Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2014, Vol. 54 Issue (1) : 60-67     DOI:
Orginal Article |
Bug detection methods based on path analyses and iterative metamorphic testing
Guowei DONG(),Tao GUO,Puhan ZHANG,Yizhen JIA
China Information Technology Security Evaluation Center, Beijing 100085, China
Download: PDF(1362 KB)   HTML
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks     Supporting Info
Guide   
Abstract  

This paper presents metamorphic testing (MT) methods for program bug detection with white-box criterion to reuse more testing resources and reduce cost. The correctness of mission-critical software is an important part of information security. Security systems often use metamorphic testing to solve the oracle problem with random tests. This article introduces two iterative metamorphic testing algorithms, AESIST and AEMIST, to analyze binary metamorphic relationships based upon APCEM (all-path coverage for every metamorphic relation). The test shows the efficiencies of these methods for bug detection.

Keywords path analysis      iterative metamorphic testing      metamorphic relationship      bug detection     
ZTFLH:     
Fund: 
Issue Date: 15 January 2014
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
Guowei DONG
Tao GUO
Puhan ZHANG
Yizhen JIA
Cite this article:   
Guowei DONG,Tao GUO,Puhan ZHANG, et al. Bug detection methods based on path analyses and iterative metamorphic testing[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(1): 60-67.
URL:  
http://jst.tsinghuajournals.com/EN/     OR     http://jst.tsinghuajournals.com/EN/Y2014/V54/I1/60
  
路径 路径对应的输入域 三角形类型
1 {(max,mid,min) | (max2<mid2+ min2)∧(max=mid)}∩Tir 顶角≤60度的等腰锐角三角形
2 {(max,mid,min) | (max2<mid2+ min2)∧(min=mid)}∩Tir 顶角>60度的等腰锐角三角形
3 {(max,mid,min) | (max2<mid2+ min2)∧(三者互不相等)}∩Tir 不规则的锐角三角形
4 {(max,mid,min) | (max2=mid2+ min2)}∩Tir 直角三角形
5 {(max,mid,min) | (max2>mid2+ min2)∧(min=mid)}∩Tir 等腰钝角三角形
6 {(max,mid,min) | (max2>mid2+ min2)∧(三者互不相等)}∩Tir 不规则的钝角三角形
  
  
  
  
  
  
[1] Chen T Y, Cheung S C, Yiu S M. Metamorphic Testing: A New Approach for Generating Next Test Cases, Technical Report HKUST-CS98-01 [R]. Hong Kong, China:Hong Kong University of Science and Technology, 1998.
[2] Chen T Y, Kuo F C, Liu Y, et al.Metamorphic testing and testing with special values [C]// Proceedings of the 5th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'04). Beijing, China: IEEE Computer Society, 2004: 128-134.
[3] 吴鹏, 施小纯, 唐江峻, 等. 关于蜕变测试和特殊用例测试的实例研究 [J]. 软件学报, 2005, 16(7): 1210-1220. WU Peng, SHI Xiaochun, TANG Jiangjun, et al.Metamorphic testing and special case testing: A case study[J]. Journal of Software, 2005, 16(7): 1210-1220. (in Chinese)
url: http://d.wanfangdata.com.cn/Periodical_rjxb200507003.aspx
[4] Wu P. Iterative metamorphic testing [C]// Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC'05). Edinburgh, UK: IEEE Computer Society, 2005: 19-24.
[5] 董国伟, 聂长海, 徐宝文. 基于程序路径分析的有效蜕变测试[J]. 计算机学报, 2009, 32(5): 1002-1013. DONG Guowei, NIE Changhai, XU Baowen. Effective metamorphic testing based on program path analysis[J]. Chinese Journal of Computers, 2009, 32(5): 1002-1013. (in Chinese)
url: http://www.cnki.com.cn/Article/CJFDTotal-JSJX200905018.htm
[6] Chen T Y, Huang D H, Tse T H, et al. Case studies on the selection of useful relations in metamorphic testing [C]// Proceedings of the 4th Ibero-American Symposium on Software Engineering and Knowledge Engineering (JIISIC'04). Madrid, Spain: IEEE Computer Society, 2004: 569-583.
[7] Mayer J, Guderlei R. An empirical study on the selection of good metamorphic relations [C]// Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC'06). Chicago, USA: IEEE Computer Society, 2006: 475-484.
[8] Chen T Y, Tse T H, Zhou Z Q. Semi-proving: An integrated method based on global symbolic evaluation and metamorphic testing[J]. ACM SIGSOFT Software Engineering Notes, 2002, 27(4): 191-195.
url: http://dx.doi.org/10.1145/566171.566202
[9] Chen T Y, Tse T H, Zhou Z Q. Fault-based testing without the need of oracles[J]. Information and Software Technology, 2003, 45(1): 1-9.
url: http://dx.doi.org/10.1016/S0950-5849(02)00129-5
[10] Chen T Y, Feng J, Tse T H. Metamorphic testing of programs on partial differential equations: A case study [C]//Proceedings of the 26th Annual International Computer Software and Applications Conference (COMPSAC'02). Oxford, England: IEEE Computer Society, 2002: 327-333.
[11] Zhou Z Q, Huang D H, Tse T H, et al. Metamorphic testing and its applications [C]// Proceedings of the 8th International Symposium on Future Software Technology (ISFST'04). Xi'an, China: IEEE Computer Society, 2004: 23-28.
[12] Chen H Y, Tse T H, Chan F T, at el. In black and white: An integrated approach to class-level testing of object-oriented programs[J]. ACM Transactions on Software Engineering and Methodology, 1998, 7(3): 250-295.
url: http://dx.doi.org/10.1145/287000.287004
[1] YANG Jiahai, JIAO Liang, QIN Donghong, GE Liansheng. Experimental study of BGP routing-table-based inter-domain path characteristics[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(11): 1190-1196.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd