Software Testing Unit 1 Notes
Software Testing Unit 1 Notes
[20A05604a]
LECTURE NOTES
B.TECH. - CSE
(R20) (2024-25)
Course Outcomes:
After completion of the course, students will be able to
• Understand the basic testing procedures.
• Develop reliable software
• Design test cases for testing different programming constructs
• Test the ap plications by applying different testing methods and automation tools
UNIT-I
Introduction: Purpose of Testing, Dichotomies, Model for Testing, Consequences of Bugs,
Taxonomy of Bugs.
Flow Graphs and Path Testing: Basics Concepts of Path Testing, Predicates, Path Predicates
and Achievable Paths, Path Sensitizing, Path Instrumentation, Application of Path Testing.
UNIT-II
Transaction Flow Testing: Transaction Flows, Transaction Flow Testing Techniques.
Dataflow Testing: Basics o f Dataflow Testing, Strategies i n Dataflow Testing, Application
of Dataflow Testing.
UNIT-III
Domain Testing: Domains and Paths, Nice & Ugly Domains, Domain Testing, Domains and
Interfaces Testing, Domain and Interface Testing, Domains and Testability.
UNIT-IV
Paths, Path Products and Regular Expressions: Path Products & Path expression, Reduction
Procedure, Applications, Regular Expressions & Flow Anomaly Detection.
Logic Based Testing: Overview, Decision Tables, Path Expressions, KV Charts, specifications.
UNIT-V
State, State Graphs and Transition Testing: State Graphs, Good & Bad State Graphs, State
Testing, Testability Tips.
Graph Matrices and Application: Motivational Overview, Matrix of Graph, Relations, Power
of a Matrix, Node Reduction Algorithm, Building Tools
Textbooks:
Reference Books:
• http://www.nptelvideos.in/2012/11/software-engineering.html
• https://onlinecourses.nptel.ac.in/noc16_cs16/preview
• https://nptel.ac.in/courses/117105135
INDEX
Introduction 1-2
Introduction: Purpose of Testing, Dichotomies, Model for Testing, Consequences of Bugs, Taxonomy
of Bugs.
Flow Graphs and Path Testing: Basics Concepts of Path Testing, Predicates, Path Predicates and
Achievable Paths, Path Sensitizing, Path Instrumentation, Application of Path Testing.
What is testing?
Testing consumes at least half of the time and work required to produce a functional program.
Phases in a tester's mental life can be categorized into the following 5 phases:
1. Phase 0: (Until 1956: Debugging Oriented) There is no difference between testing and
debugging. Phase 0 thinking was the norm in early days of software development till testing
emerged as a discipline.
2. Phase 1: (1957-1978: Demonstration Oriented) the purpose of testing here is to show that
software works. Highlighted during the late 1970s. This failed because the probability of
showing that software works 'decreases' as testing increases. I.e. the more you test, the
more likely you will find a bug.
3. Phase 2: (1979-1982: Destruction Oriented) the purpose of testing is to show that software
doesn’t work. This also failed because the software will never get released as you will find
one bug or the other. Also, a bug corrected may also lead to another bug.
4. Phase 3: (1983-1987: Evaluation Oriented) the purpose of testing is not to prove anything
but to reduce the perceived risk of not working to an acceptable value (Statistical Quality
Control). Notion is that testing does improve the product to the extent that testing catches
bugs and to the extent that those bugs are fixed. The product is released when the
confidence on that product is high enough. (Note: This is applied to large software products
with millions of code and years of use.)
5. Phase 4: (1988-2000: Prevention Oriented) Testability is the factor considered here. One
reason is to reduce the labor of testing. Other reason is to check the testable and non-
testable code. Testable code has fewer bugs than the code that's hard to test. Identifying
the testing techniques to test the code is the main key here.
Test Design:
We know that the software code must be designed and tested, but many appear to be unaware
that tests themselves must be designed and tested. Tests should be properly designed and tested
before applying it to the actual code.
1. Inspection Methods: Methods like walkthroughs, desk checking, formal inspections and
code reading appear to be as effective as testing but the bugs caught don’t completely
overlap.
2. Design Style: While designing the software itself, adopting stylistic objectives such as
testability, openness and clarity can do much to prevent bugs.
3. Static Analysis Methods: Includes formal analysis of source code during compilation. In
earlier days, it is a routine job of the programmer to do that. Now, the compilers have
taken over that job.
