Understanding the Faults in Serverless Computing Based Applications: An Empirical Study
This program is tentative and subject to change.
Serverless computing, as an emerging cloud com- puting paradigm, has been adopted to develop a wide range of software applications because of its simplicity of infrastructure management. Unfortunately, its characteristics also introduce new types of faults (e.g., faults due to insufficient computing resource allocation) and challenges to serverless computing-based applications (abbreviated as serverless applications). While prior studies have highlighted that serverless developers encounter various challenges, no attempts have been made to understand the faults in serverless applications. These faults may cause catastrophic consequences such as application crash, thereby hindering the further spread of serverless computing. We aim in this paper to understand the symptoms, root causes, and fix patterns of faults in serverless applications. To this end, we conduct an empirical study investigating developers’ issues on GitHub and posts on Stack Overflow (SO). We first identify 546 real-world serverless-related faults from GitHub and SO. Then, we manually analyze and construct taxonomies of the symptoms, root causes, and fix patterns for these faults, respectively. Our study leads to the first taxonomy for symptoms of serverless- related faults, covering 5 categories and 21 subcategories. The findings of our study inform that the Permission Denied error is the most common type (10.81%) of faults. Besides, the Incorrect Code Logic is the main cause (17.95%) behind the faults. Furthermore, we summarize 15 fix patterns that can resolve 73.63% of faults in this study. Based on the results, we provide actionable implications which can potentially facilitate research and assist developers in improving the development of serverless applications. Finally, we implement a knowledge-based Q&A tool named SAFHELPER to help developers in understanding and fixing faults
This program is tentative and subject to change.
Fri 12 SepDisplayed time zone: Auckland, Wellington change
13:30 - 15:00 | Session 16 - Security 2Research Papers Track / Industry Track / Tool Demonstration Track / Registered Reports / NIER Track at Case Room 2 260-057 Chair(s): Gregorio Robles Universidad Rey Juan Carlos | ||
13:30 15m | Understanding the Faults in Serverless Computing Based Applications: An Empirical Study Research Papers Track Changrong Xie National University of Defense Technology, Yang Zhang National University of Defense Technology, China, Xinjun Mao National University of Defense Technology, Kang Yang National University of Defense Technology, Tanghaoran Zhang National University of Defense Technology | ||
13:45 15m | Security Vulnerabilities in Docker Images: A Cross-Tag Study of Application Dependencies Research Papers Track Hamid Mohayeji Nasrabadi Eindhoven University of Technology, Eleni Constantinou University of Cyprus, Alexander Serebrenik Eindhoven University of Technology | ||
14:00 15m | Trust and Verify: Formally Verified and Upgradable Trusted Functions Research Papers Track Marcus Birgersson KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden, Musard Balliu KTH Royal Institute of Technology | ||
14:15 10m | LeakageDetector 2.0: Analyzing Data Leakage in Jupyter-Driven Machine Learning Pipelines Tool Demonstration Track Owen Truong Stevens Institute of Technology, Terrence Zhang Stevens Institute of Technology, Arnav Marchareddy Stevens Institute of Technology, Ryan Lee Stevens Institute of Technology, Jeffery Busold Stevens Institute of Technology, Michael Socas Stevens Institute of Technology, Eman Abdullah AlOmar Stevens Institute of Technology, USA | ||
14:25 10m | MalLoc: Towards Fine-grained Android Malicious Payload Localization via LLMs NIER Track Tiezhu Sun University of Luxembourg, Marco Alecci University of Luxembourg, Aleksandr Pilgun University of Luxembourg, Yewei Song University of Luxembourg, Xunzhu Tang University of Luxembourg, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg Pre-print | ||
14:35 15m | Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds Industry Track Jens Dietrich Victoria University of Wellington, Tim White Victoria University of Wellington, Behnaz Hassanshahi Oracle Labs, Australia, Paddy Krishnan Oracle Labs, Australia | ||
14:50 10m | Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs Registered Reports Maria Camporese University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam |