| 481 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry A Generic Metamodel For Security Policies Mutation First International Conference on Software Testing Verification and Validation, {ICST} 2008, Lillehammer, Norway, April 9-11, 2008, Workshops Proceedings, 2008. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{mouelhi_icst_08,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry},
title = {A Generic Metamodel For Security Policies Mutation},
booktitle = {First International Conference on Software Testing Verification and Validation, {ICST} 2008, Lillehammer, Norway, April 9-11, 2008, Workshops Proceedings},
year = {2008},
address = {},
month = {},
pages = {278--286}
} |
| 482 | Matthew J. Rutherford and Antonio Carzaniga and Alexander L. Wolf Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems {IEEE} Trans. Software Eng., 34(4), 2008. |
|
| | Abstract: Available soon... |
| | @ARTICLE{rutherford_TSE_08,
author = {Matthew J. Rutherford and Antonio Carzaniga and Alexander L. Wolf},
title = {Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems},
journal = {{IEEE} Trans. Software Eng.},
year = {2008},
month = {},
volume = {34},
number = {4},
pages = {452--470}
} |
| 483 | Cristian Cadar and Daniel Dunbar and Dawson R. Engler {KLEE:} Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs 8th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2008, December 8-10, 2008, San Diego, California, USA, Proceedings, 2008. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{CadarDE08,
author = {Cristian Cadar and Daniel Dunbar and Dawson R. Engler},
title = {{KLEE:} Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs},
booktitle = {8th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2008, December 8-10, 2008, San Diego, California, USA, Proceedings},
year = {2008},
address = {},
month = {},
pages = {209--224}
} |
| 484 | Kamel Ayari and Salah Bouktif and Giuliano Antoniol Automatic mutation test input data generation via ant colony Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings, London, England, UK, July 7-11, 2007, 2007. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{AyariBA07,
author = {Kamel Ayari and Salah Bouktif and Giuliano Antoniol},
title = {Automatic mutation test input data generation via ant colony},
booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings, London, England, UK, July 7-11, 2007},
year = {2007},
address = {},
month = {},
pages = {1074--1081}
} |
| 485 | Michael Ellims and Darrel C. Ince and Marian Petre The Csaw C Mutation Tool: Initial Results Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)Windsor, UK, 10-14 September 2007. |
|
| | Abstract: There is a perceived lack of mutation tools for the C language and information about the tools that are available was not widely disseminated until recently. This has lead to the development of a small set of programs to support the use of mutation on C language programs as part of a research effort into the use of automatically generated test sets. This paper describes a lightweight C language mutation tool and some initial results from its application to sorting algorithms. The paper describes how kill rates could be improved using a different encoding for Boolean values and details how the use of CPU time can be used as an additional means of detecting mutants. |
| | @INPROCEEDINGS{EllimsIP07,
author = {Michael Ellims and Darrel C. Ince and Marian Petre},
title = {The Csaw C Mutation Tool: Initial Results},
booktitle = {Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)},
year = {2007},
address = {Windsor, UK},
month = {10-14 September},
pages = {185-192}
} |
| 486 | Javier Tuya and Mar{\'{\i}}a Jos{\'{e}} Su{\'{a}}rez Cabal and Claudio de la Riva Mutating database queries Information {\&} Software Technology, 49(4), 2007. |
|
| | Abstract: Available soon... |
| | @ARTICLE{TuyaCR07,
author = {Javier Tuya and Mar{\'{\i}}a Jos{\'{e}} Su{\'{a}}rez Cabal and Claudio de la Riva},
title = {Mutating database queries},
journal = {Information {\&} Software Technology},
year = {2007},
month = {},
volume = {49},
number = {4},
pages = {398--417}
} |
| 487 | Macario Polo and Sergio Tendero and Mario Piattini Integrating techniques and tools for testing automation: Research Articles Software Testing, Verification and Reliability, 17(1), March 2007. |
|
| | Abstract: This article presents two tools to generate test cases, one for Java programs and one for .NET programs, as well as a structured testing process whereby such tools can be used in order to help in process automation. The main innovation in this work is the joint use of diverse techniques and technologies, which have been separately applied to test automation: reflection to extract the class structure; regular expressions to describe test templates and test cases; JUnit and NUnit as test case execution frameworks; mutation and MuJava as test case quality measurers; serialization to deal with the parameters of complex data types; and once more, reflection, to facilitate the test engineer in the task of writing the oracle. Finally, the article presents an experiment carried out to validate the work. Copyright © 2006 John Wiley & Sons, Ltd. |
