Detailed Information

Cited 1 time in webofscience Cited 3 time in scopus
Metadata Downloads

DEMINER: test generation for high test coverage through mutant exploration

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Yunho-
dc.contributor.authorHong, Shin-
dc.date.accessioned2022-07-07T01:38:39Z-
dc.date.available2022-07-07T01:38:39Z-
dc.date.created2021-05-14-
dc.date.issued2021-01-
dc.identifier.issn0960-0833-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/142455-
dc.description.abstractMost software testing techniques test a target program as it is and fail to utilize valuable information of diverse test executions on many variants/mutants of the original program in test generation. This paper proposes a new test generation technique DEMINER, which utilizes mutant executions to guide test generation on the original program for high test coverage. DEMINER first generates various mutants of an original target program and then extracts runtime information of mutant executions, which covered unreached branches by the mutation effects. Using the obtained runtime information, DEMINER inserts guideposts, artificial branches to replay the observed mutation effects, to the original target programs. Finally, DEMINER runs automated test generation on the original program with guideposts and achieves higher test coverage. We implemented DEMINER for C programs through software mutation and guided test generation such as concolic testing and fuzzing. We have shown the effectiveness of DEMINER on six real-world target programs: Busybox-ls, Busybox-printf, Coreutils-sort, GNU-find, GNU-grep and GNU-sed. The experiment results show that DEMINER improved branch coverage by 63.4% and 19.6% compared with those of the conventional concolic testing techniques and the conventional fuzzing techniques on average, respectively.-
dc.language영어-
dc.language.isoen-
dc.publisherWILEY-
dc.titleDEMINER: test generation for high test coverage through mutant exploration-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Yunho-
dc.identifier.doi10.1002/stvr.1715-
dc.identifier.scopusid2-s2.0-85074668003-
dc.identifier.wosid000492768300001-
dc.identifier.bibliographicCitationSOFTWARE TESTING VERIFICATION & RELIABILITY, v.31, no.1-2, pp.1 - 32-
dc.relation.isPartOfSOFTWARE TESTING VERIFICATION & RELIABILITY-
dc.citation.titleSOFTWARE TESTING VERIFICATION & RELIABILITY-
dc.citation.volume31-
dc.citation.number1-2-
dc.citation.startPage1-
dc.citation.endPage32-
dc.type.rimsART-
dc.type.docType정기학술지(Article(Perspective Article포함))-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusC (programming language)-
dc.subject.keywordPlusOpen source software-
dc.subject.keywordPlusTesting-
dc.subject.keywordPlusAutomated test generations-
dc.subject.keywordPlusConcolic testing-
dc.subject.keywordPlusfuzzing-
dc.subject.keywordPlusMutation analysis-
dc.subject.keywordPlusTest coverage-
dc.subject.keywordPlusSoftware testing-
dc.subject.keywordAuthorautomated test generation-
dc.subject.keywordAuthorconcolic testing-
dc.subject.keywordAuthorfuzzing-
dc.subject.keywordAuthormutation analysis-
dc.subject.keywordAuthortest coverage-
dc.identifier.urlhttps://onlinelibrary.wiley.com/doi/10.1002/stvr.1715-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Yunho photo

Kim, Yunho
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE