Skip to main content
Top
Published in: Empirical Software Engineering 1/2021

01-01-2021

Empirical assessment of generating adversarial configurations for software product lines

Authors: Paul Temple, Gilles Perrouin, Mathieu Acher, Battista Biggio, Jean-Marc Jézéquel, Fabio Roli

Published in: Empirical Software Engineering | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Software product line (SPL) engineering allows the derivation of products tailored to stakeholders’ needs through the setting of a large number of configuration options. Unfortunately, options and their interactions create a huge configuration space which is either intractable or too costly to explore exhaustively. Instead of covering all products, machine learning (ML) approximates the set of acceptable products (e.g., successful builds, passing tests) out of a training set (a sample of configurations). However, ML techniques can make prediction errors yielding non-acceptable products wasting time, energy and other resources. We apply adversarial machine learning techniques to the world of SPLs and craft new configurations faking to be acceptable configurations but that are not and vice-versa. It allows to diagnose prediction errors and take appropriate actions. We develop two adversarial configuration generators on top of state-of-the-art attack algorithms and capable of synthesizing configurations that are both adversarial and conform to logical constraints. We empirically assess our generators within two case studies: an industrial video synthesizer (MOTIV) and an industry-strength, open-source Web-app configurator (JHipster). For the two cases, our attacks yield (up to) a 100% misclassification rate without sacrificing the logical validity of adversarial configurations. This work lays the foundations of a quality assurance framework for ML-based SPLs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Footnotes
1
Most common functions are linear, radial-based functions and polynomial
 
3
Therefore it was not available in our previous SPLC’19 contribution (Temple et al. 2019)
 
13
Except when d_max is set to 0.1 and for which we do not have any explanation.
 
14
Note that the baselines are reported for two different models; secML provides a complete library which comes with its own framework and pipeline, necessitating to learn a classifier with this library. The implementation can differ from the ones provided by scikit-learn which is the other library we have used before using secML.
 
Literature
go back to reference Acher M, Temple P, Jezequel JM, Galindo JA, Martinez J, Ziadi T (2018) Varylatex: learning paper variants that meet constraints. In: Proceedings of the 12th international workshop on variability modelling of software-intensive systems. ACM, pp 83–88 Acher M, Temple P, Jezequel JM, Galindo JA, Martinez J, Ziadi T (2018) Varylatex: learning paper variants that meet constraints. In: Proceedings of the 12th international workshop on variability modelling of software-intensive systems. ACM, pp 83–88
go back to reference Al-Hajjaji M, Benduhn F, Thüm T, Leich T, Saake G (2016) Mutation operators for preprocessor-based variability. In: Proceedings of the tenth international workshop on variability modelling of software-intensive systems, Salvador, Brazil, January 27–29, 2016, pp 81–88. https://doi.org/10.1145/2866614.2866626 Al-Hajjaji M, Benduhn F, Thüm T, Leich T, Saake G (2016) Mutation operators for preprocessor-based variability. In: Proceedings of the tenth international workshop on variability modelling of software-intensive systems, Salvador, Brazil, January 27–29, 2016, pp 81–88. https://​doi.​org/​10.​1145/​2866614.​2866626
