US 12,314,690 B2
Methods and apparatus for automatic detection of software bugs
Fangke Ye, Atlanta, GA (US); Justin Gottschlich, Santa Clara, CA (US); Shengtian Zhou, Palo Alto, CA (US); Roshni Iyer, Fremont, CA (US); and Jesmin Jahan Tithi, San Jose, CA (US)
Assigned to INTEL CORPORATION, Santa Clara, CA (US)
Filed by Intel Corporation, Santa Clara, CA (US)
Filed on Dec. 23, 2020, as Appl. No. 17/133,238.
Prior Publication US 2021/0182031 A1, Jun. 17, 2021
Int. Cl. G06F 8/34 (2018.01); G06F 8/60 (2018.01); G06F 8/77 (2018.01)
CPC G06F 8/34 (2013.01) [G06F 8/60 (2013.01); G06F 8/77 (2013.01)] 21 Claims
OG exemplary drawing
 
1. An apparatus comprising:
interface circuitry;
machine-readable instructions;
at least one processor circuit to be programmed by the machine-readable instructions to:
analyze execution of a code snippet to determine whether the code snippet invokes an application programming interface of a test framework;
after determining that the code snippet does not invoke the application programming interface of the test framework, map the code snippet into a computer-generated vector space in memory or storage based on a first code vector of the code snippet;
compare the first code vector from the computer-generated vector space to a second code vector of reference code;
generate a semantic similarity score based on a distance between the first code vector of the code snippet and the second code vector of the reference code;
select the code snippet as input code based on the semantic similarity score;
generate at least one graphical representation of at least one of the reference code or the input code, the at least one graphical representation to identify a non-overlapping code region; and
determine a root cause of a source code error in the input code, the root cause based on the non-overlapping code region.