Using formal specifications to support testing

RM Hierons, K Bogdanov, JP Bowen… - ACM Computing …, 2009 - dl.acm.org
Formal methods and testing are two important approaches that assist in the development of
high-quality software. While traditionally these approaches have been seen as rivals, in …

[PDF][PDF] Search based software engineering: A comprehensive analysis and review of trends techniques and applications

M Harman, SA Mansouri, Y Zhang - 2009 - crest.cs.ucl.ac.uk
In the past five years there has been a dramatic increase in work on Search Based Software
Engineering (SBSE), an approach to software engineering in which search based …

A theoretical and empirical study of search-based testing: Local, global, and hybrid search

M Harman, P McMinn - IEEE Transactions on Software …, 2009 - ieeexplore.ieee.org
Search-based optimization techniques have been applied to structural software test data
generation since 1992, with a recent upsurge in interest and activity within this area …

MC/DC automatic test input data generation

Z Awedikian, K Ayari, G Antoniol - … of the 11th Annual conference on …, 2009 - dl.acm.org
In regulated domain such as aerospace and in safety critical domains, software quality
assurance is subject to strict regulation such as the RTCA DO-178B standard. Among other …

Empirical evaluation of a nesting testability transformation for evolutionary testing

P McMinn, D Binkley, M Harman - ACM Transactions on Software …, 2009 - dl.acm.org
Evolutionary testing is an approach to automating test data generation that uses an
evolutionary algorithm to search a test object's input domain for test data. Nested predicates …

Automated test data generation using a scatter search approach

R Blanco, J Tuya, B Adenso-Díaz - Information and Software Technology, 2009 - Elsevier
The techniques for the automatic generation of test cases try to efficiently find a small set of
cases that allow a given adequacy criterion to be fulfilled, thus contributing to a reduction in …

The life and death of statically detected vulnerabilities: An empirical study

M Di Penta, L Cerulo, L Aversano - Information and Software Technology, 2009 - Elsevier
Vulnerable statements constitute a major problem for developers and maintainers of
networking systems. Their presence can ease the success of security attacks, aimed at …

Search-based failure discovery using testability transformations to generate pseudo-oracles

P McMinn - Proceedings of the 11th Annual conference on Genetic …, 2009 - dl.acm.org
Testability transformations are source-to-source program transformations that are designed
to improve the testability of a program. This paper introduces a novel approach in which …

Dependence clusters in source code

M Harman, D Binkley, K Gallagher, N Gold… - ACM Transactions on …, 2009 - dl.acm.org
A dependence cluster is a set of program statements, all of which are mutually inter-
dependent. This article reports a large scale empirical study of dependence clusters in C …

A new mutation analysis method for testing java exception handling

C Ji, Z Chen, B Xu, Z Wang - 2009 33rd Annual IEEE …, 2009 - ieeexplore.ieee.org
Java exception mechanism can effectively free a program from abnormal exits and help
developers locate faults with the exception tracing stacks. It is necessary to verify whether …