go back to reference Alves Pereira J, Acher M, Martin H, Jézéquel JM (2020) Sampling effect on performance prediction of configurable systems: a case study. In: 11th International conference on performance engineering (ICPE’20). https://hal.inria.fr/hal-02356290 Alves Pereira J, Acher M, Martin H, Jézéquel JM (2020) Sampling effect on performance prediction of configurable systems: a case study. In: 11th International conference on performance engineering (ICPE’20). https://​hal.​inria.​fr/​hal-02356290
go back to reference Amand B, Cordy M, Heymans P, Acher M, Temple P, Jézéquel J M (2019) Towards learning-aided configuration in 3d printing: feasibility study and application to defect prediction. In: Proceedings of the 13th international workshop on variability modelling of software-intensive systems. ACM, p 7 Amand B, Cordy M, Heymans P, Acher M, Temple P, Jézéquel J M (2019) Towards learning-aided configuration in 3d printing: feasibility study and application to defect prediction. In: Proceedings of the 13th international workshop on variability modelling of software-intensive systems. ACM, p 7
go back to reference Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2006) Can machine learning be secure?. In: Proceedings of the 2006 ACM symposium on information, computer and communications security. ACM, New York, pp 16–25 Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2006) Can machine learning be secure?. In: Proceedings of the 2006 ACM symposium on information, computer and communications security. ACM, New York, pp 16–25
go back to reference Batory DS (2005) Feature models, grammars, and propositional formulas. In: SPLC’05, LNCS, vol 3714. Springer, Berlin, pp 7–20 Batory DS (2005) Feature models, grammars, and propositional formulas. In: SPLC’05, LNCS, vol 3714. Springer, Berlin, pp 7–20
go back to reference Bécan G, Behjati R, Gotlieb A, Acher M (2015) Synthesis of attributed feature models from product descriptions. In: SPLC’15 Bécan G, Behjati R, Gotlieb A, Acher M (2015) Synthesis of attributed feature models from product descriptions. In: SPLC’15
go back to reference Bellman R (1957) Dynamic programming, 1st edn. Princeton University Press, Princeton Bellman R (1957) Dynamic programming, 1st edn. Princeton University Press, Princeton
go back to reference Benavides D, Segura S, Ruiz-Cortes A (2010) Automated analysis of feature models 20 years later: a literature review. Inf Syst 35(6):615–636CrossRef Benavides D, Segura S, Ruiz-Cortes A (2010) Automated analysis of feature models 20 years later: a literature review. Inf Syst 35(6):615–636CrossRef
go back to reference Biggio B, Roli F (2018) Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit 84:317–331CrossRef Biggio B, Roli F (2018) Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit 84:317–331CrossRef
go back to reference Biggio B, Corona I, Maiorca D, Nelson B, Šrndić N, Laskov P, Giacinto G, Roli F (2013a) Evasion attacks against machine learning at test time. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, Berlin, pp 387–402 Biggio B, Corona I, Maiorca D, Nelson B, Šrndić N, Laskov P, Giacinto G, Roli F (2013a) Evasion attacks against machine learning at test time. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, Berlin, pp 387–402
go back to reference Biggio B, Fumera G, Roli F (2014a) Pattern recognition systems under attack: design issues and research challenges. Int J Pattern Recognit Artif Intell 28(7):1460002CrossRef Biggio B, Fumera G, Roli F (2014a) Pattern recognition systems under attack: design issues and research challenges. Int J Pattern Recognit Artif Intell 28(7):1460002CrossRef
go back to reference Biggio B, Fumera G, Roli F (2014b) Security evaluation of pattern classifiers under attack. IEEE Trans Knowl Data Eng 26(4):984–996CrossRef Biggio B, Fumera G, Roli F (2014b) Security evaluation of pattern classifiers under attack. IEEE Trans Knowl Data Eng 26(4):984–996CrossRef
