on Security

Applying Aspect Oriented Programming on Security Original Article Applying Aspect Oriented Programming on Security Mohammad Khalid Pandit* 1, Azra Nazir 1 and Arutselvan M 2 1 Department of computer Science and engineering, National institute of technology

More information

A Model for Software Plans

A Model for Software Plans A Model for Software Plans Robert R. Painter and David Coppit Department of Computer Science The College of William and Mary private static Vector readdata() { BufferedReader stdin = new BufferedReader(

More information

AJDT: Getting started with Aspect-Oriented Programming in Eclipse

AJDT: Getting started with Aspect-Oriented Programming in Eclipse AJDT: Getting started with Aspect-Oriented Programming in Eclipse Matt Chapman IBM Java Technology Hursley, UK AJDT Committer Andy Clement IBM Java Technology Hursley, UK AJDT & AspectJ Committer Mik Kersten

More information

CS536 Spring 2011 FINAL ID: Page 2 of 11

CS536 Spring 2011 FINAL ID: Page 2 of 11 CS536 Spring 2011 FINAL ID: Page 2 of 11 Question 2. (30 POINTS) Consider adding forward function declarations to the Little language. A forward function declaration is a function header (including its

More information

Domain-Driven Development with Ontologies and Aspects

Domain-Driven Development with Ontologies and Aspects Domain-Driven Development with Ontologies and Aspects Submitted for Domain-Specific Modeling workshop at OOPSLA 2005 Latest version of this paper can be downloaded from http://phruby.com Pavel Hruby Microsoft

More information

Product Line Evolution Using Source Packages

Product Line Evolution Using Source Packages Product Line Evolution Using Source Packages Arie van Deursen Merijn de Jonge CWI P.O. Box 94079, 1090 GB Amsterdam, The Netherlands http://www.cwi.nl/ {arie,mdejonge} Abstract We present a language-independent

More information

Identification of Crosscutting Concerns: A Survey

Identification of Crosscutting Concerns: A Survey Identification of Crosscutting Concerns: A Survey Arvinder Kaur University School of IT GGSIP, University, Delhi arvinder70@gmail.com Kalpana Johari CDAC, Noida kalpanajohari@cdacnoida.in Abstract Modularization

More information

CS558 Programming Languages

CS558 Programming Languages CS558 Programming Languages Winter 2018 Lecture 7b Andrew Tolmach Portland State University 1994-2018 Dynamic Type Checking Static type checking offers the great advantage of catching errors early And

More information

Chapter 1 Programming: A General Overview

Chapter 1 Programming: A General Overview Introduction Chapter 1 Programming: A General Overview This class is an introduction to the design, implementation, and analysis of algorithms. examples: sorting large amounts of data organizing information

More information

OS Customization versus OS Code Modularity

OS Customization versus OS Code Modularity OS Customization versus OS Code Modularity ECE 344 Fall 2006 Hans-Arno Jacobsen Thanks to Michael Gong, Vinod Muthusamy, and Charles Zhang for helping to find interesting examples et al. Possibly a Debugging

More information

Analyzing effect of Aspect Oriented concepts in design and implementation of design patterns with case study of Observer Pattern

Analyzing effect of Aspect Oriented concepts in design and implementation of design patterns with case study of Observer Pattern Analyzing effect of Aspect Oriented concepts in design and implementation of design patterns with case study of Observer Pattern Deepali A. Bhanage 1, Sachin D. Babar 2 Sinhgad Institute of Technology,

More information

Basic Principles of analysis and testing software

Basic Principles of analysis and testing software Basic Principles of analysis and testing software Software Reliability and Testing - Barbara Russo SwSE - Software and Systems Engineering Research Group 1 Basic principles of analysis and testing As in

More information

Aspect Oriented Programming

Aspect Oriented Programming 1 Aspect Oriented Programming Programming Languages Seminar Presenter: Barış Aktemur University of Illinois 18 Feb. 2004 Mostly taken from Bedir Tekinerdogan s slides Outline Introduction Problems Terminology