4. Languages: The source language can help reduce certain kinds of bugs. Programmers find
new bugs while using new languages.
2
5. Development Methodologies and Development Environment: The development process
and the environment in which that methodology is embedded can prevent many kinds
of bugs.
Dichotomies:
Debugging usually follows testing, but they differ as to goals, methods and most
important psychology. The below tab le shows few important differences between testing
and debugging.
Testing Debugging
Testing starts with known conditions, Debugging starts from possibly unknown
uses predefined procedures and has initial conditions and the end cannot be
predictable outcomes. predicted except statistically.
Testing can and should be planned, Procedure and duration of debugging cannot
designed and scheduled. be so constrained.
Testing is a demonstration of error or
Debugging is a deductive process.
apparent correctness.
Debugging is the programmer's vindication
Testing proves a programmer's failure.
(Justification).
Testing, as executes, should strive to be
Debugging demands intuitive leaps,
predictable, dull, constrained, rigid and
experimentation and freedom.
inhuman.
Much testing can be done without Debugging is impossible without detailed
design knowledge. design knowledge.
Testing can often be done by an
Debugging must be done by an insider.
outsider.
Much of test execution and design can
Automated debugging is still a dream.
be automated.
o Test designer is the person who designs the tests where as the tester is the one
actually tests the code. During functional testing, the designer and tester are
probably different persons. During unit testing, the tester and the programmer
merge into one person.
o Tests designed and executed by the software designers are by nature biased
towards structural consideration and therefore suffer the limitations of structural
testing.
Most software is written and used by the same organization. Unfortunately, this situation
is dishonest because it clouds accountability. If there is no separation between builder
and buyer, there can be no accountability.
Above figure is a model of testing process. It includes three models: A model of the environment,
a model of the program and a model of the expected bugs.
• Environment:
o A Program's environment is the hardware and software required to make it run.
For online systems, the environment may include communication lines, other
systems, terminals and operators.
o The environment also includes all programs that interact with and are used to
create the program under test - such as OS, linkage editor, loader, compiler, utility
routines.
o Because the hardware and firmware are stable, it is not smart to blame the
environment for bugs.
• Program:
o Most programs are too complicated to understand in detail.
o The concept of the program is to be simplified in order to test it.
o If simple model of the program doesn’t explain the unexpected behavior, we may
have to modify that model to include more facts and details. And if that fails, we
may have to modify the program.
• Bugs:
o Bugs are more insidious (deceiving but harmful) than ever we expect them to be.
o An unexpected test result may lead us to change our notion of what a bug is and
our model of bugs.
o Some optimistic notions that many programmers or testers have about bugs are
usually unable to test effectively and unable to justify the dirty tests most
programs need.
5
Optimistic notions about bugs:
1. Benign Bug Hypothesis: The belief that bugs are nice, tame and logical.
(Benign: Not Dangerous)
2. Bug Locality Hypothesis: The belief that a bug discovered with in a component affects
only that component's behavior.
3. Control Bug Dominance: The belief those errors in the control structures (if, switch etc) of
programs dominate the bugs.
4. Code / Data Separation: The belief that bugs respect the separation of code and data.
5. Lingua Salvatore Est.: The belief that the language syntax and semantics (e.g. Structured
Coding, Strong typing, etc) eliminates most bugs.
6. Corrections Abide: The mistaken belief that a corrected bug remains corrected.
7. Silver Bullets: The mistaken belief that X (Language, Design method, representation,
environment) grants immunity from bugs.
8. Sadism Suffices: The common belief (especially by independent tester) that a sadistic
streak, low cunning, and intuition are sufficient to eliminate most bugs. Tough bugs need
methodology and techniques.
9. Angelic Testers: The belief that testers are better at test design than programmers is at
code design.
• Tests:
o Tests are formal procedures, Inputs must be prepared, Outcomes should predict,
tests should be documented, commands need to be executed, and results are to
be observed. All these errors are subjected to error
o We do three distinct kinds of testing on a typical software system. Theyare:
1. Unit / Component Testing: A Unit is the smallest testable piece of software that
can be compiled, assembled, linked, loaded etc. A unit is usually the work of one
programmer and consists of several hundred or fewer lines of code. Unit Testing
is the testing we do to show that the unit does not satisfy its functional
specification or that its implementation structure does not match the intended
design structure. A Component is an integrated aggregate of one or more units.