go back to reference Carvalho L, Guimarães MA, Ribeiro M, Fernandes L, Al-Hajjaji M, Gheyi R, Thüm T (2018) Equivalent mutants in configurable systems:an empirical study. In: Proceedings of the 12th international workshop on variability modelling of software-intensive systems, VAMOS 2018, Madrid, Spain, February 7–9, 2018, pp 11–18. https://doi.org/10.1145/3168365.3168379 Carvalho L, Guimarães MA, Ribeiro M, Fernandes L, Al-Hajjaji M, Gheyi R, Thüm T (2018) Equivalent mutants in configurable systems:an empirical study. In: Proceedings of the 12th international workshop on variability modelling of software-intensive systems, VAMOS 2018, Madrid, Spain, February 7–9, 2018, pp 11–18. https://​doi.​org/​10.​1145/​3168365.​3168379
go back to reference Chakraborty S, Fremont DJ, Meel KS, Seshia SA, Vardi MY (2015) On parallel scalable uniform SAT witness generation. In: Tools and algorithms for the construction and analysis of systems TACAS’15 2015, London, UK, April 11–18, 2015. Proceedings, pp 304–319 Chakraborty S, Fremont DJ, Meel KS, Seshia SA, Vardi MY (2015) On parallel scalable uniform SAT witness generation. In: Tools and algorithms for the construction and analysis of systems TACAS’15 2015, London, UK, April 11–18, 2015. Proceedings, pp 304–319
go back to reference Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. J Artif Intell Res 16:321–357CrossRef Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. J Artif Intell Res 16:321–357CrossRef
go back to reference Classen A, Boucher Q, Heymans P (2011) A text-based approach to feature modelling: syntax and semantics of TVL. Sci Comput Program Spec Iss Softw Evol Adapt Var 76(12):1130–1143 Classen A, Boucher Q, Heymans P (2011) A text-based approach to feature modelling: syntax and semantics of TVL. Sci Comput Program Spec Iss Softw Evol Adapt Var 76(12):1130–1143
go back to reference Clements P, Northrop LM (2001) Software product lines: practices and patterns. Addison-Wesley Professional, Boston Clements P, Northrop LM (2001) Software product lines: practices and patterns. Addison-Wesley Professional, Boston
go back to reference Cohen MB, Dwyer MB, Society IC (2008) Constructing interaction test suites for highly-configurable systems in the presence of constraints : a greedy approach. 34, . IEEE Trans Softw Eng 34:633–650CrossRef Cohen MB, Dwyer MB, Society IC (2008) Constructing interaction test suites for highly-configurable systems in the presence of constraints : a greedy approach. 34, . IEEE Trans Softw Eng 34:633–650CrossRef
go back to reference Demontis A, Melis M, Pintor M, Jagielski M, Biggio B, Oprea A, Nita-Rotaru C, Roli F (2018) On the intriguing connections of regularization, input gradients and transferability of evasion and poisoning attacks. CoRR arXiv:1809.02861 Demontis A, Melis M, Pintor M, Jagielski M, Biggio B, Oprea A, Nita-Rotaru C, Roli F (2018) On the intriguing connections of regularization, input gradients and transferability of evasion and poisoning attacks. CoRR arXiv:1809.​02861
go back to reference Dhillon GS, Azizzadenesheli K, Lipton ZC, Bernstein J, Kossaifi J, Khanna A, Anandkumar A (2018) Stochastic activation pruning for robust adversarial defense. arXiv:1803.01442 Dhillon GS, Azizzadenesheli K, Lipton ZC, Bernstein J, Kossaifi J, Khanna A, Anandkumar A (2018) Stochastic activation pruning for robust adversarial defense. arXiv:1803.​01442
go back to reference Dosselman RW, Yang XD (2012) No-reference noise and blur detection via the fourier transform. Tech. rep., University of Regina, Canada Dosselman RW, Yang XD (2012) No-reference noise and blur detection via the fourier transform. Tech. rep., University of Regina, Canada
