BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules
Thu 14 Nov 2019 15:10 - 15:20 at Cortez 1 - Program Analysis Chair(s): Coen De Roover
An enterprise system operates business by providing various services that are guided by set of certain business rules (BR) and constraints. These BR are usually written using plain Natural Language in operating procedures, terms and conditions, and other documents or in source code of legacy enterprise systems. For implementing the BR in a software system, expressing them as UML use-case specifications, or preparing for Merger & Acquisition (M&A) activity, analysts manually interpret the documents or try to identify constraints from the source code, leading to potential discrepancies and ambiguities. These issues in the software system can be resolved only after testing, which is a very tedious and expensive activity. To minimize such errors and efforts, we propose BuRRiTo framework consisting of automatic extraction of BR by mining documents and source code, ability to clean them of various anomalies like inconsistency, redundancies, conflicts, etc. and able to analyze the functional gaps present and performing semantic querying and searching.
Wed 13 NovDisplayed time zone: Tijuana, Baja California change
10:00 - 10:40 | |||
10:00 40mDemonstration | TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis Demonstrations Yuexing Wang Tsinghua University, Guang Chen Tsinghua University, Min Zhou Tsinghua University, Ming Gu Tsinghua University, Jiaguang Sun Tsinghua University | ||
10:00 40mDemonstration | BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules Demonstrations Pavan Kumar Chittimalli TCS Research, Kritika Anand TCS Research, Shrishti Pradhan TCS Research, Sayandeep Mitra TCS Research, Chandan Prakash TCS Research, Rohit Shere TCS Research, Ravindra Naik TCS Research, TRDDC, India | ||
10:00 40mDemonstration | Lancer: Your Code Tell Me What You Need Demonstrations Shufan Zhou School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Hao Zhong Shanghai Jiao Tong University | ||
10:00 40mDemonstration | TestCov: Robust Test-Suite Execution and Coverage Measurement Demonstrations Pre-print Media Attached File Attached | ||
10:00 40mDemonstration | Prema: A Tool for Precise Requirements Editing, Modeling and Analysis Demonstrations Yihao Huang East China Normal University, Jincao Feng East China Normal University, Hanyue Zheng East China Normal University, Jiayi Zhu East China Normal University, Shang Wang East China Normal University, Siyuan Jiang Eastern Michigan University, Weikai Miao Shanghai Key Lab for Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Geguang Pu East China Normal University&Shanghai Trusted Industrial Control Platform Co., Ltd | ||
10:00 40mDemonstration | XRaSE: Towards Virtually Tangible Software using Augmented Reality Demonstrations Rohit Mehra Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture | ||
10:00 40mDemonstration | MuSC: A Tool for Mutation Testing of Ethereum Smart Contract Demonstrations Zixin Li Nanjing University, Haoran Wu State Key Laboratory for Novel Software Technology, Nanjing University, Jiehui Xu Nanjing University, Xingya Wang State Key Laboratory for Novel Software Technology, Nanjing University, Lingming Zhang The University of Texas at Dallas, Zhenyu Chen Nanjing University | ||
10:00 40mDemonstration | VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-Threaded Programs with Lazy-CSeq Demonstrations Bernd Fischer Stellenbosch University, Salvatore La Torre Università degli Studi di Salerno, Gennaro Parlato University of Molise | ||
10:00 40mDemonstration | DeepMutation++: a Mutation Testing Framework for Deep Learning Systems Demonstrations Qiang Hu Kyushu University, Japan, Lei Ma Kyushu University, Xiaofei Xie Nanyang Technological University, Bing Yu Kyushu University, Japan, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University | ||
10:00 40mDemonstration | Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts Demonstrations Mark Mossberg Trail of Bits, Felipe Manzano Trail of Bits, Eric Hennenfent Trail of Bits, Alex Groce Northern Arizona University, Gustavo Grieco Trail of Bits, Josselin Feist Trail of Bits, Trent Brunson Trail of Bits, Artem Dinaburg Trail of Bits Media Attached | ||
10:00 40mDemonstration | ConVul: An Effective Tool for Detecting Concurrency Vulnerabilities Demonstrations Ruijie Meng University of Chinese Academy of Sciences, Biyun Zhu University of Chinese Academy of Sciences, Hao Yun University of Chinese Academy of Sciences, Haicheng Li University of Chinese Academy of Sciences, Yan Cai Institute of Software, Chinese Academy of Sciences, Zijiang Yang Western Michigan University | ||
10:00 40mDemonstration | mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines Demonstrations Reza Ahmadi Queen's University, Karim Jahed Queen's University, Juergen Dingel Queen's University, Kingston, Ontario |
Thu 14 NovDisplayed time zone: Tijuana, Baja California change
13:40 - 15:20 | Program AnalysisResearch Papers / Demonstrations at Cortez 1 Chair(s): Coen De Roover Vrije Universiteit Brussel | ||
13:40 20mTalk | Debreach: Mitigating Compression Side Channels via Static Analysis and Transformation Research Papers Brandon Paulsen University of Southern California, Chungha Sung University of Southern California, Peter Peterson University of Minnesota Duluth, Chao Wang USC | ||
14:00 20mTalk | Fine-grain memory object representation in symbolic execution Research Papers Martin Nowack Imperial College London | ||
14:20 20mTalk | RENN: Efficient Reverse Execution with Neural-Network-assisted Alias Analysis Research Papers Dongliang Mu Nanjing University, Wenbo Guo The Pennsylvania State University, Alejandro Cuevas The Pennsylvania State University, Yueqi Chen The Pennsylvania State University, Jinxuan Gai The Pennsylvania State University, Xinyu Xing The Pennsylvania State University, Bing Mao Nanjing University, Chengyu Song UC Riverside | ||
14:40 20mTalk | Batch Alias Analysis Research Papers Pre-print | ||
15:00 10mDemonstration | Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts Demonstrations Mark Mossberg Trail of Bits, Felipe Manzano Trail of Bits, Eric Hennenfent Trail of Bits, Alex Groce Northern Arizona University, Gustavo Grieco Trail of Bits, Josselin Feist Trail of Bits, Trent Brunson Trail of Bits, Artem Dinaburg Trail of Bits Media Attached | ||
15:10 10mDemonstration | BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules Demonstrations Pavan Kumar Chittimalli TCS Research, Kritika Anand TCS Research, Shrishti Pradhan TCS Research, Sayandeep Mitra TCS Research, Chandan Prakash TCS Research, Rohit Shere TCS Research, Ravindra Naik TCS Research, TRDDC, India |