No abstract available.
Keynote Address
Model-Based Testing of Obligations
Obligations are mandatory actions that users must perform, addressing access control requirements. To ensure that such obligations are implemented correctly, an automated and systematic testing approach is often recommended. One such approach is Model-...
An Improved Memetic Algorithm with Method Dependence Relations (MAMDR)
Search-based approaches are successfully used for generating unit tests for object-oriented programs in Java. However, these approaches may struggle to generate sequence method calls with specific values to achieve high coverage due to the large size of ...
General Optimization Strategies for Refining the In-Parameter-Order Algorithm
In-Parameter-Order (IPO) algorithm is an effective strategy of combinatorial testing. And several variants of the algorithm have been developed for reducing the runtime and size of test cases or for dealing with certain problems in test case generation, ...
Improving the Quality of AspectJ Application: Translating Name-Based Pointcuts to Analysis-Based Pointcuts
This paper proposes an approach to improve the quality of AspectJ applications which supports translating name-based point cuts to analysis-based point cuts automatically. Traditional name-based point cuts rely on the names of fields, methods, and ...
Exploring Model-Based Repositories for a Broad Range of Industrial Applications and Challenges
- Tao Yue,
- Shaukat Ali,
- Arnaud Descour,
- Qitao Gan,
- Marius Liaaen,
- Geir Magne Merkesvik,
- Boas Krøgh Nielsen,
- Jan Nygård,
- Bjørn Ove Olafsen,
- Anne Lise Waal
Nowadays, systems are becoming increasingly complex and large and the process of developing such large-scale systems is becoming complicated with high cost and enormous effort required. Such a complicated process has a prominent challenge to ensure the ...
Early Identification of Future Committers in Open Source Software Projects
There exists two types of developers in Open Source Software (OSS) projects: 1) Committers who have permission to commit edited source code to the Version Control System (VCS), 2) Developers who contribute source code but cannot commit to the VCS ...
The Impact of Equivalent, Redundant and Quasi Mutants on Database Schema Mutation Analysis
Since the relational database is an important component of real-world software and the schema plays a major role in ensuring the quality of the database, relational schema testing is essential. This paper presents methods for improving both the ...
Automating Test-Suite Augmentation
Test suites are hardly ever created from scratch. Hence, automatic test case generation methods should take advantage of existing tests to produce high-quality test suites more efficiently. We present an approach for automatic test suite augmentation ...
Bottom-up Integration Testing with the Technique of Metamorphic Testing
In previous studies on the application of Metamorphic Testing (MT), testing was usually conducted at the system level directly, without any well-planned integration strategy. This could lead to a difficulty in constructing Metamorphic Relations (MRs), ...
Parameter Tuning for Search-Based Test-Data Generation Revisited: Support for Previous Results
Although search-based test-data generators, like EvoSuite, efficiently and automatically create effective JUnit test suites for Java classes, these tools are often difficult to configure. Prior work by Arcuri and Fraser revealed that the tuning of ...
Optimizing Multi-objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning
Elasticity is a key feature for cloud infrastructures to continuously align allocated computational resources to evolving hosted software needs. This is often achieved by relaxing quality criteria, for instance security or privacy because quality ...
A Method to Evaluate CFG Comparison Algorithms
Control-Flow Graph (CFG) similarity is a core technique in many areas, including malware detection and software plagiarism detection. While many algorithms have been proposed in the literature, their relative strengths and weaknesses have not been ...
Identifying Data Inconsistencies Using After-State Database Testing (ASDT) Framework
Database applications retrieve data from database, process the data and then store them for future processing. If the data from database is incorrect or inconsistent with the application's business rules, the output of the application will be ...
A Hybrid Monitoring of Software Design-Level Security Specifications
The behavior of the deployed software should be monitored against its security specifications to identify vulnerabilities introduced due to incorrect implementation of secure design decisions. Security specifications, including design-level ones, impose ...
Integration of Requirements Engineering and Test-Case Generation via OSLC
- Bernhard K. Aichernig,
- Klaus Hörmaier,
- Florian Lorber,
- Dejan Nickovic,
- Rupert Schlick,
- Didier Simoneau,
- Stefan Tiran
We present a requirement-centered analysis and testing framework that integrates methods and tools for capturing and formalizing textual customer requirements, analyzing requirements consistency, generating test cases from formalized requirements and ...
An Empirical Study on the Usage of Mocking Frameworks in Software Testing
In software testing, especially unit testing, it is very common that software testers need to test a class or a component without integration with some of its dependencies. Typical reasons for excluding dependencies in testing include the unavailability ...
Black-Box Test Data Generation for GUI Testing
Effective system testing of applications with a Graphical User Interface (GUI) front-end demands careful generation of event sequences as well as providing relevant test data for parameterized widgets, i.e., widgets that accept input values such as ...
Automated Test Oracle Generation via Denotational Semantics
This paper presents a formal approach to specifying test oracles in denotational semantics, and bridges the automation between test case generation and software testing. We extended our grammar-based test generation tool, Gena, with an interface for ...
Cost Estimation for Model-Driven Interoperability: A Canonical Data Modeling Approach
Canonical data modeling (CDM) is a method for reducing the total cost of integrating information systems. CDM enhances model-driven development (MDD) by making explicit situations in which data components are being reused (i.e., shared across systems). ...
LTF: A Model-Based Load Testing Framework for Web Applications
Performance evaluation is an important approach for various systems to guarantee the quality of their services. However, most performance evaluation tasks face a problem: how to model the system workload? Traditional workload models have limitations ...
Using Measures for Verifying and Improving Requirement Models in MDD Processes
It is well known that an appropriate requirement specification is essential for the success of software development projects. In the model-driven development context, the requirement models can be used as entry artifacts for aligning the final software ...
A Comparative Study of Invariants Generated by Daikon and User-Defined Design Contracts
A lot of progress has been made towards reverse-engineering program specification under the form of contracts. Ensuring the quality of such reverse-engineered contracts, referred to as likely invariants when using Daikon, is paramount since those ...