| 481 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry A Generic Metamodel For Security Policies Mutation First International Conference on Software Testing Verification and Validation, {ICST} 2008, Lillehammer, Norway, April 9-11, 2008, Workshops Proceedings, 2008. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{mouelhi_icst_08,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry},
title = {A Generic Metamodel For Security Policies Mutation},
booktitle = {First International Conference on Software Testing Verification and Validation, {ICST} 2008, Lillehammer, Norway, April 9-11, 2008, Workshops Proceedings},
year = {2008},
address = {},
month = {},
pages = {278--286}
} |
| 482 | Matthew J. Rutherford and Antonio Carzaniga and Alexander L. Wolf Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems {IEEE} Trans. Software Eng., 34(4), 2008. |
|
| | Abstract: Available soon... |
| | @ARTICLE{rutherford_TSE_08,
author = {Matthew J. Rutherford and Antonio Carzaniga and Alexander L. Wolf},
title = {Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems},
journal = {{IEEE} Trans. Software Eng.},
year = {2008},
month = {},
volume = {34},
number = {4},
pages = {452--470}
} |
| 483 | Cristian Cadar and Daniel Dunbar and Dawson R. Engler {KLEE:} Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs 8th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2008, December 8-10, 2008, San Diego, California, USA, Proceedings, 2008. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{CadarDE08,
author = {Cristian Cadar and Daniel Dunbar and Dawson R. Engler},
title = {{KLEE:} Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs},
booktitle = {8th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2008, December 8-10, 2008, San Diego, California, USA, Proceedings},
year = {2008},
address = {},
month = {},
pages = {209--224}
} |
| 484 | Kamel Ayari and Salah Bouktif and Giuliano Antoniol Automatic mutation test input data generation via ant colony Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings, London, England, UK, July 7-11, 2007, 2007. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{AyariBA07,
author = {Kamel Ayari and Salah Bouktif and Giuliano Antoniol},
title = {Automatic mutation test input data generation via ant colony},
booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings, London, England, UK, July 7-11, 2007},
year = {2007},
address = {},
month = {},
pages = {1074--1081}
} |
| 485 | Michael Ellims and Darrel C. Ince and Marian Petre The Csaw C Mutation Tool: Initial Results Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)Windsor, UK, 10-14 September 2007. |
|
| | Abstract: There is a perceived lack of mutation tools for the C language and information about the tools that are available was not widely disseminated until recently. This has lead to the development of a small set of programs to support the use of mutation on C language programs as part of a research effort into the use of automatically generated test sets. This paper describes a lightweight C language mutation tool and some initial results from its application to sorting algorithms. The paper describes how kill rates could be improved using a different encoding for Boolean values and details how the use of CPU time can be used as an additional means of detecting mutants. |
| | @INPROCEEDINGS{EllimsIP07,
author = {Michael Ellims and Darrel C. Ince and Marian Petre},
title = {The Csaw C Mutation Tool: Initial Results},
booktitle = {Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)},
year = {2007},
address = {Windsor, UK},
month = {10-14 September},
pages = {185-192}
} |
| 486 | Javier Tuya and Mar{\'{\i}}a Jos{\'{e}} Su{\'{a}}rez Cabal and Claudio de la Riva Mutating database queries Information {\&} Software Technology, 49(4), 2007. |
|
| | Abstract: Available soon... |
| | @ARTICLE{TuyaCR07,
author = {Javier Tuya and Mar{\'{\i}}a Jos{\'{e}} Su{\'{a}}rez Cabal and Claudio de la Riva},
title = {Mutating database queries},
journal = {Information {\&} Software Technology},
year = {2007},
month = {},
volume = {49},
number = {4},
pages = {398--417}
} |
| 487 | Macario Polo and Sergio Tendero and Mario Piattini Integrating techniques and tools for testing automation: Research Articles Software Testing, Verification and Reliability, 17(1), March 2007. |
|
| | Abstract: This article presents two tools to generate test cases, one for Java programs and one for .NET programs, as well as a structured testing process whereby such tools can be used in order to help in process automation. The main innovation in this work is the joint use of diverse techniques and technologies, which have been separately applied to test automation: reflection to extract the class structure; regular expressions to describe test templates and test cases; JUnit and NUnit as test case execution frameworks; mutation and MuJava as test case quality measurers; serialization to deal with the parameters of complex data types; and once more, reflection, to facilitate the test engineer in the task of writing the oracle. Finally, the article presents an experiment carried out to validate the work. Copyright © 2006 John Wiley & Sons, Ltd. |
| | @ARTICLE{PoloTP07,
author = {Macario Polo and Sergio Tendero and Mario Piattini},
title = {Integrating techniques and tools for testing automation: Research Articles},
journal = {Software Testing, Verification and Reliability},
year = {2007},
month = {March},
volume = {17},
number = {1},
pages = {3–39}
} |
| 488 | Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry Mutation Analysis for Security Tests Qualification Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)Windsor, UK, 10-14 September 2007. |
|
| | Abstract: In this paper, we study how mutation analysis can be adapted to qualify test cases aiming at testing a security policy. The objective is to make test cases efficient to reveal erroneous implementations of a security policy. The notion of security policy testing is studied and mutation operators are defined in relation with the security rules. To make the approach applicable in practice we discuss and empirically rank the security mutation operators from the most to the least difficult to kill. The empirical study is a library software, which is implemented with a typical 3-tier architecture. |
| | @INPROCEEDINGS{MouelhiTB07,
author = {Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry},
title = {Mutation Analysis for Security Tests Qualification},
booktitle = {Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)},
year = {2007},
address = {Windsor, UK},
month = {10-14 September},
pages = {233-242}
} |
| 489 | Evan E. Martin and Tao Xie A Fault Model and Mutation Testing of Access Control Policies Proceedings of the 16th International Conference on World Wide WebBanff, Alberta, Canada, 8-12 May 2007. |
|
| | Abstract: To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking test outputs (responses) against expected ones. Unfortunately, manual testing is tedious and few tools exist for automated testing of access control policies. We present a fault model for access control policies and a framework to explore it. The framework includes mutation operators used to implement the fault model, mutant generation, equivalent-mutant detection, and mutant-killing determination. This framework allows us to investigate our fault model, evaluate coverage criteria for test generation and selection, and determine a relationship between structural coverage and fault-detection effectiveness. We have implemented the framework and applied it to various policies written in XACML. Our experimental results offer valuable insights into choosing mutation operators in mutation testing and choosing coverage criteria in test generation and selection. |
| | @INPROCEEDINGS{MartinX07,
author = {Evan E. Martin and Tao Xie},
title = {A Fault Model and Mutation Testing of Access Control Policies},
booktitle = {Proceedings of the 16th International Conference on World Wide Web},
year = {2007},
address = {Banff, Alberta, Canada},
month = {8-12 May},
pages = {667-676}
} |
| 490 | Anna Derezi\'nska and Anna Szustek CREAM- A System for Object-Oriented Mutation of C\# Programs Warsaw University of Technology, Warszawa, Poland, 2007. |
|
| | Abstract: Available soon... |
| | @TECHREPORT{DerezinskaS07,
author = {Anna Derezi\'nska and Anna Szustek},
title = {CREAM- A System for Object-Oriented Mutation of C\# Programs},
institution = {Warsaw University of Technology},
year = {2007},
type = {techreport},
number = {},
address = {Warszawa, Poland},
month = {},
} |