More information

A Context-Sensitive Memory Model for Verification of C/C++ Programs

A Context-Sensitive Memory Model for Verification of C/C++ Programs A Context-Sensitive Memory Model for Verification of C/C++ Programs Arie Gurfinkel and Jorge A. Navas University of Waterloo and SRI International SAS 17, August 30th, 2017 Gurfinkel and Navas (UWaterloo/SRI)

More information

Closures. Mooly Sagiv. Michael Clarkson, Cornell CS 3110 Data Structures and Functional Programming

Closures. Mooly Sagiv. Michael Clarkson, Cornell CS 3110 Data Structures and Functional Programming Closures Mooly Sagiv Michael Clarkson, Cornell CS 3110 Data Structures and Functional Programming t ::= x x. t t t Call-by-value big-step Operational Semantics terms variable v ::= values abstraction x.

More information

DECOMPOSITION, ABSTRACTION, FUNCTIONS

DECOMPOSITION, ABSTRACTION, FUNCTIONS DECOMPOSITION, ABSTRACTION, FUNCTIONS (download slides and.py files follow along!) 6.0001 LECTURE 4 6.0001 LECTURE 4 1 LAST TIME while loops vs for loops should know how to write both kinds should know

More information

Implementing evolution: Aspect-Oriented Programming

Implementing evolution: Aspect-Oriented Programming 2IS55 Software Evolution Implementing evolution: Aspect-Oriented Programming Alexander Serebrenik Last week Assignment 8 How is it going? Questions to Marcel: m.f.v.amstel@tue.nl Deadline: Tuesday, June

More information

Laboratorio di Tecnologie dell'informazione

Laboratorio di Tecnologie dell'informazione Laboratorio di Tecnologie dell'informazione Ing. Marco Bertini marco.bertini@unifi.it http://www.micc.unifi.it/bertini/ Code testing: techniques and tools Testing can show the presence of errors, but not

More information

The do s and don ts of error handling. Joe Armstrong

The do s and don ts of error handling. Joe Armstrong The do s and don ts of error handling Joe Armstrong A system is fault tolerant if it continues working even if something is wrong Work like this is never finished it s always in-progress Hardware can fail

More information

Assessing Aspect-Oriented Artifacts: Towards a Tool-Supported Quantitative Method

Assessing Aspect-Oriented Artifacts: Towards a Tool-Supported Quantitative Method Assessing Aspect-Oriented Artifacts: Towards a Tool-Supported Quantitative Method Eduardo Figueiredo 1, Alessandro Garcia 2, Cláudio Sant Anna 1, Uirá Kulesza 1, Carlos Lucena 1 1 PUC-Rio, Computer Science

More information

Rationalizing Android Development. Philipp Kumar

Rationalizing Android Development. Philipp Kumar Rationalizing Android Development Philipp Kumar Who am I? Philipp Kumar akquinet tech@spree GmbH Mobile Solutions Focus: Android and its Enterprise Integration Who are we? UI Design JBoss Consulting OSGi

More information

Chapitre 6 Programmation orientée aspect (AOP)

Chapitre 6 Programmation orientée aspect (AOP) 6 Programmation orientée aspect (AOP) 2I1AC3 : Génie logiciel et Patrons de conception Régis Clouard, ENSICAEN - GREYC «L'homme est le meilleur ordinateur que l'on puisse embarquer dans un engin spatial...