Component Testing is the testing we do to show that the component does not
satisfy its functional specification or that its implementation structure does not
match the intended design structure.
2. Integration Testing: Integration is the process by which components are
aggregated to create larger components. Integration Testing is testing done to
show that even though the components were individually satisfactory (after
passing component testing), checks the combination of components are incorrect
or inconsistent.
3. System Testing: A System is a big component. System Testing is aimed atrevealing
bugs that cannot be attributed to components. It includes testing for performance,
security, accountability, configuration sensitivity, startup and recovery.
• Role of Models: The art of testing consists of creating, selecting, exploring, and revising
models. Our ability to go through this process depends on the number of different models
we have at hand and their ability to express a program's behavior.
6
CONSEQUENCES OF BUGS:
TAXONOMY OF BUGS:
• There is no universally correct way categorize bugs. The taxonomy is not rigid.
• A given bug can be put into one or another category depending on its history and the
programmer's state of mind.
• The major categories are: (1) Requirements, Features and Functionality Bugs (2)
Structural Bugs (3) Data Bugs (4) Coding Bugs (5) Interface, Integration and System Bugs
(6) Test and Test Design Bugs.
Testing Techniques for functional bugs: Most functional test techniques- that is those techniques
which are based on a behavioral description of software, such as transaction flow testing, syntax
testing, domain testing, logic testing and state testing are useful in testing functional bugs.
2. Logic Bugs:
• Bugs in logic, especially those related to misunderstanding how case statements and
logic operators behave singly and combinations
• Also includes evaluation of boolean expressions in deeply nested IF-THEN-ELSE
constructs.
• If the bugs are parts of logical (i.e. boolean) processing not related to control flow, they
are characterized as processing bugs.
• If the bugs are parts of a logical expression (i.e. control-flow statement) which is used to
direct the control flow, then they are categorized as control-flow bugs.
3. Processing Bugs:
• Processing bugs include arithmetic bugs, algebraic, mathematical function evaluation,
algorithm selection and general processing.
• Examples of Processing bugs include: Incorrect conversion from one data
representation to other, ignoring overflow, improper use of greater-than-or-equal etc
• Although these bugs are frequent (12%), they tend to be caught in good unit testing.
4. Initialization Bugs:
• Initialization bugs are common. Initialization bugs can be improper and superfluous.
• Superfluous bugs are generally less harmful but can affect performance.
• Typical initialization bugs include: Forgetting to initialize the variables before first use,
assuming that they are initialized elsewhere, initializing to the wrong format,
representation or type etc
• Explicit declaration of all variables, as in Pascal, can reduce some initialization problems.
✓ Data bugs:
• Data bugs include all bugs that arise from the specification of data objects, their
formats, the number of such objects, and their initial values.
• Data Bugs are at least as common as bugs in code, but they are often treated as if they
did not exist at all.
• Code migrates data: Software is evolving towards programs in which more and more of
the control and processing functions are stored in tables.
• Because of this, there is an increasing awareness that bugs in code are only half the battle
and the data problems should be given equal attention.
10
Dynamic Data Vs Static data:
• Dynamic data are transitory. Whatever their purpose their lifetime is relatively short,
typically the processing time of one transaction. A storage object may be used to hold
dynamic data of different types, with different formats, attributes and residues.
• Dynamic data bugs are due to leftover garbage in a shared resource. This can be handled
in one of the three ways: (1) Clean up after the use by the user (2) Common Cleanup by
the resource manager (3) No Clean up
• Static Data are fixed in form and content. They appear in the source code or database
directly or indirectly, for example a number, a string of characters, or a bit pattern.
• Compile time processing will solve the bugs caused by static data.
✓ Coding bugs:
• Coding errors of all kinds can create any of the other kind of bugs.
• Syntax errors are generally not important in the scheme of things if the source language
translator has adequate syntax checking.
• If a program has many syntax errors, then we should expect many logic and coding bugs.
• The documentation bugs are also considered as coding bugs which may mislead the
maintenance programmers.
1. External Interfaces:
• The external interfaces are the means used to communicate with the world.
• These include devices, actuators, sensors, input terminals, printers, and communication
lines.
• The primary design criterion for an interface with outside world should be robustness.
• All external interfaces, human or machine should employ a protocol. The protocol may
11
be wrong or incorrectly implemented.
• Other external interface bugs are: invalid timing or sequence assumptions related to
external signals
• Misunderstanding external input or output formats.
• Insufficient tolerance to bad input data.