go back to reference Elsayed GF, Shankar S, Cheung B, Papernot N, Kurakin A, Goodfellow I, Sohl-Dickstein J (2018) Adversarial examples that fool both human and computer vision. arXiv:1802.08195 Elsayed GF, Shankar S, Cheung B, Papernot N, Kurakin A, Goodfellow I, Sohl-Dickstein J (2018) Adversarial examples that fool both human and computer vision. arXiv:1802.​08195
go back to reference Evtimov I, Eykholt K, Fernandes E, Kohno T, Li B, Prakash A, Rahmati A, Song D (2017) Robust physical-world attacks on deep learning models, 1. arXiv:1707.08945 Evtimov I, Eykholt K, Fernandes E, Kohno T, Li B, Prakash A, Rahmati A, Song D (2017) Robust physical-world attacks on deep learning models, 1. arXiv:1707.​08945
go back to reference Galindo Duarte JA, Alférez M, Acher M, Baudry B, Benavides D (2014) A variability-based testing approach for synthesizing video sequences. In: ISSTA ’14: international symposium on software testing and analysis, San José. https://hal.inria.fr/hal-01003148 Galindo Duarte JA, Alférez M, Acher M, Baudry B, Benavides D (2014) A variability-based testing approach for synthesizing video sequences. In: ISSTA ’14: international symposium on software testing and analysis, San José. https://​hal.​inria.​fr/​hal-01003148
go back to reference Gargantini A, Petke J, Radavelli M (2017) Combinatorial interaction testing for automated constraint repair. In: 2017 IEEE international conference on software testing, verification and validation workshops (ICSTW). IEEE, pp 239–248 Gargantini A, Petke J, Radavelli M (2017) Combinatorial interaction testing for automated constraint repair. In: 2017 IEEE international conference on software testing, verification and validation workshops (ICSTW). IEEE, pp 239–248
go back to reference Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672–2680 Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672–2680
go back to reference Guo J, Czarnecki K, Apel S, Siegmund N, Wasowski A (2013) Variability-aware performance prediction: a statistical learning approach. In: ASE, vol 55, pp 491–507 Guo J, Czarnecki K, Apel S, Siegmund N, Wasowski A (2013) Variability-aware performance prediction: a statistical learning approach. In: ASE, vol 55, pp 491–507
go back to reference Guo C, Rana M, Cisse M, van der Maaten L (2017) Countering adversarial images using input transformations. arXiv:1711.00117 Guo C, Rana M, Cisse M, van der Maaten L (2017) Countering adversarial images using input transformations. arXiv:1711.​00117
go back to reference Ierusalimschy R (2006) Programming in Lua, 2nd edn Lua.Org Ierusalimschy R (2006) Programming in Lua, 2nd edn Lua.Org
go back to reference Johansen MF, Haugen OY, Fleurey F (2012) An algorithm for generating t-wise covering arrays from large feature models SPLC’12 Johansen MF, Haugen OY, Fleurey F (2012) An algorithm for generating t-wise covering arrays from large feature models SPLC’12
go back to reference Kaltenecker C, Grebhahn A, Siegmund N, Guo J, Apel S (2019) Distance-based sampling of software configuration spaces. In: Proceedings of the IEEE/ACM international conference on software engineering (ICSE). ACM Kaltenecker C, Grebhahn A, Siegmund N, Guo J, Apel S (2019) Distance-based sampling of software configuration spaces. In: Proceedings of the IEEE/ACM international conference on software engineering (ICSE). ACM
go back to reference Kaner C, Bach J, Pettichord B (2001) Lessons learned in software testing. Wiley, New York Kaner C, Bach J, Pettichord B (2001) Lessons learned in software testing. Wiley, New York
go back to reference Kang KC, Cohen SG, Hess JA, Novak WE, Peterson AS (1990) Feature-oriented domain analysis (FODA) feasibility study. Tech. rep., DTIC Document Kang KC, Cohen SG, Hess JA, Novak WE, Peterson AS (1990) Feature-oriented domain analysis (FODA) feasibility study. Tech. rep., DTIC Document