| | @ARTICLE{PoloTP07,
author = {Macario Polo and Sergio Tendero and Mario Piattini},
title = {Integrating techniques and tools for testing automation: Research Articles},
journal = {Software Testing, Verification and Reliability},
year = {2007},
month = {March},
volume = {17},
number = {1},
pages = {3–39}
} |
| 488 | Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry Mutation Analysis for Security Tests Qualification Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)Windsor, UK, 10-14 September 2007. |
|
| | Abstract: In this paper, we study how mutation analysis can be adapted to qualify test cases aiming at testing a security policy. The objective is to make test cases efficient to reveal erroneous implementations of a security policy. The notion of security policy testing is studied and mutation operators are defined in relation with the security rules. To make the approach applicable in practice we discuss and empirically rank the security mutation operators from the most to the least difficult to kill. The empirical study is a library software, which is implemented with a typical 3-tier architecture. |
| | @INPROCEEDINGS{MouelhiTB07,
author = {Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry},
title = {Mutation Analysis for Security Tests Qualification},
booktitle = {Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)},
year = {2007},
address = {Windsor, UK},
month = {10-14 September},
pages = {233-242}
} |
| 489 | Evan E. Martin and Tao Xie A Fault Model and Mutation Testing of Access Control Policies Proceedings of the 16th International Conference on World Wide WebBanff, Alberta, Canada, 8-12 May 2007. |
|
| | Abstract: To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking test outputs (responses) against expected ones. Unfortunately, manual testing is tedious and few tools exist for automated testing of access control policies. We present a fault model for access control policies and a framework to explore it. The framework includes mutation operators used to implement the fault model, mutant generation, equivalent-mutant detection, and mutant-killing determination. This framework allows us to investigate our fault model, evaluate coverage criteria for test generation and selection, and determine a relationship between structural coverage and fault-detection effectiveness. We have implemented the framework and applied it to various policies written in XACML. Our experimental results offer valuable insights into choosing mutation operators in mutation testing and choosing coverage criteria in test generation and selection. |
| | @INPROCEEDINGS{MartinX07,
author = {Evan E. Martin and Tao Xie},
title = {A Fault Model and Mutation Testing of Access Control Policies},
booktitle = {Proceedings of the 16th International Conference on World Wide Web},
year = {2007},
address = {Banff, Alberta, Canada},
month = {8-12 May},
pages = {667-676}
} |
| 490 | Anna Derezi\'nska and Anna Szustek CREAM- A System for Object-Oriented Mutation of C\# Programs Warsaw University of Technology, Warszawa, Poland, 2007. |
|
| | Abstract: Available soon... |
| | @TECHREPORT{DerezinskaS07,
author = {Anna Derezi\'nska and Anna Szustek},
title = {CREAM- A System for Object-Oriented Mutation of C\# Programs},
institution = {Warsaw University of Technology},
year = {2007},
type = {techreport},
number = {},
address = {Warszawa, Poland},
month = {},
} |
| 491 | Yves Le Traon and Tejeddine Mouelhi and Benoit Baudry Testing Security Policies: Going Beyond Functional Testing The 18th IEEE International Symposium on Software ReliabilityTrollh\"attan, Sweden, 5-9 November 2007. |
|
| | Abstract: While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper introduces security policy testing as a specific target for testing. We propose two strategies for producing security policy test cases, depending if they are built in complement of existing functional test cases or independently from them. Indeed, any security policy is strongly connected to system functionality: testing functions includes exercising many security mechanisms. However, testing functionality does not intend at putting to the test security aspects. We thus propose test selection criteria to produce tests from a security policy. To quantify the effectiveness of a set of test cases to detect security policy flaws, we adapt mutation analysis and define security policy mutation operators. A library case study, a 3-tiers architecture, is used to obtain experimental trends. Results confirm that security must become a specific target of testing to reach a satisfying level of confidence in security mechanisms. |
| | @INPROCEEDINGS{TraonMB07,
author = {Yves Le Traon and Tejeddine Mouelhi and Benoit Baudry},
title = {Testing Security Policies: Going Beyond Functional Testing},
booktitle = {The 18th IEEE International Symposium on Software Reliability},
year = {2007},