2. Internal Interfaces:
• Internal interfaces are in principle not different from external interfaces but they are
more controlled.
• A best example for internal interfaces is communicating routines.
• The external environment is fixed and the system must adapt to it but the internal
environment, which consists of interfaces with other components, can be negotiated.
• Internal interfaces have the same problem as external interfaces.
3. Hardware Architecture:
• Bugs related to hardware architecture originate mostly from misunderstanding how the
hardware works.
• Examples of hardware architecture bugs: address generation error, i/o device operation
/ instruction error, waiting too long for a response, incorrect interrupt handling etc.
• The remedy for hardware architecture and interface problems is twofold: (1) Good
Programming and Testing (2) Centralization of hardware interface software in programs
written by hardware interface specialists.
5. Software Architecture:
• Software architecture bugs are the kind that called - interactive.
• Routines can pass unit and integration testing without revealing such bugs.
• Many of them depend on load, and their symptoms emerge only when the system is
stressed.
• Sample for such bugs: Assumption that there will be no interrupts, Failure to block or un
block interrupts, Assumption that memory and registers were initialized or not
initialized etc
• Careful integration of modules and subjecting the final system toa stress test are
effective methods for these bugs.
8. Integration Bugs:
• Integration bugs are bugs having to do with the integration of, and with the interfaces
between, working and tested components.
• These bugs results from inconsistencies or incompatibilities between components.
• The communication methods include data structures, call sequences, registers,
semaphores, and communication links and protocols results in integration bugs.
• The integration bugs do not constitute a big bug category (9%) they are expensive
category because they are usually caught late in the game and because they force changes
in several components and/or data structures.
9. System Bugs:
• System bugs covering all kinds of bugs that cannot be ascribed to a component or to their
simple interactions, but result from the totality of interactions between many
components such as programs, data, hardware, and the operating systems.
• There can be no meaningful system testing until there has been thorough component and
integration testing.
• System bugs are infrequent (1.7%) but very important because they are often found only
after the system has been fielded.
13
Remedies: The remedies of test bugs are:
1. Test Debugging: The first remedy for test bugs is testing and debugging the tests. Test debugging,
when compared to program debugging, is easier because tests, when properly designed are simpler
than programs and do not have to make concessions to efficiency.
2. Test Quality Assurance: Programmers have the right to ask how quality in independent testing is
monitored.
3. Test Execution Automation: The history of software bug removal and prevention is indistinguishable
from the history of programming automation aids. Assemblers, loaders, compilers are developed to
reduce the incidence of programming and operation errors. Test execution bugs are virtually eliminated
by various test execution automation tools.
4. Test Design Automation: Just as much of software development has been automated, much test
design can be and has been automated. For a given productivity rate, automation reduces the bug count
- be it for software or be it for tests.
• Path Testing:
o Path Testing is the name given to a family of test techniques based on
judiciously selecting a set of test paths through the program.
o If the set of paths are properly chosen then we have achieved some measure of test
thoroughness. For example, pick enough paths to assure that every source statement
has been executed at least once.
o Path testing techniques are the oldest of all structural test techniques.
o Path testing is most applicable to new software for unit testing. It is a
structural technique.
o It requires complete knowledge of the program's structure.
o It is most often used by programmers to unit test their own code.
o The effectiveness of path testing rapidly deteriorates as the size of the
software aggregate under test increases.
o Flow Graph Elements: A flow graph contains four different types of elements.
1. Process Block:
▪ A process block is a sequence of program statements
uninterrupted by either decisions or junctions.
▪ It is a sequence of statements such that if any one of statement
of the block is executed, then all statement thereof are
executed.
▪ Formally, a process block is a piece of straight line code of one
statement or hundreds of statements.
▪ A process has one entry and one exit. It can consists of a single
statement or instruction, a sequence of statements or
instructions, a
single entry/exit subroutine, a macro or function call, or a sequence of these.
2. Decisions:
▪ A decision is a program point at which the control flow
can diverge.
▪ Machine language conditional branch and conditional
skip instructions are examples of decisions.
▪ Most of the decisions are two-way but some are three
way branches in control flow.
3. Case Statements:
▪ A case statement is a multi-way branch or decisions.
▪ Examples of case statement are a jump table in assembly
language, and the PASCAL case statement.
▪ From the point of view of test design, there are no
differences between Decisions and Case Statements
4. Junctions:
▪ A junction is a point in the program where the control flow
can merge.
