Fault Localization Prioritization: Comparing Information-Theoretic and Coverage-Based Approaches

被引:73
作者
Yoo, Shin [1 ]
Harman, Mark [1 ]
Clark, David [1 ]
机构
[1] UCL, London WC1E 6BT, England
关键词
Algorithms; Test case prioritization; fault localization; information theory; FLOW;
D O I
10.1145/2491509.2491513
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Test case prioritization techniques seek to maximize early fault detection. Fault localization seeks to use test cases already executed to help find the fault location. There is a natural interplay between the two techniques; once a fault is detected, we often switch focus to fault fixing, for which localization may be a first step. In this article we introduce the Fault Localization Prioritization (FLP) problem, which combines prioritization and localization. We evaluate three techniques: a novel FLP technique based on information theory, FLINT (Fault Localization using INformation Theory), that we introduce in this article, a standard Test Case Prioritization (TCP) technique, and a "test similarity technique" used in previous work. Our evaluation uses five different releases of four software systems. The results indicate that FLP and TCP can statistically significantly reduce fault localization costs for 73% and 76% of cases, respectively, and that FLINT significantly outperforms similarity-based localization techniques in 52% of the cases considered in the study.
引用
收藏
页码:1 / 29
页数:29
相关论文
共 31 条
[1]   On the accuracy of spectrum-based fault localization [J].
Abreu, Rui ;
Zoeteweij, Peter ;
van Gemund, Arjan J. C. .
TAIC PART 2007 - TESTING: ACADEMIC AND INDUSTRIAL CONFERENCE - PRACTICE AND RESEARCH TECHNIQUES, PROCEEDINGS: CO-LOCATED WITH MUTATION 2007, 2007, :89-+
[2]  
ALLEN E. B., 1999, P 6 INT S SOFTW METR
[3]  
[Anonymous], 2010, ISSTA, DOI [10.1145/1831708.1831715, DOI 10.1145/1831708.1831715]
[4]   Studying software evolution using artefacts' shared information content [J].
Arbuckle, Tom .
SCIENCE OF COMPUTER PROGRAMMING, 2011, 76 (12) :1078-1097
[5]  
Baah G. K., 2010, P 19 INT S SOFTW TES, P73, DOI DOI 10.1145/1831708.1831717
[6]  
Boreale M, 2010, IFIP ADV INF COMM TE, V323, P340
[7]  
Clark D., 2002, ELECT NOTES THEORETI, V59, P1
[8]   A static analysis for quantifying information flow in a simple imperative language [J].
Clark, David ;
Hunt, Sebastian ;
Malacaria, Pasquale .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (03) :321-371
[9]   Quantifying information flow with beliefs [J].
Clarkson, Michael R. ;
Myers, Andrew C. ;
Schneider, Fred B. .
JOURNAL OF COMPUTER SECURITY, 2009, 17 (05) :655-701
[10]  
Cleve H, 2005, PROC INT CONF SOFTW, P342