Mutant minimization for model-checker based test-case generation

被引:7
作者
Fraser, Gordon [1 ]
Wotawa, Franz [1 ]
机构
[1] Graz Univ Technol, Inst Software Technol, Inffeldgasse 16B-2, A-8010 Graz, Austria
来源
TAIC PART 2007 - TESTING: ACADEMIC AND INDUSTRIAL CONFERENCE - PRACTICE AND RESEARCH TECHNIQUES, PROCEEDINGS: CO-LOCATED WITH MUTATION 2007 | 2007年
关键词
D O I
10.1109/TAIC.PART.2007.30
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mutation of model-checker specifications is used to generate test-cases automatically. In general, model-checker based techniques are efficient when using small, abstract models, but are limited in their applicability by the performance of the model-checker Issues that contribute to potentially bad performance are equivalent mutants which result in no test-cases, and the fact that many different mutants lead to identical or subsumed test-cases. Another drawback of such approaches is that the size of resulting test-suites can be rather large, which might require test-suite reduction as an additional post-processing step. In this paper, we describe how the number of mutants can be minimized with special properties, which help to detect equivalent mutants more quickly and to avoid the creation of redundant test-cases. Consequently, the size of created test-suites is reduced.
引用
收藏
页码:161 / +
页数:2
相关论文
共 13 条
  • [1] Using a model checker to test safety properties
    Ammann, P
    Ding, W
    Xu, DL
    [J]. SEVENTH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2001, : 212 - 221
  • [2] Ammann P. E., 1999, Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering, P239, DOI 10.1109/HASE.1999.809499
  • [3] Using model checking to generate tests from specifications
    Ammann, PE
    Black, PE
    Majurski, W
    [J]. SECOND INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1998, : 46 - 54
  • [4] BLACKBURN R, 2000, LEGAL CRIMINOL PSYCH, V5, P1, DOI DOI 10.1348/135532500167921
  • [5] Cimatti A., 1999, Computer Aided Verification. 11th International Conference, CAV'99. Proceedings (Lecture Notes in Computer Science Vol.1633), P495
  • [6] FRASER G, 2007, IN PRESS P 3 WORKSH
  • [7] Harrold M. J., 1993, ACM Transactions on Software Engineering and Methodology, V2, P270, DOI 10.1145/152388.152391
  • [8] Monitoring programs using rewriting
    Havelund, K
    Rosu, G
    [J]. 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 135 - 143
  • [9] Hong HS, 2003, PROC INT CONF SOFTW, P232
  • [10] OKUN V, 2003, P 2002 WSEAS INT C S, P1351