▪ Examples of junctions are: the target of a jump or skip
instruction in ALP, a label that is a target of GOTO.
15
Figure 2.1: Flow graph Elements
Control Flow Graphs Vs Flowcharts:
o A program's flow chart resembles a control flow graph.
o In flow graphs, we don't show the details of what is in a process block.
o In flow charts every part of the process block is drawn.
o The flowchart focuses on process steps, where as the flow graph focuses on control
flow of the program.
o The act of drawing a control flow graph is a useful tool that can help us clarify the
control flow and data flow issues.
Notational Evolution:
The control flow graph is simplified representation of the program's structure. The notation
changes made in creation of control flow graphs:
o The process boxes weren't really needed. There is an implied process on every line joining
junctions and decisions.
o We don't need to know the specifics of the decisions, just the fact that there is a branch.
o The specific target label names aren't important-just the fact that they exist. So we can
replace them by simple numbers.
o To understand this, we will go through an example (Figure 2.2) written in a FORTRAN
like programming language called Programming Design Language (PDL). The program's
corresponding flowchart (Figure 2.3) and flowgraph (Figure 2.4) were also provided below
for better understanding.
o The first step in translating the program to a flowchart is shown in Figure 2.3, where we
have the typical one-for-one classical flowchart. Note that complexity has increased,
16
clarity has decreased, and that we had to add auxiliary labels (LOOP, XX, and YY), which
have no actual program counterpart. In Figure 2.4 we merged the process steps and
replaced them with the single process box.
o We now have a control flow graph. But this representation is still too busy. We simplify
the notation further to achieve Figure 2.5, where for the first time we can really see what
the control flow looks like.
Although graphical representations of flow graphs are revealing, the details of the control flow inside a
18
program they are often inconvenient.
In linked list representation, each node has a name and there is an entry on the list for each link
in the flow graph. Only the information pertinent to the control flow is shown.
Linked List representation of Flow Graph:
19
Figure 2.8: Alternative Flow graphs for
same logic (Statement "IF (A=0) AND
(B=1) THEN . . .").
An improper translation from flow graph to code during coding can lead to bugs, and improper translation during the test
design lead to missing test cases and causes undiscovered bugs.
Flowcharts can be
1. Handwritten by the programmer.
2. Automatically produced by a flowcharting program based on a mechanical analysis
of the source code.
3. Semi automatically produced by a flow charting program based in part on
structural analysis of the source code and in part on directions given by the
programmer.
There are relatively few control flow graph generators.
There are many paths between the entry and exit of a typical routine.
Every decision doubles the number of potential paths. And every loop multiplies the number of
potential paths by the number of different iteration values possible for the loop.
Defining complete testing:
1. Exercise every path from entry to exit.
2. Exercise every statement or instruction at least once.
3. Exercise every branch and case statement, in each direction at least once.
If prescription 1 is followed then 2 and 3 are automatically followed. But it is impractical for
most routines. It can be done for the routines that have no loops, in which it is equivalent to
2 and 3 prescriptions.
20
EXAMPLE: Here is the correct version.
For X negative, the output is X + A, while for X greater than or equal to zero, the output is X
+ 2A. Following prescription 2 and executing every statement, but not every branch, would
not reveal the bug in the following incorrect version:
A negative value produces the correct answer. Every statement can be executed, but if the test
cases do not force each branch to be taken, the bug can remain hidden. The next example uses
a test based on executing each branch but does not force the execution of all statements:
The hidden loop around label 100 is not revealed by tests based on prescription 3 alone because
no test forces the execution of statement 100 and the following GOTO statement. Furthermore,
label 100 is not flagged by the compiler as an unreferenced label and the subsequent GOTO does
not refer to an undefined label.
A Static Analysis (that is, an analysis based on examining the source code or structure) cannot
determine whether a piece of code is or is not reachable. There could be subroutine calls with
parameters that are subroutine labels, or in the above example there could be a GOTO that
targeted label 100 but could never achieve a value that would send the program to that label.
Only a Dynamic Analysis (that is, an analysis based on the code's behavior while running - which
is to say, to all intents and purposes, testing) can determine whether code is reachable or not
and therefore distinguish between the ideal structure we think we have and the actual, buggy
structure.
21
PATH TESTING CRITERIA:
Any testing strategy based on paths must at least both exercise every instruction and take
branches in all directions.
