1 | Mike Papadakis and Marinos Kintis and Jie Zhang and Yue Jia and Yves Le Traon and Mark Harman Mutation Testing Advances: An Analysis and Survey Unknown- |
|
| Abstract: Available soon... |
| Unknown++ |
2 | Thierry Titcheu Chekam and Mike Papadakis and Yves Le Traon and Mark Harman An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption Proceedings of the 39th International Conference on Software Engineering, {ICSE} 2017, Buenos Aires, Argentina, May 20-28, 2017, 2017. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{ChekamPTH17,
author = {Thierry Titcheu Chekam and Mike Papadakis and Yves Le Traon and Mark Harman},
title = {An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption},
booktitle = {Proceedings of the 39th International Conference on Software Engineering, {ICSE} 2017, Buenos Aires, Argentina, May 20-28, 2017},
year = {2017},
address = {},
month = {},
pages = {597--608}
} |
3 | Mike Papadakis and Christopher Henard and Mark Harman and Yue Jia and Yves Le Traon Threats to the validity of mutation-based test assessment Proceedings of the 25th International Symposium on Software Testing and Analysis, {ISSTA} 2016, Saarbr{\"{u}}cken, Germany, July 18-20, 2016, 2016. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{PapadakisHHJT16,
author = {Mike Papadakis and Christopher Henard and Mark Harman and Yue Jia and Yves Le Traon},
title = {Threats to the validity of mutation-based test assessment},
booktitle = {Proceedings of the 25th International Symposium on Software Testing and Analysis, {ISSTA} 2016, Saarbr{\"{u}}cken, Germany, July 18-20, 2016},
year = {2016},
address = {},
month = {},
pages = {354--365}
} |
4 | Thomas Laurent and Anthony Ventresque and Mike Papadakis and Christopher Henard and Yves Le Traon Assessing and Improving the Mutation Testing Practice of {PIT} CoRR, abs/1601.02351(), 2016. |
|
| Abstract: Available soon... |
| @ARTICLE{LaurentVPHT16,
author = {Thomas Laurent and Anthony Ventresque and Mike Papadakis and Christopher Henard and Yves Le Traon},
title = {Assessing and Improving the Mutation Testing Practice of {PIT}},
journal = {CoRR},
year = {2016},
month = {},
volume = {abs/1601.02351},
number = {},
pages = {}
} |
5 | Christopher Henard and Mike Papadakis and Mark Harman and Yue Jia and Yves Le Traon Comparing white-box and black-box test prioritization Proceedings of the 38th International Conference on Software Engineering, {ICSE} 2016, Austin, TX, USA, May 14-22, 2016, 2016. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{henard_ICSE_16,
author = {Christopher Henard and Mike Papadakis and Mark Harman and Yue Jia and Yves Le Traon},
title = {Comparing white-box and black-box test prioritization},
booktitle = {Proceedings of the 38th International Conference on Software Engineering, {ICSE} 2016, Austin, TX, USA, May 14-22, 2016},
year = {2016},
address = {},
month = {},
pages = {523--534}
} |
6 | Thierry Titcheu Chekam and Mike Papadakis and Yves Le Traon Assessing and Comparing Mutation-based Fault Localization Techniques CoRR, abs/1607.05512(), 2016. |
|
| Abstract: Available soon... |
| @ARTICLE{ChekamPT16,
author = {Thierry Titcheu Chekam and Mike Papadakis and Yves Le Traon},
title = {Assessing and Comparing Mutation-based Fault Localization Techniques},
journal = {CoRR},
year = {2016},
month = {},
volume = {abs/1607.05512},
number = {},
pages = {}
} |
7 | Francisco Carlos M. Souza and Mike Papadakis and Yves Le Traon and M{\'{a}}rcio Eduardo Delamaro Strong mutation-based test data generation using hill climbing Proceedings of the 9th International Workshop on Search-Based Software Testing, SBST@ICSE 2016, Austin, Texas, USA, May 14-22, 2016, 2016. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{SouzaPTD16,
author = {Francisco Carlos M. Souza and Mike Papadakis and Yves Le Traon and M{\'{a}}rcio Eduardo Delamaro},
title = {Strong mutation-based test data generation using hill climbing},
booktitle = {Proceedings of the 9th International Workshop on Search-Based Software Testing, SBST@ICSE 2016, Austin, Texas, USA, May 14-22, 2016},
year = {2016},
address = {},
month = {},
pages = {45--54}
} |
8 | Mike Papadakis and Yves Le Traon Metallaxis-FL: mutation-based fault localization Softw. Test., Verif. Reliab., 25(), 2015. |
|
| Abstract: Available soon... |
| @ARTICLE{PapadakisT15,
author = {Mike Papadakis and Yves Le Traon},
title = {Metallaxis-FL: mutation-based fault localization},
journal = {Softw. Test., Verif. Reliab.},
year = {2015},
month = {},
volume = {25},
number = {},
pages = {605--628}
} |
9 | S{\'{e}}bastien Bardin and Micka{\"{e}}l Delahaye and Robin David and Nikolai Kosmatov and Mike Papadakis and Yves Le Traon and Jean{-}Yves Marion Sound and Quasi-Complete Detection of Infeasible Test Requirements 8th {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2015, Graz, Austria, April 13-17, 2015, 2015. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{BardinDDKPTM15,