go back to reference Knüppel A, Thüm T, Mennicke S, Meinicke J, Schaefer I (2018) Is there a mismatch between real-world feature models and product-line research? In: Tichy M, Bodden E, Kuhrmann M, Wagner S, Steghöfer J (eds) Software Engineering und Software Management 2018, Fachtagung des GI-Fachbereichs Softwaretechnik, SE 2018, 5.-9. März 2018, Ulm, Germany. LNI, vol P-279. Gesellschaft für Informatik, pp 53–54. https://dl.gi.de/20.500.12116/16312 Knüppel A, Thüm T, Mennicke S, Meinicke J, Schaefer I (2018) Is there a mismatch between real-world feature models and product-line research? In: Tichy M, Bodden E, Kuhrmann M, Wagner S, Steghöfer J (eds) Software Engineering und Software Management 2018, Fachtagung des GI-Fachbereichs Softwaretechnik, SE 2018, 5.-9. März 2018, Ulm, Germany. LNI, vol P-279. Gesellschaft für Informatik, pp 53–54. https://​dl.​gi.​de/​20.​500.​12116/​16312
go back to reference Krismayer T, Rabiser R, Grünbacher P (2017) Mining constraints for event-based monitoring in systems of systems. In: ASE. IEEE Press, pp 826–831 Krismayer T, Rabiser R, Grünbacher P (2017) Mining constraints for event-based monitoring in systems of systems. In: ASE. IEEE Press, pp 826–831
go back to reference Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world. arXiv:1607.02533 Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world. arXiv:1607.​02533
go back to reference Lopez-Herrejon RE, Galindo JA, Benavides D, Segura S, Egyed A (2012) Reverse engineering feature models with evolutionary algorithms: an exploratory study. In: SSBSE’12, LNCS, vol 7515. Springer, pp 168–182 Lopez-Herrejon RE, Galindo JA, Benavides D, Segura S, Egyed A (2012) Reverse engineering feature models with evolutionary algorithms: an exploratory study. In: SSBSE’12, LNCS, vol 7515. Springer, pp 168–182
go back to reference Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083 Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv:1706.​06083
go back to reference Mann HB, Whitney DR (1947) On a test of whether one of two random variables is stochastically larger than the other. Ann Math Stat 18:50–60MathSciNetCrossRef Mann HB, Whitney DR (1947) On a test of whether one of two random variables is stochastically larger than the other. Ann Math Stat 18:50–60MathSciNetCrossRef
go back to reference Nelson B, Barreno M, Chi FJ, Joseph AD, Rubinstein BI, Saini U, Sutton CA, Tygar JD, Xia K (2008) Exploiting machine learning to subvert your spam filter. LEET 8:1–9 Nelson B, Barreno M, Chi FJ, Joseph AD, Rubinstein BI, Saini U, Sutton CA, Tygar JD, Xia K (2008) Exploiting machine learning to subvert your spam filter. LEET 8:1–9
go back to reference Oh J, Batory DS, Myers M, Siegmund N (2017b) Finding near-optimal configurations in product lines by random sampling. In: Proceedings of the 2017 11th joint meeting on foundations of software engineering, ESEC/FSE 2017, Paderborn, Germany, September 4–8, 2017, pp 61–71 Oh J, Batory DS, Myers M, Siegmund N (2017b) Finding near-optimal configurations in product lines by random sampling. In: Proceedings of the 2017 11th joint meeting on foundations of software engineering, ESEC/FSE 2017, Paderborn, Germany, September 4–8, 2017, pp 61–71
go back to reference Pascual GG, Lopez-Herrejon RE, Pinto M, Fuentes L, Egyed A (2015) Applying multiobjective evolutionary algorithms to dynamic software product lines for reconfiguring mobile applications. J Syst Softw 103:392–411CrossRef Pascual GG, Lopez-Herrejon RE, Pinto M, Fuentes L, Egyed A (2015) Applying multiobjective evolutionary algorithms to dynamic software product lines for reconfiguring mobile applications. J Syst Softw 103:392–411CrossRef
