Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/319568.319662acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article
Free access

An integrated system for program testing using weak mutation and data flow analysis

Published: 01 August 1985 Publication History
  • Get Citation Alerts
  • Abstract

    The idea of weak mutation testing is to construct test data which would force program components such as expressions and variable references to produce a wrong 'result' if they were to contain certain types of error, for example, off-by-a-constant or wrong-variable. The idea of data flow driven testing is to construct test data which forces the execution of different interactions between variable definitions and references in a program.
    This paper describes a tool for FORTRAN 77 programs which has been developed to help a user apply the weak mutation and data flow testing techniques. The tool instruments a given source program and collects a program execution history. It is then able to report on the completeness of the test data with respect to weak mutation and a family of data flow path selection criteria. Some preliminary experiments with use of the tool are described.

    References

    [1]
    F E Allen and J Cocker "A program data flow analysis procedure", Ccimn ACM, V01 19, No 3, pp 137-147, March 1976.
    [2]
    R A DeMillo, R J Lipton and F G Sayward, "Hints on test data selection: help for the practicing programmer", IEEE: Computer Vol 11, No 4, pp 34-41, April 1978.
    [3]
    L D Fosdick and L J Cmterweil, "Data flow analysis in software reliability", ACM Computing Surveys; Vol 8, No 3, pp 305-330, Sept. 1976.
    [4]
    M R Girgis and M R Woodward, "An integrated system for program testing using weak mutation and data flow analysis", Technical Report 85/l, Dept of Computer Science, University of Liverpool, Jan 1985.
    [5]
    w E Howden, "Compeleteness criteria for testing elementary program functions", IEEE Proc 5th Int Conf on Software Eng, pp 235-243, San Diego, March 1981.
    [6]
    E Hotien, "Weak mutation testing and completeness of test sets", IEEE Trans Software Eng, Vol SE-8, No 4, pp 371-379, July 1982.
    [7]
    J C Huang, "Program instrumentation and software testing", IEEE Computer, Vol 11, No 4, pp 25-32, April 1978.
    [8]
    JC Huang, "Detection of data flow ananaly through program instrumentation", IEEE Trans Software Eng, Vol SE-5, No 3, pp 226-236, May 1979.
    [9]
    J W Laski and B Korel, "A data flow oriented program testing strategy", IEEE Trans Software Eng, Vol SE-9, No 3, pp 347-354, May 1983.
    [10]
    E F Miller, "Coverage measure definitions reviewed", Testing Techniques Newsletter, Vol 3, No 4, p 6, Nov 1980.
    [11]
    S C Ntafos, "On required element testing", IEEE Trans Software Rng, vol SE-lo, No 6, pp 795-803, Nov 1984.
    [12]
    L J Osterweil and L D Fosdick, "DAVE - A validation error detection and documentation system for Fortran programs", Software - Practice and Experience, vol 6, pp 473-486, 1976.
    [13]
    S Rapps and E J Wayuker, "Data flow analysis techniques for test data selection", IEEE Proc 6th Int Conf on Software Eng, pp 272-278, Tokyo Sept. 1982.
    [14]
    M D Wiser, J D Gannon and P R Wullin, Comparison of structural test coverage metrics", IEEE Software, Vol 2, No 2, pp 80-85, March 1985.
    [15]
    M R Woodward, D Hedley and M A HeMell, "Experience with path analysis and testing of programs", IEEl Trans Software Eng, Vol SE-6, No 3, pi 278-286, r-&y 1980.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICSE '85: Proceedings of the 8th international conference on Software engineering
    August 1985
    402 pages
    ISBN:0818606207

    Sponsors

    Publisher

    IEEE Computer Society Press

    Washington, DC, United States

    Publication History

    Published: 01 August 1985

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate 276 of 1,856 submissions, 15%

    Upcoming Conference

    ICSE 2025

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)1

    Other Metrics

    Citations

    Cited By

    View all
    • (2013)Mutation at the multi-class and system levelsScience of Computer Programming10.1016/j.scico.2012.02.00578:4(364-387)Online publication date: 1-Apr-2013
    • (2007)A fault model and mutation testing of access control policiesProceedings of the 16th international conference on World Wide Web10.1145/1242572.1242663(667-676)Online publication date: 8-May-2007
    • (1994)An Empirical Evaluation of Weak MutationIEEE Transactions on Software Engineering10.1109/32.28642220:5(337-344)Online publication date: 1-May-1994
    • (1993)Corrigendum for 'Constraint-Based Automatic Test Data Generation' by R.A. DeMillo and A.J. OffuttIEEE Transactions on Software Engineering10.5555/159878.63088619:6(640.1)Online publication date: 1-Jun-1993
    • (1993)Improved serial algorithms for mutation analysisACM SIGSOFT Software Engineering Notes10.1145/174146.15426618:3(149-158)Online publication date: 1-Jul-1993
    • (1993)Improved serial algorithms for mutation analysisProceedings of the 1993 ACM SIGSOFT international symposium on Software testing and analysis10.1145/154183.154266(149-158)Online publication date: 1-Aug-1993
    • (1991)How strong is weak mutation?Proceedings of the symposium on Testing, analysis, and verification10.1145/120807.120826(200-213)Online publication date: 1-Oct-1991
    • (1988)An Applicable Family of Data Flow Testing CriteriaIEEE Transactions on Software Engineering10.1109/32.619414:10(1483-1498)Online publication date: 1-Oct-1988

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media