author = {S{\'{e}}bastien Bardin and Micka{\"{e}}l Delahaye and Robin David and Nikolai Kosmatov and Mike Papadakis and Yves Le Traon and Jean{-}Yves Marion},
title = {Sound and Quasi-Complete Detection of Infeasible Test Requirements},
booktitle = {8th {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2015, Graz, Austria, April 13-17, 2015},
year = {2015},
address = {},
month = {},
pages = {1--10}
} |
10 | Mike Papadakis and Yue Jia and Mark Harman and Yves Le Traon Trivial Compiler Equivalence: {A} Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique 37th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1, 2015. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{PapadakisJHT15,
author = {Mike Papadakis and Yue Jia and Mark Harman and Yves Le Traon},
title = {Trivial Compiler Equivalence: {A} Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique},
booktitle = {37th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1},
year = {2015},
address = {},
month = {},
pages = {936--946}
} |
11 | Mike Papadakis and M{\'{a}}rcio Eduardo Delamaro and Yves Le Traon Mitigating the effects of equivalent mutants with mutant classification strategies Sci. Comput. Program., 95(), 2014. |
|
| Abstract: Available soon... |
| @ARTICLE{PapadakisDT14,
author = {Mike Papadakis and M{\'{a}}rcio Eduardo Delamaro and Yves Le Traon},
title = {Mitigating the effects of equivalent mutants with mutant classification strategies},
journal = {Sci. Comput. Program.},
year = {2014},
month = {},
volume = {95},
number = {},
pages = {298--319}
} |
12 | Mike Papadakis and Yves Le Traon Effective fault localization via mutation analysis: a selective mutation approach Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014, 2014. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{PapadakisT14,
author = {Mike Papadakis and Yves Le Traon},
title = {Effective fault localization via mutation analysis: a selective mutation approach},
booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014},
year = {2014},
address = {},
month = {},
pages = {1293--1300}
} |
13 | Mike Papadakis and Christopher Henard and Yves Le Traon Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, {USA}, 2014. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{papadakis_ICST_14,
author = {Mike Papadakis and Christopher Henard and Yves Le Traon},
title = {Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing},
booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, {USA}},
year = {2014},
address = {},
month = {},
pages = {1--10}
} |
14 | Christopher Henard and Mike Papadakis and Yves Le Traon Mutation-Based Generation of Software Product Line Test Configurations Search-Based Software Engineering - 6th International Symposium, {SSBSE} 2014, Fortaleza, Brazil, August 26-29, 2014. Proceedings, 2014. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{DHenardPT14,
author = {Christopher Henard and Mike Papadakis and Yves Le Traon},
title = {Mutation-Based Generation of Software Product Line Test Configurations},
booktitle = {Search-Based Software Engineering - 6th International Symposium, {SSBSE} 2014, Fortaleza, Brazil, August 26-29, 2014. Proceedings},
year = {2014},
address = {},
month = {},
pages = {92--106}
} |
15 | Christopher Henard and Mike Papadakis and Yves Le Traon MutaLog: {A} Tool for Mutating Logic Formulas Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April 4, 2014, Cleveland, Ohio, {USA}, 2014. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{HenardPT14,
author = {Christopher Henard and Mike Papadakis and Yves Le Traon},
title = {MutaLog: {A} Tool for Mutating Logic Formulas},
booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April 4, 2014, Cleveland, Ohio, {USA}},
year = {2014},
address = {},
month = {},
pages = {399--404}
} |
16 | Christopher Henard and Mike Papadakis and Gilles Perrouin and Jacques Klein and Yves Le Traon Towards automated testing and fixing of re-engineered feature models 35th International Conference on Software Engineering, {ICSE} '13, San Francisco, CA, USA, May 18-26, 2013, 2013. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{HenardPPKT04,
author = {Christopher Henard and Mike Papadakis and Gilles Perrouin and Jacques Klein and Yves Le Traon},
title = {Towards automated testing and fixing of re-engineered feature models},
booktitle = {35th International Conference on Software Engineering, {ICSE} '13, San Francisco, CA, USA, May 18-26, 2013},
year = {2013},
address = {},
month = {},
pages = {1245--1248}
} |
17 | Christopher Henard and Mike Papadakis and Gilles Perrouin and Jacques Klein and Yves Le Traon Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing Sixth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2013 Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013, 2013. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{henard_ICST_13,