address = {Trollh\"attan, Sweden},
month = {5-9 November},
pages = {93-102}
} |
| 492 | Mark Trakhtenbrot New Mutations for Evaluation of Specification and Implementation Levels of Adequacy in Testing of Statecharts Models Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)Windsor, UK, 10-14 September 2007. |
|
| | Abstract: In model-based development of embedded real-time systems, statecharts are widely used for formal specification of their behavior, providing a sound basis for test generation and for detection of faults early in the development process. The paper presents a variety of new mutations for adequacy evaluation of tests used in validation of statecharts-based models. These mutations focus on key features of statecharts used in modeling of embedded systems: hierarchy, orthogonality and time expressions. We distinguish between two levels of tests adequacy. In the first, test results are expected to strictly follow the statecharts semantics. The second one takes into account possible deviations from this semantics based on typical implementation oriented decisions, e.g. mapping of orthogonal components into separate tasks executed concurrently. The considered mutations address both types of adequacy. In particular, we consider interleaving enforcing mutations, for testing of alternatives to the canonical "maximum parallelism" execution of statecharts. |
| | @INPROCEEDINGS{Trakhtenbrot07,
author = {Mark Trakhtenbrot},
title = {New Mutations for Evaluation of Specification and Implementation Levels of Adequacy in Testing of Statecharts Models},
booktitle = {Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)},
year = {2007},
address = {Windsor, UK},
month = {10-14 September},
pages = {151-160}
} |
| 493 | Anna Derezi\'nska Advanced mutation operators applicable in C\# programs Software Engineering Techniques: Design for Quality, 2007. |
|
| | Abstract: This paper is devoted to advanced mutation operators for C# source code. They deal with object-oriented (OO mutations) and other complex features of the code. They require structural information about a code, unlike the standard mutations. Applicability of OO operators in C# is compared with those for other OO languages. Operators for specific features of C# language are also proposed. The detailed specification of operators can be provided in terms of pre- and post-conditions of a program transformation. Based on the operators’ specification, the generation of mutated C# programs can be automated. |
| | @INPROCEEDINGS{Derezinska07a,
author = {Anna Derezi\'nska},
title = {Advanced mutation operators applicable in C\# programs},
booktitle = {Software Engineering Techniques: Design for Quality},
year = {2007},
address = {},
month = {},
pages = {283-288}
} |
| 494 | Pete May and Jon Timmis and Keith Mander Immune and Evolutionary Approaches to Software Mutation Testing Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS'07)Santos, Brazil, August 2007. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{MayTK07,
author = {Pete May and Jon Timmis and Keith Mander},
title = {Immune and Evolutionary Approaches to Software Mutation Testing},
booktitle = {Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS'07)},
year = {2007},
address = {Santos, Brazil},
month = {August},
pages = {336-347}
} |
| 495 | Akbar Siami Namin and James H. Andrews On Sufficiency of Mutants Proceedings of the 29th International Conference on Software Engineering (ICSE COMPANION'07)Minneapolis, Minnesota, 20-26 May 2007. |
|
| | Abstract: Mutation is the practice of automatically generating possibly faulty variants of a program, for the purpose of assessing the adequacy of a test suite or comparing testing techniques. The cost of mutation often makes its application infeasible. The cost of mutation is usually assessed in terms of the number of mutants, and consequently the number of "mutation operators" that produce them. We address this problem by finding a smaller subset of mutation operators, called "sufficient", that can model the behaviour of the full set. To do this, we provide an experimental procedure and adapt statistical techniques proposed for variable reduction, model selection and nonlinear regression. Our preliminary results reveal interesting information about mutation operators. |
| | @INPROCEEDINGS{NaminA07,
author = {Akbar Siami Namin and James H. Andrews},
title = {On Sufficiency of Mutants},
booktitle = {Proceedings of the 29th International Conference on Software Engineering (ICSE COMPANION'07)},
year = {2007},
address = {Minneapolis, Minnesota},
month = {20-26 May},
pages = {73-74}
} |
| 496 | Peter S. May Test Data Generation: Two Evolutionary Approaches to Mutation Testing University of Kent, Canterbury, Kent, 2007.Unknown- |
|
| | Abstract: Available soon... |
| | @PHDTHESIS{May07,
author = {Peter S. May},
title = {Test Data Generation: Two Evolutionary Approaches to Mutation Testing},
school = {University of Kent},
year = {2007},
type = {phdthesis},
address = {Canterbury, Kent},
month = {},
} |