More information

Dynamic Aspect Composition using Logic Metaprogramming

Dynamic Aspect Composition using Logic Metaprogramming Vrije Universiteit Brussel - Belgium Faculty of Sciences In Collaboration with Ecole des Mines de Nantes - France and Universidad National de La Plata - Argentina 2001-2002 VRIJE UNIVERSITEIT BRUSSEL SCIENTIA

More information

Dynamic Weaving for Building Reconfigurable Software Systems

Dynamic Weaving for Building Reconfigurable Software Systems Dynamic Weaving for Building Reconfigurable Software Systems JAGDISH LAKHANI lakhjag@iitedu Computer Science Dept Illinois Institute of Technology Chicago, IL 60616 FAISAL AKKAWI akkawif@iitedu Computer

More information

Topics in Software Testing

Topics in Software Testing Dependable Software Systems Topics in Software Testing Material drawn from [Beizer, Sommerville] Software Testing Software testing is a critical element of software quality assurance and represents the

More information

Aspect-Oriented Software Development

Aspect-Oriented Software Development Claudia Marcos cmarcos@exa.unicen.edu.ar ISISTAN Instituto de Sistemas Tandil Facultad de Ciencias Exactas - UNICEN Current Methods and Languages Most current programming languages support abstraction

More information

Supporting Software Maintenance and Evolution with Intentional source-code Views 1

Supporting Software Maintenance and Evolution with Intentional source-code Views 1 Supporting Software Maintenance and Evolution with Intentional source-code Views 1 Kim Mens and Bernard Poll Département d Ingénierie Informatique, Université catholique de Louvain Place Sainte-Barbe 2,

More information

Programming AspectJ with Eclipse and AJDT, By Example. Chien-Tsun Chen Sep. 21, 2003

Programming AspectJ with Eclipse and AJDT, By Example. Chien-Tsun Chen Sep. 21, 2003 Programming AspectJ with Eclipse and AJDT, By Example Chien-Tsun Chen Sep. 21, 2003 ctchen@ctchen.idv.tw References R. Laddad, I want my AOP!, Part 1-Part3, JavaWorld, 2002. R. Laddad, AspectJ in Action,

More information

Extraction of Features from 'C' Programs

Extraction of Features from 'C' Programs Extraction of Features from 'C' Programs Vijaykumar Mantri Department of Information Technology B.V.Raju Institute of Technology Ashok Shigli Department of Biomedical Engineering B.V.Raju Institute of

More information

Hyperkernel: Push-Button Verification of an OS Kernel

Hyperkernel: Push-Button Verification of an OS Kernel Hyperkernel: Push-Button Verification of an OS Kernel Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, and Xi Wang The OS Kernel is a critical component Essential

More information

Evaluating the Evolution of a C Application

Evaluating the Evolution of a C Application Evaluating the Evolution of a C Application Elizabeth Burd, Malcolm Munro Liz.Burd@dur.ac.uk The Centre for Software Maintenance University of Durham South Road Durham, DH1 3LE, UK Abstract This paper

More information

Transactions on Information and Communications Technologies vol 19, 1997 WIT Press, ISSN

Transactions on Information and Communications Technologies vol 19, 1997 WIT Press,  ISSN Gap Repair in Water Level Measurement Data Using Neural Networks P. van der Veer, J. Cser, O. Schleider & E. Kerckhoffs Delft University of Technology, Faculties of Civil Engineering and Informatics, Postbus

More information

Aspect Oriented Java RMI Server

Aspect Oriented Java RMI Server Aspect Oriented Java RMI Server Inderjit Singh Dhanoa BIS College of Engineering & Tech., Moga inderp10@yahoo.co.in Er.Dalwinder Singh Salaria Lovely Professional University ds_salaria@yahoo.co.in ABSTRACT

More information

CS 112 Introduction to Computing II. Wayne Snyder Computer Science Department Boston University

CS 112 Introduction to Computing II. Wayne Snyder Computer Science Department Boston University 9/5/6 CS Introduction to Computing II Wayne Snyder Department Boston University Today: Arrays (D and D) Methods Program structure Fields vs local variables Next time: Program structure continued: Classes

More information

Types and Type Inference

Types and Type Inference CS 242 2012 Types and Type Inference Notes modified from John Mitchell and Kathleen Fisher Reading: Concepts in Programming Languages, Revised Chapter 6 - handout on Web!! Outline General discussion of