author = {Christopher Henard and Mike Papadakis and Gilles Perrouin and Jacques Klein and Yves Le Traon},
title = {Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing},
booktitle = {Sixth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2013 Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013},
year = {2013},
address = {},
month = {},
pages = {188--197}
} |
18 | Mike Papadakis and M{\'{a}}rcio Eduardo Delamaro and Yves Le Traon Proteum/FL: {A} tool for localizing faults using mutation analysis 13th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2013, Eindhoven, Netherlands, September 22-23, 2013, 2013. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{PapadakisDT13,
author = {Mike Papadakis and M{\'{a}}rcio Eduardo Delamaro and Yves Le Traon},
title = {Proteum/FL: {A} tool for localizing faults using mutation analysis},
booktitle = {13th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2013, Eindhoven, Netherlands, September 22-23, 2013},
year = {2013},
address = {},
month = {},
pages = {94--99}
} |
19 | Mike Papadakis and Yves Le Traon Mutation testing strategies using mutant classification Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013, 2013. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{PapadakisT13,
author = {Mike Papadakis and Yves Le Traon},
title = {Mutation testing strategies using mutant classification},
booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
year = {2013},
address = {},
month = {},
pages = {1223--1229}
} |
20 | Yehia Elrakaiby and Tejeddine Mouelhi and Yves Le Traon Testing Obligation Policy Enforcement Using Mutation Analysis Fifth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2012, Montreal, QC, Canada, April 17-21, 2012, 2012. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{elrakaiby_icstw_12,
author = {Yehia Elrakaiby and Tejeddine Mouelhi and Yves Le Traon},
title = {Testing Obligation Policy Enforcement Using Mutation Analysis},
booktitle = {Fifth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2012, Montreal, QC, Canada, April 17-21, 2012},
year = {2012},
address = {},
month = {},
pages = {673--680}
} |
21 | JeeHyun Hwang and Tao Xie and Donia El Kateb and Tejeddine Mouelhi and Yves Le Traon Selection of regression system tests for security policy evolution {IEEE/ACM} International Conference on Automated Software Engineering, ASE'12, Essen, Germany, September 3-7, 2012, 2012. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{hwang_ASE_12,
author = {JeeHyun Hwang and Tao Xie and Donia El Kateb and Tejeddine Mouelhi and Yves Le Traon},
title = {Selection of regression system tests for security policy evolution},
booktitle = {{IEEE/ACM} International Conference on Automated Software Engineering, ASE'12, Essen, Germany, September 3-7, 2012},
year = {2012},
address = {},
month = {},
pages = {266--269}
} |
22 | Mike Papadakis and Yves Le Traon Using Mutants to Locate "Unknown" Faults Fifth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2012, Montreal, QC, Canada, April 17-21, 2012, 2012. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{PapadakisT12,
author = {Mike Papadakis and Yves Le Traon},
title = {Using Mutants to Locate "Unknown" Faults},
booktitle = {Fifth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2012, Montreal, QC, Canada, April 17-21, 2012},
year = {2012},
address = {},
month = {},
pages = {691--700}
} |
23 | Alexandre Bartel and Benoit Baudry and Freddy Munoz and Jacques Klein and Tejeddine Mouelhi and Yves Le Traon Model Driven Mutation Applied to Adaptative Systems Testing Fourth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2011 Workshops Proceedings, March 21 - March 25, 2011, Berlin, Germany, 2011. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{bartel_ICSTW_11,
author = {Alexandre Bartel and Benoit Baudry and Freddy Munoz and Jacques Klein and Tejeddine Mouelhi and Yves Le Traon},
title = {Model Driven Mutation Applied to Adaptative Systems Testing},
booktitle = {Fourth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2011 Workshops Proceedings, March 21 - March 25, 2011, Berlin, Germany},
year = {2011},
address = {},
month = {},
pages = {408--413}
} |
24 | Romain Delamare and Benoit Baudry and Sudipto Ghosh and Yves Le Traon A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ Proceedings of the 2nd International Conference on Software Testing Verification and Validation (ICST'09)Davor Colorado, 01-04 April 2009. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{DelamareBGT09,
author = {Romain Delamare and Benoit Baudry and Sudipto Ghosh and Yves Le Traon},
title = {A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ},