go back to reference Pereira JA, Martin H, Acher M, Jézéquel J M, Botterweck G, Ventresque A (2019) Learning software configuration spaces: a systematic literature review Pereira JA, Martin H, Acher M, Jézéquel J M, Botterweck G, Ventresque A (2019) Learning software configuration spaces: a systematic literature review
go back to reference Plazar Q, Acher M, Perrouin G, Devroey X, Cordy M (2019a) Uniform sampling of SAT solutions for configurable systems: are we there yet?. In: 12th IEEE conference on software testing, validation and verification, ICST 2019, Xi’an, China, April 22–27, 2019, pp 240–251. https://doi.org/10.1109/ICST.2019.00032 Plazar Q, Acher M, Perrouin G, Devroey X, Cordy M (2019a) Uniform sampling of SAT solutions for configurable systems: are we there yet?. In: 12th IEEE conference on software testing, validation and verification, ICST 2019, Xi’an, China, April 22–27, 2019, pp 240–251. https://​doi.​org/​10.​1109/​ICST.​2019.​00032
go back to reference Plazar Q, Acher M, Perrouin G, Devroey X, Cordy M (2019b) Uniform sampling of sat solutions for configurable systems: are we there yet?. In: ICST 2019—12th international conference on software testing, verification, and validation, Xian, pp 1–12. https://hal.inria.fr/hal-01991857 Plazar Q, Acher M, Perrouin G, Devroey X, Cordy M (2019b) Uniform sampling of sat solutions for configurable systems: are we there yet?. In: ICST 2019—12th international conference on software testing, verification, and validation, Xian, pp 1–12. https://​hal.​inria.​fr/​hal-01991857
go back to reference Pohl K, Böckle G, van der Linden FJ (2005) Software product line engineering: foundations, principles and techniques. Springer, BerlinCrossRef Pohl K, Böckle G, van der Linden FJ (2005) Software product line engineering: foundations, principles and techniques. Springer, BerlinCrossRef
go back to reference Raible M (2015) The JHipster mini-book. C4Media Raible M (2015) The JHipster mini-book. C4Media
go back to reference Sarkar A, Guo J, Siegmund N, Apel S, Czarnecki K (2015) Cost-efficient sampling for performance prediction of configurable systems (t). In: ASE’15 Sarkar A, Guo J, Siegmund N, Apel S, Czarnecki K (2015) Cost-efficient sampling for performance prediction of configurable systems (t). In: ASE’15
go back to reference Schobbens PY, Heymans P, Trigaux JC (2006) Feature diagrams: a survey and a formal semantics. In: RE ’06: proceedings of the 14th IEEE international requirements engineering conference (RE’06). IEEE Computer Society, Washington, DC, pp 136–145. https://doi.org/10.1109/RE.2006.23 Schobbens PY, Heymans P, Trigaux JC (2006) Feature diagrams: a survey and a formal semantics. In: RE ’06: proceedings of the 14th IEEE international requirements engineering conference (RE’06). IEEE Computer Society, Washington, DC, pp 136–145. https://​doi.​org/​10.​1109/​RE.​2006.​23
go back to reference Schobbens PY, Heymans P, Trigaux JC, Bontemps Y (2007) Generic semantics of feature diagrams. Comput Netw 51(2):456–479CrossRef Schobbens PY, Heymans P, Trigaux JC, Bontemps Y (2007) Generic semantics of feature diagrams. Comput Netw 51(2):456–479CrossRef
go back to reference Sharif M, Bhagavatula S, Bauer L, Reiter MK (2016) Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 1528–1540 Sharif M, Bhagavatula S, Bauer L, Reiter MK (2016) Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 1528–1540
go back to reference She S, Lotufo R, Berger T, Wasowski A, Czarnecki K (2011) Reverse engineering feature models. In: ICSE, pp 461–470 She S, Lotufo R, Berger T, Wasowski A, Czarnecki K (2011) Reverse engineering feature models. In: ICSE, pp 461–470
go back to reference She S, Ryssel U, Andersen N, Wasowski A, Czarnecki K (2014) Efficient synthesis of feature models. Inf Softw Technol 56(9):106–115CrossRef She S, Ryssel U, Andersen N, Wasowski A, Czarnecki K (2014) Efficient synthesis of feature models. Inf Softw Technol 56(9):106–115CrossRef