More information

A Domain-Specific Language for Ubiquitous Healthcare

A Domain-Specific Language for Ubiquitous Healthcare A Domain-Specific Language for Ubiquitous Healthcare Jennifer Munnelly Siobhán Clarke Trinity College Dublin munnelj, sclarke @cs.tcd.ie Abstract The development of ubiquitous healthcare applications has

More information

An Aspect-Oriented Approach. Henrique Rebêlo Informatics Center

An Aspect-Oriented Approach. Henrique Rebêlo Informatics Center An Aspect-Oriented Approach to implement JML Features Henrique Rebêlo Informatics Center Federal University of Pernambuco Summary jmlc problems bigger code, slower code, no suppport for Java ME, and bad

More information

Parlay Service Access Requirements

Parlay Service Access Requirements Parlay Service Access Requirements Candidate Version 1.0 01 Dec 2009 Open Mobile Alliance OMA-RD-PSA-V1_0-20091201-C [OMA-Template-Spec-20080430-I] OMA-RD-PSA-V1_0-20091201-C Page 2 (2) Use of this document

More information

ENERGY 211 / CME 211. Functions

ENERGY 211 / CME 211. Functions ENERGY 211 / CME 211 Lecture 8 October 8, 2008 1 Functions So far, we have seen programs in which all code resides within a main function Complex programs consist of subprograms that perform particular

More information

SERG. An Integrated Crosscutting Concern Migration Strategy and its Application to JHoTDraw

SERG. An Integrated Crosscutting Concern Migration Strategy and its Application to JHoTDraw Delft University of Technology Software Engineering Research Group Technical Report Series An Integrated Crosscutting Concern Migration Strategy and its Application to JHoTDraw Marius Marin, Leon Moonen

More information

Lab 1: Introduction to C Programming. (Creating a program using the Microsoft developer Studio, Compiling and Linking)

Lab 1: Introduction to C Programming. (Creating a program using the Microsoft developer Studio, Compiling and Linking) Lab 1: Introduction to C Programming (Creating a program using the Microsoft developer Studio, Compiling and Linking) Learning Objectives 0. To become familiar with Microsoft Visual C++ 6.0 environment

More information

CSE143 Exam with answers MIDTERM #1, 1/26/2001 Problem numbering may differ from the test as given.

CSE143 Exam with answers MIDTERM #1, 1/26/2001 Problem numbering may differ from the test as given. CSE143 Exam with answers MIDTERM #1, 1/26/2001 Problem numbering may differ from the test as given. All multiple choice questions are equally weighted. You can generally assume that code shown in the questions

More information

Verification and Test with Model-Based Design

Verification and Test with Model-Based Design Verification and Test with Model-Based Design Flight Software Workshop 2015 Jay Abraham 2015 The MathWorks, Inc. 1 The software development process Develop, iterate and specify requirements Create high

More information

CSE 201 JAVA PROGRAMMING I. Copyright 2016 by Smart Coding School

CSE 201 JAVA PROGRAMMING I. Copyright 2016 by Smart Coding School CSE 201 JAVA PROGRAMMING I Primitive Data Type Primitive Data Type 8-bit signed Two s complement Integer -128 ~ 127 Primitive Data Type 16-bit signed Two s complement Integer -32768 ~ 32767 Primitive Data

More information

Lecturer: Sebastian Coope Ashton Building, Room G.18

Lecturer: Sebastian Coope Ashton Building, Room G.18 Lecturer: Sebastian Coope Ashton Building, Room G.18 E-mail: coopes@liverpool.ac.uk COMP 201 web-page: http://www.csc.liv.ac.uk/~coopes/comp201 http://www.csc.liv.ac.uk/~pbell/comp201.html Lecture 13 Design

More information

Reminder the scope of a variable is the part of the program where that variable is visible Will this compile?

Reminder the scope of a variable is the part of the program where that variable is visible Will this compile? CS139 Nested Loops Loops and Scope Reminder the scope of a variable is the part of the program where that variable is visible Will this compile? while (number < 10) { String result = "latest " + number;

More information