booktitle = {Proceedings of the 2nd International Conference on Software Testing Verification and Validation (ICST'09)},
year = {2009},
address = {Davor Colorado},
month = {01-04 April},
pages = {376–385}
} |
25 | Romain Delamare and Benoit Baudry and Yves Le Traon AjMutator: A Tool For The Mutation Analysis Of AspectJ Pointcut Descriptors Proceedings of the 4th International Workshop on Mutation Analysis (MUTATION'09)Denver, Colorado, 1-4 April 2009. |
|
| Abstract: Aspect-oriented programming introduces new challenges for software testing. Inparticular the pointcut descriptor (PCD) requires particular attention fromtesters. The PCD describes the set of joinpoints where the advices are woven.In this paper we present a tool, AjMutator, for the mutation analysis of PCDs.AjMutator implements several mutation operators that introduce faults in thePCDs to generate a set of mutants. AjMutator classifies the mutants accordingto the set of joinpoints they match compared to the set of joinpoints matchedby the initial PCD. An interesting result is that this automaticclassification can identify equivalent mutants for a particular class of PCDs.AjMutator can also run a set of test cases on the mutants to give a mutationscore. We have applied AjMutator on two systems to show that this tool issuitable for the mutation analysis of PCDs on large AspectJ systems. |
| @INPROCEEDINGS{DelamareBT09,
author = {Romain Delamare and Benoit Baudry and Yves Le Traon},
title = {AjMutator: A Tool For The Mutation Analysis Of AspectJ Pointcut Descriptors},
booktitle = {Proceedings of the 4th International Workshop on Mutation Analysis (MUTATION'09)},
year = {2009},
address = {Denver, Colorado},
month = {1-4 April},
pages = {200-204}
} |
26 | Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry Transforming and Selecting Functional Test Cases for Security Policy Testing Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, 2009. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{mouelhi_icst_09,
author = {Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry},
title = {Transforming and Selecting Functional Test Cases for Security Policy Testing},
booktitle = {Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009},
year = {2009},
address = {},
month = {},
pages = {171--180}
} |
27 | Romain Delamare and Benoit Baudry and Yves Le Traon AjMutator: {A} Tool for the Mutation Analysis of AspectJ Pointcut Descriptors Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, Workshops Proceedings, 2009. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{delamare_ICSTW_09,
author = {Romain Delamare and Benoit Baudry and Yves Le Traon},
title = {AjMutator: {A} Tool for the Mutation Analysis of AspectJ Pointcut Descriptors},
booktitle = {Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, Workshops Proceedings},
year = {2009},
address = {},
month = {},
pages = {200--204}
} |
28 | Romain Delamare and Benoit Baudry and Sudipto Ghosh and Yves Le Traon A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, 2009. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{delamare_ICST_09,
author = {Romain Delamare and Benoit Baudry and Sudipto Ghosh and Yves Le Traon},
title = {A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ},
booktitle = {Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009},
year = {2009},
address = {},
month = {},
pages = {376--385}
} |
29 | Tejeddine Mouelhi and Benoit Baudry and Yves Le Traon Transforming and Selecting Functional Test Cases for Security Policy Testing Proceedings of the 2nd International Conference on Software Testing, Verification and ValidationDenver, Colorado, 1-4 April 2009. |
|
| Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| @INPROCEEDINGS{MouelhFBL09,
author = {Tejeddine Mouelhi and Benoit Baudry and Yves Le Traon},
title = {Transforming and Selecting Functional Test Cases for Security Policy Testing},
booktitle = {Proceedings of the 2nd International Conference on Software Testing, Verification and Validation},
year = {2009},
address = {Denver, Colorado},
month = {1-4 April},
pages = {171–180}
} |
30 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon A Model-based Framework for Security Policies Specifications, Deployment and Testing Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems (MoDELS'08)Toulouse, France, 28 September - 1 October 2008. |
|
| Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| @INPROCEEDINGS{MouelhiFBL08,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon},
title = {A Model-based Framework for Security Policies Specifications, Deployment and Testing},
booktitle = {Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems (MoDELS'08)},
year = {2008},
address = {Toulouse, France},
month = {28 September - 1 October},
pages = {537–552}
} |
