DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Yunho | ko |
dc.contributor.author | Hong, Shin | ko |
dc.contributor.author | Ko, Bongsuk | ko |
dc.contributor.author | Phan Duy Loc | ko |
dc.contributor.author | Kim, Moonzoo | ko |
dc.date.accessioned | 2019-04-16T05:30:19Z | - |
dc.date.available | 2019-04-16T05:30:19Z | - |
dc.date.created | 2019-04-05 | - |
dc.date.created | 2019-04-05 | - |
dc.date.created | 2019-04-05 | - |
dc.date.issued | 2018-04-11 | - |
dc.identifier.citation | IEEE Conference on Software Testing, Validation and Verification (ICST), pp.239 - 249 | - |
dc.identifier.uri | http://hdl.handle.net/10203/260778 | - |
dc.description.abstract | Software testing techniques have advanced significantly over several decades; however, most of current techniques still test a target program as it is, and fail to utilize valuable information of diverse test executions on many variants of the original program in test generation. This paper proposes a new direction for software testing –Invasive Software Testing (IST). IST first generates a set of target program variants m1, ..., mn from an original target program p by applying mutation operations µ1, ..., µn. Second, given a test suite T, IST executes m1, ..., mn with T and records the test runs which increase test coverage compared to p with T. Based on the recorded information, IST generates guideposts for automated test generation on p toward high test coverage. Finally, IST generates test inputs on p with the guideposts and achieves higher test coverage. We developed DEMINER which implements IST for C programs through software mutation and concolic testing. Further, we showed the effectiveness of DEMINER on three realworld target programs Busybox-ls, Busybox-printf, and GNU-find. The experiment results show that the amount of the improved branch coverage by DEMINER is 24.7% relatively larger than those of the conventional concolic testing techniques on average. | - |
dc.language | English | - |
dc.publisher | IEEE(Computer Society) | - |
dc.title | Invasive Software Testing: Mutating Target Programs to Diversify Test Exploration for High Test Coverage | - |
dc.type | Conference | - |
dc.identifier.wosid | 000435006300022 | - |
dc.identifier.scopusid | 2-s2.0-85048388101 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 239 | - |
dc.citation.endingpage | 249 | - |
dc.citation.publicationname | IEEE Conference on Software Testing, Validation and Verification (ICST) | - |
dc.identifier.conferencecountry | SW | - |
dc.identifier.conferencelocation | Aros Congress Center, Västerås, Sweden | - |
dc.identifier.doi | 10.1109/ICST.2018.00032 | - |
dc.contributor.localauthor | Kim, Moonzoo | - |
dc.contributor.nonIdAuthor | Hong, Shin | - |
dc.contributor.nonIdAuthor | Ko, Bongsuk | - |
dc.contributor.nonIdAuthor | Phan Duy Loc | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.