A set of tests that does this is not complete in an absolute sense, but it is complete in the sense that
anything less must leave something untested.
So we have explored three different testing criteria or strategies out of a potentially infinite family of
strategies.
7. After you have traced a covering path set on the master sheet and filled in the table
for every path, check the following:
1. Does every decision have a YES and a NO in its column? (C2)
23
2. Has every case of all case statements been marked? (C2)
3. Is every three - way branch (less, equal, greater) covered? (C2)
4. Is every link (process) covered at least once? (C1)
8. Revised Path Selection Rules:
▪ Pick the simplest, functionally sensible entry/exit path.
▪ Pick additional paths as small variation from previous paths. Pick paths that do not
have loops rather than paths that do. Favor short paths that make sense over paths
that don't.
▪ Pick additional paths that have no obvious functional meaning only if it's necessary to
provide coverage.
▪ Be comfortable with your chosen paths. Play your hunches (guesses) and give your
intuition free reign as long as you achieve C1+C2.
▪ Don't follow rules slavishly (blindly) - except for coverage.
LOOPS:
Cases for a single loop: A Single loop can be covered with two cases: Looping and Not looping.
But, experience shows that many loop-related bugs are not discovered by C1+C2. Bugs hide
themselves in corners and congregate at boundaries - in the cases of loops, at or around the
minimum or maximum number of times the loop can be iterated. The minimum number of
iterations is often zero, but it need not be.
Kinds of Loops: There are only three kinds of loops with respect to path testing:
▪ Nested Loops:
The number of tests to be performed on nested loops will be the exponent of the tests
performed on single loops.As we cannot always afford to test all combinations of nested
loops' iterations values. Here's a tactic used to discard some of these values:
1. Start at the inner most loop. Set all the outer loops to their minimum values.
2. Test the minimum, minimum+1, typical, maximum-1 , and maximum for the innermost
loop, while holding the outer loops at their minimum iteration parametervalues. Expand
the tests as required for out of range and excluded values.
3. If you've done the outmost loop, GOTO step 5, else move out one loop and set it up as
in step 2 with all other loops set to typical values.
4. Continue outward in this manner until all loops have been covered.
5. Do all the cases for all loops in the nest simultaneously.
▪ Concatenated Loops:
Concatenated loops fall between single and nested loops with respect to test cases. Two
loops are concatenated if it's possible to reach one after exiting the other while still on a
path from entrance to exit.
If the loops cannot be on the same path, then they are not concatenated and can be treated
as individual loops.
▪ Horrible Loops:
A horrible loop is a combination of nested loops, the use of code that jumps into and out
of loops, intersecting loops, hidden loops, and cross connected loops.
Makes iteration value selection for test cases an awesome and ugly task, which is another
reason such structures should be avoided.
25
Figure 2.10: Example of Loop types
26
▪ Put in limits or checks that prevent the combined extreme cases. Then you have to test
the software that implements such safety measures.
MULTIWAY BRANCHES:
The path taken through a multiway branch such as a computed GOTO's, case statement, or
jump tables cannot be directly expressed in TRUE/FALSE terms.
Although, it is possible to describe such alternatives by using multi valued logic, an expedient
(practical approach) is to express multiway branches as an equivalent set of if..then..else
statements.
For example a three way case statement can be written as: If case=1 DO A1 ELSE (IF Case=2
DO A2 ELSE DO A3 ENDIF) ENDIF.
INPUTS:
In testing, the word input is not restricted to direct inputs, such as variables in a subroutine
call, but includes all data objects referenced by the routine whose values are fixed prior to
entering it.
For example, inputs in a calling sequence, objects in a data structure, values left in registers,
or any combination of object types.
The input for a particular test is mapped as a one dimensional array called as an Input Vector.
PREDICATE INTERPRETATION:
The simplest predicate depends only on input variables.
For example if x1,x2 are inputs, the predicate might be x1+x2>=7, given the values of x1
and x2 the direction taken through the decision is based on the predicate is determined at
input time and does not depend on processing.
Another example, assume a predicate x1+y>=0 that along a path prior to reaching this
predicate we had the assignment statement y=x2+7. although our predicate depends on
processing, we can substitute the symbolic expression for y to obtain an equivalent
predicate x1+x2+7>=0.
The act of symbolic substitution of operations along the path in order to express the
predicate solely in terms of the input vector is called predicate interpretation.
Sometimes the interpretation may depend on the path; for
example, INPUT X
ON X GOTO A, B, C, ...