31 | Alexander Pretschner and Tejeddine Mouelhi and Yves Le Traon Model-Based Tests for Access Control Policies Proceedings of the 1st International Conference on Software Testing, Verification, and Validation (ICST '08)Lillehammer, Norway, 9-11 April 2008. |
|
| Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| @INPROCEEDINGS{PretschnerMT08,
author = {Alexander Pretschner and Tejeddine Mouelhi and Yves Le Traon},
title = {Model-Based Tests for Access Control Policies},
booktitle = {Proceedings of the 1st International Conference on Software Testing, Verification, and Validation (ICST '08)},
year = {2008},
address = {Lillehammer, Norway},
month = {9-11 April},
pages = {338-347}
} |
32 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon Mutating DAC And MAC Security Policies: A Generic Metamodel Based Approach Proceedings of the 1st International Modeling Security WorkshopToulouse, France, 28th September 2008. |
|
| Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| @INPROCEEDINGS{MouelhiFBL08a,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon},
title = {Mutating DAC And MAC Security Policies: A Generic Metamodel Based Approach},
booktitle = {Proceedings of the 1st International Modeling Security Workshop},
year = {2008},
address = {Toulouse, France},
month = {28th September},
pages = {}
} |
33 | Yves Le Traon and Tejeddine Mouelhi and Benoit Baudry Testing Security Policies: Going Beyond Functional Testing The 18th IEEE International Symposium on Software ReliabilityTrollh\"attan, Sweden, 5-9 November 2007. |
|
| Abstract: While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper introduces security policy testing as a specific target for testing. We propose two strategies for producing security policy test cases, depending if they are built in complement of existing functional test cases or independently from them. Indeed, any security policy is strongly connected to system functionality: testing functions includes exercising many security mechanisms. However, testing functionality does not intend at putting to the test security aspects. We thus propose test selection criteria to produce tests from a security policy. To quantify the effectiveness of a set of test cases to detect security policy flaws, we adapt mutation analysis and define security policy mutation operators. A library case study, a 3-tiers architecture, is used to obtain experimental trends. Results confirm that security must become a specific target of testing to reach a satisfying level of confidence in security mechanisms. |
| @INPROCEEDINGS{TraonMB07,
author = {Yves Le Traon and Tejeddine Mouelhi and Benoit Baudry},
title = {Testing Security Policies: Going Beyond Functional Testing},
booktitle = {The 18th IEEE International Symposium on Software Reliability},
year = {2007},
address = {Trollh\"attan, Sweden},
month = {5-9 November},
pages = {93-102}
} |
34 | Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry Mutation Analysis for Security Tests Qualification Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)Windsor, UK, 10-14 September 2007. |
|
| Abstract: In this paper, we study how mutation analysis can be adapted to qualify test cases aiming at testing a security policy. The objective is to make test cases efficient to reveal erroneous implementations of a security policy. The notion of security policy testing is studied and mutation operators are defined in relation with the security rules. To make the approach applicable in practice we discuss and empirically rank the security mutation operators from the most to the least difficult to kill. The empirical study is a library software, which is implemented with a typical 3-tier architecture. |
| @INPROCEEDINGS{MouelhiTB07,
author = {Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry},
title = {Mutation Analysis for Security Tests Qualification},
booktitle = {Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)},
year = {2007},
address = {Windsor, UK},
month = {10-14 September},
pages = {233-242}
} |
35 | Benoit Baudry and Franck Fleurey and Yves Le Traon Improving Test Suites for Efficient Fault Localization Proceedings of the 28th International Conference on Software Engineering (ICSE'06)Shanghai, China, 20-28 May 2006. |
|
| Abstract: The need for testing-for-diagnosis strategies has been identified for a long time, but the explicit link from testing to diagnosis (fault localization) is rare. Analyzing the type of information needed for efficient fault localization, we identify the attribute (called Dynamic Basic Block) that restricts the accuracy of a diagnosis algorithm. Based on this attribute, a test-for-diagnosis criterion is proposed and validated through rigorous case studies: it shows that a test suite can be improved to reach a high level of diagnosis accuracy. So, the dilemma between a reduced testing effort (with as few test cases as possible) and the diagnosis accuracy (that needs as much test cases as possible to get more information) is partly solved by selecting test cases that are dedicated to diagnosis. |
