3.8 Proceedings Paper

Generating Performance Distributions via Probabilistic Symbolic Execution

出版社

IEEE
DOI: 10.1145/2884781.2884794

关键词

Performance Analysis; Symbolic Execution

资金

  1. National Research Foundation, Prime Minister's Office, Singapore under its National Cybersecurity RD Program [NRF2014NCR-NCR001-30]
  2. US National Science Foundation (NSF) [1542117]
  3. Division of Computing and Communication Foundations
  4. Direct For Computer & Info Scie & Enginr [1542117] Funding Source: National Science Foundation

向作者/读者索取更多资源

Analyzing performance and understanding the potential bestcase, worst-case and distribution of program execution times are very important software engineering tasks. There have been model-based and program analysis-based approaches for performance analysis. Model-based approaches rely on analytical or design models derived from mathematical theories or software architecture abstraction, which are typically coarse-grained and could be imprecise. Program analysis-based approaches collect program pro files to identify performance bottlenecks, which often fail to capture the overall program performance. In this paper, we propose a performance analysis framework PerfPlotter. It takes the program source code and usage profile as inputs and generates a performance distribution that captures the input probability distribution over execution times for the program. It heuristically explores high probability and low-probability paths through probabilistic symbolic execution. Once a path is explored, it generates and runs a set of test inputs to model the performance of the path. Finally, it constructs the performance distribution for the program. We have implemented PerfPlotter based on the Symbolic PathFinder infrastructure, and experimentally demonstrated that PerfPlotter could accurately capture the bestcase, worst-case and distribution of program execution times. We also show that performance distributions can be applied to various important tasks such as performance understanding, bug validation, and algorithm selection.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据