A: Z := 7 @ GOTO HEM B: Z := -
7 @ GOTO HEM C: Z := 0 @
GOTO HEM
.........
HEM: DO SOMETHING
.........
HEN: IF Y + Z > 0 GOTO ELL ELSE GOTO EMM
27
The predicate interpretation at HEN depends on the path we took through the first multiway branch. It yields for
the three cases respectively, if Y+7>0, Y-7>0, Y>0.
The path predicates are the specific form of the predicates of the decisions along the
selected path after interpretation.
28
Boolean algebra notation to denote the boolean expression:
ABCD+EBCD=(A+E)BCD
PREDICATE COVERAGE:
Compound Predicate: Predicates of the form A OR B, A AND B and more complicated
Boolean expressions are called as compound predicates.
Sometimes even a simple predicate becomes compound after interpretation. Example: the
predicate if (x=17) whose opposite branch is if x.NE.17 which is equivalent to x>17. Or. X<17.
Predicate coverage is being the achieving of all possible combinations of truth values
corresponding to the selected path have been explored under some test.
As achieving the desired direction at a given decision could still hide bugs in the associated
predicates
TESTING BLINDNESS:
Testing Blindness is a pathological (harmful) situation in which the desired path is achieved
for the wrong reason.
There are three types of Testing Blindness:
Assignment Blindness:
o Assignment blindness occurs when the buggy predicate appears to work correctly
because the specific value chosen for an assignment statement works with both the
correct and incorrect predicate.
o For Example:
Correct Buggy
X = 7 X = 7
........ ........
if Y > 0 if X+Y > 0
then ... then ...
o If the test case sets Y=1 the desired path is taken in either case, but there is still a bug.
Equality Blindness:
o Equality blindness occurs when the path selected by a prior predicate results in a value
29
that works both for the correct and buggy predicate.
o For Example:
Correct Buggy
if Y = 2 then if Y = 2 then
........ ........
if X+Y > 3 if X > 1
then ... then ...
o The first predicate if y=2 forces the rest of the path, so that for any positive value of x. the
path taken at the second predicate will be the same for the correct and buggy version.
Self Blindness:
o Self blindness occurs when the buggy predicate is a multiple of the correct predicate and as
a result is indistinguishable along that path.
o For Example:
Correct Buggy
X=A X=A
........ ........
if X-1 > 0 if X+A-2 > 0
then ... then ...
1. The assignment (x=a) makes the predicates multiples of each other, so the direction taken is the same for the
correct and buggy version.
PATH SENSITIZING:
1. This is a workable approach, instead of selecting the paths without considering how to
sensitize, attempt to choose a covering path set that is easy to sensitize and pick hard to
sensitize paths only as you must to achieve coverage.
2. Identify all variables that affect the decision.
3. Classify the predicates as dependent or independent.
4. Start the path selection with un correlated, independent predicates.
5. If coverage has not been achieved using independent uncorrelated predicates, extend the
path set using correlated predicates.
6. If coverage has not been achieved extend the cases to those that involve dependent
predicates.
7. Last, use correlated, dependent predicates.
PATH INSTRUMENTATION:
1. Path instrumentation is what we have to do to confirm that the outcome was achieved by
the intended path.
2. Co-incidental Correctness: The coincidental correctness stands for achieving the desired
outcome for wrong reason.
31
1. Interpretive Trace Program:
o An interpretive trace program is one that executes every statement in order and
records the intermediate values of all calculations, the statement labels traversed etc.
o If we run the tested routine under a trace, then we have all the information we need to
confirm the outcome and, furthermore, to confirm that it was achieved by the intended
path.
o The trouble with traces is that they give us far more information than we need. In fact,
the typical trace program provides so much information that confirming the path from
its massive output dump is more work than simulating the computer by hand to
confirm the path.
o Why Single Link Markers aren't enough: Unfortunately, a single link marker may not do
the trick because links can be chewed by open bugs.
32
We intended to traverse the ikm path, but because of a rampaging GOTO in the middle of
the m link, we go to process B. If coincidental correctness is against us, the outcomes will
be the same and we won't know about the bug.
Link Counter: A less disruptive (and less informative) instrumentation method is based on
counters. Instead of a unique link name to be pushed into a string when the link is traversed,
we simply increment a link counter. We now confirm that the path length is as expected.
The same problem that led us to double link markers also leads us to double link counters.
33