| @INPROCEEDINGS{BaudryFT06,
author = {Benoit Baudry and Franck Fleurey and Yves Le Traon},
title = {Improving Test Suites for Efficient Fault Localization},
booktitle = {Proceedings of the 28th International Conference on Software Engineering (ICSE'06)},
year = {2006},
address = {Shanghai, China},
month = {20-28 May},
pages = {82-91}
} |
36 | Jean-Marie Mottu and Benoit Baudry and Yves Le Traon Mutation Analysis Testing for Model Transformations Proceedings of the 2nd European Conference on Model Driven Architecture - Foundations and ApplicationsBilbao, Spain, July 2006. |
|
| Abstract: In MDE, model transformations should be efficiently tested so that it may be used and reused safely. Mutation analysis is an efficient technique to evaluate the quality of test data, and has been extensively studied both for procedural and object-oriented languages. In this paper, we study how it can be adapted to model oriented programming. Since no model transformation language has been widely accepted today, we propose generic fault models that are related to the model transformation process. First, we identify abstract operations that constitute this process: model navigation, model’s elements filtering, output model creation and input model modification. Then, we propose a set of specific mutation operators which are directly inspired from these operations. We believe that these operators are meaningful since a large part of the errors in a transformation are due to the manipulation of complex models regardless of the concrete implementation language. |
| @INPROCEEDINGS{MottuBT06,
author = {Jean-Marie Mottu and Benoit Baudry and Yves Le Traon},
title = {Mutation Analysis Testing for Model Transformations},
booktitle = {Proceedings of the 2nd European Conference on Model Driven Architecture - Foundations and Applications},
year = {2006},
address = {Bilbao, Spain},
month = {July},
pages = {376-390}
} |
37 | Yves Le Traon and Benoit Baudry and Jean-Marc J\'ez\'equel Design by Contract to Improve Software Vigilance IEEE Transactions of Software Engineering, 32(8), August 2006. |
|
| Abstract: Available soon... |
| @ARTICLE{TraonBJ06,
author = {Yves Le Traon and Benoit Baudry and Jean-Marc J\'ez\'equel},
title = {Design by Contract to Improve Software Vigilance},
journal = {IEEE Transactions of Software Engineering},
year = {2006},
month = {August},
volume = {32},
number = {8},
pages = {571–586}
} |
38 | Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon From Genetic to Bacteriological Algorithms for Mutation-based Testing Software Testing, Verification and Reliability, 15(2), June 2005. |
|
| Abstract: The level of confidence in a software component is often linked to the quality of its test cases. This quality can in turn be evaluated with mutation analysis: faults are injected into the software component (making mutants of it) to check the proportion of mutants detected (‘killed’) by the test cases. But while the generation of a set of basic test cases is easy, improving its quality may require prohibitive effort. This paper focuses on the issue of automating the test optimization. The application of genetic algorithms would appear to be an interesting way of tackling it. The optimization problem is modelled as follows: a test case can be considered as a predator while a mutant program is analogous to a prey. The aim of the selection process is to generate test cases able to kill as many mutants as possible, starting from an initial set of predators, which is the test cases set provided by the programmer. To overcome disappointing experimentation results, on .Net components and unit Eiffel classes, a slight variation on this idea is studied, no longer at the ‘animal’ level (lions killing zebras, say) but at the bacteriological level. The bacteriological level indeed better reflects the test case optimization issue: it mainly differs from the genetic one by the introduction of a memorization function and the suppression of the crossover operator. The purpose of this paper is to explain how the genetic algorithms have been adapted to fit with the issue of test optimization. The resulting algorithm differs so much from genetic algorithms that it has been given another name: bacteriological algorithm. |
| @ARTICLE{BaudryFJT05,
author = {Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon},
title = {From Genetic to Bacteriological Algorithms for Mutation-based Testing},
journal = {Software Testing, Verification and Reliability},
year = {2005},
month = {June},
volume = {15},
number = {2},
pages = {73 - 96}
} |