go back to reference Siegmund N, RosenmüLler M, KäStner C, Giarrusso PG, Apel S, Kolesnikov SS (2013) Scalable prediction of non-functional properties in software product lines: Footprint and memory consumption. Inf Softw Technol 55: 491–507 Siegmund N, RosenmüLler M, KäStner C, Giarrusso PG, Apel S, Kolesnikov SS (2013) Scalable prediction of non-functional properties in software product lines: Footprint and memory consumption. Inf Softw Technol 55: 491–507
go back to reference Siegmund N, Grebhahn A, Kästner C, Apel S (2015) Performance-influence models for highly configurable systems. In: ESEC/FSE’15 Siegmund N, Grebhahn A, Kästner C, Apel S (2015) Performance-influence models for highly configurable systems. In: ESEC/FSE’15
go back to reference ter Beek MH, Fantechi A, Gnesi S, Semini L (2016b) Variability-based design of services for smart transportation systems. In: Leveraging Applications of formal methods, verification and validation: discussion, dissemination, applications—7th international symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II, pp 465–481. https://doi.org/10.1007/978-3-319-47169-3_38 ter Beek MH, Fantechi A, Gnesi S, Semini L (2016b) Variability-based design of services for smart transportation systems. In: Leveraging Applications of formal methods, verification and validation: discussion, dissemination, applications—7th international symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II, pp 465–481. https://​doi.​org/​10.​1007/​978-3-319-47169-3_​38
go back to reference Thüm T, Apel S, Kästner C, Schaefer I, Saake G (2014) A classification and survey of analysis strategies for software product lines. ACM Comput Surv Thüm T, Apel S, Kästner C, Schaefer I, Saake G (2014) A classification and survey of analysis strategies for software product lines. ACM Comput Surv
go back to reference Varshosaz M, Al-Hajjaji M, Thüm T, Runge T, Mousavi MR, Schaefer I (2018) A classification of product sampling for software product lines. In: Proceedings of the 22nd international systems and software product line conference—volume 1, SPLC 2018, Gothenburg, Sweden, September 10–14, 2018, pp 1–13. https://doi.org/10.1145/3233027.3233035 Varshosaz M, Al-Hajjaji M, Thüm T, Runge T, Mousavi MR, Schaefer I (2018) A classification of product sampling for software product lines. In: Proceedings of the 22nd international systems and software product line conference—volume 1, SPLC 2018, Gothenburg, Sweden, September 10–14, 2018, pp 1–13. https://​doi.​org/​10.​1145/​3233027.​3233035
go back to reference Xiong Y, Hubaux A, She S, Czarnecki K (2012) Generating range fixes for software configuration. In: 34th International conference on software engineering Xiong Y, Hubaux A, She S, Czarnecki K (2012) Generating range fixes for software configuration. In: 34th International conference on software engineering
go back to reference Yilmaz C, Cohen MB, Porter AA (2006) Covering arrays for efficient fault characterization in complex configuration spaces. IEEE Trans Softw Eng 32(1):20–34CrossRef Yilmaz C, Cohen MB, Porter AA (2006) Covering arrays for efficient fault characterization in complex configuration spaces. IEEE Trans Softw Eng 32(1):20–34CrossRef
Metadata
Title
Empirical assessment of generating adversarial configurations for software product lines
Authors
Paul Temple
Gilles Perrouin
Mathieu Acher
Battista Biggio
Jean-Marc Jézéquel
Fabio Roli
Publication date
01-01-2021
Publisher
Springer US
Published in
Empirical Software Engineering / Issue 1/2021
Print ISSN: 1382-3256
Electronic ISSN: 1573-7616
DOI
https://doi.org/10.1007/s10664-020-09915-7

Other articles of this Issue 1/2021

Empirical Software Engineering 1/2021 Go to the issue

Premium Partner