| 497 | Robert M. Hierons and Mercedes G. Merayo Mutation Testing from Probabilistic Finite State Machines Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)Windsor, UK, 10-14 September 2007. |
|
| | Abstract: Mutation testing traditionally involves mutating a program in order to produce a set of mutants and using these mutants in order to either estimate the effectiveness of a test suite or to drive test generation. Recently, however, this approach has been applied to specifications such as those written as finite state machines. This paper extends mutation testing to finite state machine models in which transitions have associated probabilities. The paper describes several ways of mutating a probabilistic finite state machine (PFSM) and shows how test sequences that distinguish between a PFSM and its mutants can be generated. Testing then involves applying each test sequence multiple times, observing the resultant output sequences and using results from statistical sampling theory in order to compare the observed frequency of each output sequence with that expected. |
| | @INPROCEEDINGS{HieronsM07,
author = {Robert M. Hierons and Mercedes G. Merayo},
title = {Mutation Testing from Probabilistic Finite State Machines},
booktitle = {Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)},
year = {2007},
address = {Windsor, UK},
month = {10-14 September},
pages = {141-150}
} |
| 498 | Javier Tuya and Maria Jose Suarez Cabal and Claudio de la Riva Mutating Database Queries Information and Software Technology, 49(4), April 2007. |
|
| | Abstract: A set of mutation operators for SQL queries that retrieve information from a database is developed and tested against a set of queries drawn from the NIST SQL Conformance Test Suite. The mutation operators cover a wide spectrum of SQL features, including the handling of null values. Additional experiments are performed to explore whether the cost of executing mutants can be reduced using selective mutation or the test suite size can be reduced by using an appropriate ordering of the mutants. The SQL mutation approach can be helpful in assessing the adequacy of database test cases and their development, and as a tool for systematically injecting faults in order to compare different database testing techniques. |
| | @ARTICLE{TuyaSR07,
author = {Javier Tuya and Maria Jose Suarez Cabal and Claudio de la Riva},
title = {Mutating Database Queries},
journal = {Information and Software Technology},
year = {2007},
month = {April},
volume = {49},
number = {4},
pages = {398-417}
} |
| 499 | Saswat Anand and Corina S. Pasareanu and Willem Visser {JPF-SE:} {A} Symbolic Execution Extension to Java PathFinder Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, {TACAS} 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2007 Braga, Portugal, March 24 - April 1, 2007, Proceedings, 2007. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{AnandPV07,
author = {Saswat Anand and Corina S. Pasareanu and Willem Visser},
title = {{JPF-SE:} {A} Symbolic Execution Extension to Java PathFinder},
booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, {TACAS} 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2007 Braga, Portugal, March 24 - April 1, 2007, Proceedings},
year = {2007},
address = {},
month = {},
pages = {134--138}
} |
| 500 | Youssef Serrestou and Vincent Beroulle and Chantal Robach Impact of Hardware Emulation on the Verification Quality Improvement Proceedings of the IFIP WG 10.5 International Conference on Very Large Scale Integration of System-on-Chip (VLSI-SoC'07)Atlanta, GA, 15-17 October 2007. |
|
| | Abstract: Software simulation remains the most used method for VHDL RTL functional verification. The functional verification process essentially consists of two parts. The first one is the functional qualification; the second one is the qualification- driven stimuli generation. Currently, the qualification and the generation tasks are iterative processes based on VHDL simulation which is dramatically time consuming. The simulation time increases with the circuits’ size and the required level of quality. In our previous works, we have proposed some approaches based on the mutation testing technique to evaluate and to improve functional validation quality. Now, to reduce this simulation time, we propose in this paper a new approach based on FPGA emulation. So, an hardware-software platform called “Meta-Mutant Testbench” is used to emulate mutants. Experimental results for some ITC’99 benchmark circuits show that our mutation emulator is about 20 times faster than classical software simulators; this speedup increases with the circuits’ size. |
| | @INPROCEEDINGS{SerrestouBR07a,
author = {Youssef Serrestou and Vincent Beroulle and Chantal Robach},
title = {Impact of Hardware Emulation on the Verification Quality Improvement},
booktitle = {Proceedings of the IFIP WG 10.5 International Conference on Very Large Scale Integration of System-on-Chip (VLSI-SoC'07)},
year = {2007},
address = {Atlanta, GA},
month = {15-17 October},
pages = {218-223}
} |