39 | Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon Automatic Test Case Optimization: A Bacteriologic Algorithm IEEE Software, 22(2), March-April 2005. |
|
| Abstract: Improving test cases automatically is a nonlinear optimization problem. To solve this problem, we've developed a bacteriologic algorithm, adapted from genetic algorithms that can generate and optimize a set of test cases. A .NET component that parses C# source files illustrates our algorithm. |
| @ARTICLE{BaudryFJT05a,
author = {Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon},
title = {Automatic Test Case Optimization: A Bacteriologic Algorithm},
journal = {IEEE Software},
year = {2005},
month = {March-April},
volume = {22},
number = {2},
pages = {76-82}
} |
40 | Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon Automatic Test Case Optimization Using a Bacteriological Adaptation Model: Application to .NET Components Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE'02)Edinburgh, Scotland, 23-27 September 2002. |
|
| Abstract: In this paper, we present several complementary computational intelligence techniques that we explored in the field of .Net component testing. Mutation testing serves as the common backbone for applying classical and new artificial intelligence (AI) algorithms. With mutation tools, we know how to estimate the revealing power of test cases. With AI, we aim at automatically improving test case efficiency. We therefore looked first at genetic algorithms (GA) to solve the problem of test. The aim of the selection process is to generate test cases able to kill as many mutants as possible. We then propose a new AI algorithm that fits better to the test optimization problem, called bacteriological algorithm (BA): BAs behave better that GAs for this problem. However, between GAs and BAs, a family of intermediate algorithms exists: we explore the whole spectrum of these intermediate algorithms to determine whether an algorithm exists that would be more efficient than BAs.: the approaches are compared on a .Net system. |
| @INPROCEEDINGS{BaudryFJT02,
author = {Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon},
title = {Automatic Test Case Optimization Using a Bacteriological Adaptation Model: Application to .NET Components},
booktitle = {Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE'02)},
year = {2002},
address = {Edinburgh, Scotland},
month = {23-27 September},
pages = {253-256}
} |
41 | Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon Genes and Bacteria for Automatic Test Cases Optimization in the .NET Environment Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE'02)Annapolis, Maryland, 12-15 November 2002. |
|
| Abstract: The level of confidence in a software component is often linked to the quality of its test cases. This quality can in turn be evaluated with mutation analysis: faulty components (mutants) are systematically generated to check the proportion of mutants detected ("killed") by the test cases. But while the generation of basic test cases set is easy, improving its quality may require prohibitive effort. This paper focuses on the issue of automating the test optimization. We looked at genetic algorithms to solve this problem and modeled it as follows: a test case can be considered as a predator while a mutant program is analogous to a prey. The aim of the selection process is to generate test cases able to kill as many mutants as possible. To overcome disappointing experimentation results on the studied .Net system, we propose a slight variation on this idea, no longer at the "animal" level (lions killing zebras) but at the bacteriological level. The bacteriological level indeed better reflects the test case optimization issue: it introduces of a memorization function and the suppresses the crossover operator. We describe this model and show how it behaves on the case study. |
| @INPROCEEDINGS{BaudryFJT02a,
author = {Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon},
title = {Genes and Bacteria for Automatic Test Cases Optimization in the .NET Environment},
booktitle = {Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE'02)},
year = {2002},
address = {Annapolis, Maryland},
month = {12-15 November},
pages = {195-206}
} |
42 | Benoit Baudry and Vu Le Hanh and Jean-Marc J\'ez\'equel and Yves Le Traon Trustable Components: Yet Another Mutation-Based Approach Proceedings of the 1st Workshop on Mutation Analysis (MUTATION'00)San Jose, California, 6-7 October 2001. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{BaudryHJT01,
author = {Benoit Baudry and Vu Le Hanh and Jean-Marc J\'ez\'equel and Yves Le Traon},
title = {Trustable Components: Yet Another Mutation-Based Approach},
booktitle = {Proceedings of the 1st Workshop on Mutation Analysis (MUTATION'00)},
year = {2001},
address = {San Jose, California},
month = {6-7 October},
pages = {47-54}
} |