Computer Science ›› 2017, Vol. 44 ›› Issue (11): 175-180.doi: 10.11896/j.issn.1002-137X.2017.11.026

Previous Articles     Next Articles

MBFL with Statement-oriented Mutant Reduction Strategy

WANG Lin-xin, WANG Wei-wei, ZHAO Rui-lian and LI Zheng   

  • Online:2018-12-01 Published:2018-12-01

Abstract: How to efficiently and accurately locate faults in programs during the process of software debugging is taken up as a matter of common concern for software developers.MBFL is a fault localization technique based on mutation analysis,which precisely identifies the root cause of fault but incurs a high execution cost,since it needs to execute the test suite on a large amount of mutants.For decreasing the execution cost of MBFL,this paper presented a statement-oriented mutant reduction strategy,which selects a certain proportion set of mutants generated by statements covered by failed tests,according to the previous execution information of test suite.Empirical studies were conducted on 112 faulty versions from 7 program packages.The results indicate that this strategy can reduce 73.51%~79.98% mutation execution cost under the case of keeping high fault location precision.

Key words: Fault localization,Mutation analysis,Mutant reduction strategy

[1] YU K,LIN M X.Advances in Automatic Software Fault Localization Techniques[J].Chinese Journal on Computers,2011,24(8):1411-1422.(in Chinese) 虞凯,林梦香.自动化软件错误定位技术研究进展[J].计算机学报,2011,34(8):1411-1422.
[2] WONG W E,DEBROY V.A survey of software fault localization.http://core.ac.uk/display/21888435.
[3] JONES J A,HARROLD M J.Empirical evaluation of the tarantula automatic fault-localization technique[C]∥Proceedings of the 20th IEEE/ACM international Conference on Automated Software Engineering.ACM,2005:273-282.
[4] ABREU R,ZOETEWEIJ P,VAN GEMUND A J C.An evaluation of similarity coefficients for software fault localization[C]∥12th Pacific Rim International Symposium on Dependable Computing,2006(PRDC’06).IEEE,2006:39-46.
[5] NAISH L,LEE H J,RAMAMOHANARAO K.A model forspectra-based software diagnosis[J].ACM Transactions on Software Engineering and Methodology (TOSEM),2011,20(3):1-32.
[6] PAPADAKIS M,LE T Y.Using mutants to locate “ Unknown” faults[C]∥2012 IEEE Fifth International Conference on Software Testing,Verification and Validation (ICST).IEEE,2012:691-700.
[7] PAPADAKIS M,LE TRAON Y.Metallaxis-FL:Mutation-based Fault Localization[J].Software Testing,Verification and Reliability,2015,25(5-7):605-628.
[8] PAPADAKIS M,LE TRAON Y.Effective Fault Localizationvia Mutation Analysis:A Selective Mutation Approach[C]∥Proceedings of the 29th Annual ACM Symposium on Applied Computing(SAC).2014:1293-1300.
[9] MOON S,KIM Y,KIM M.Ask the mutants:Mutating faulty programs for fault localization[C]∥2014 IEEE Seventh International Conference on Software Testing,Verification and Validation (ICST).IEEE,2014:153-162.
[10] JIA Y,HARMAN M.An analysis and survey of the development of mutation testing[J].Software Engineering,2011,37(5):649-678.
[11] ZHANG L,MARINOV D,KHURSHID S.Faster mutation testing inspired by test prioritization and reduction[C]∥Procee-dings of the 2013 International Symposium on Software Testing and Analysis.ACM,2013:235-245.
[12] GONG P,ZHAO R,LI Z.Faster mutation-based fault localization with a novel mutation execution strategy[C]∥2015 IEEE Eighth International Conference on Software Testing,Verification and Validation Workshops (ICSTW).IEEE,2015:1-10.
[13] ZHANG L,HOU S S,HU J J,et al.Is operator-based mutant selection superior to random mutant selection?[C]∥Procee-dings of the 32nd ACM/IEEE International Conference on Software Engineering.ACM,2010:435-444.
[14] DELAMARO M E,MALDONADO J C,MATHUR A P.Pro-teum-A Tool for the Assessment of Test Adequacy for C Programs User’s guide[C]∥PCS.1999:79-95.
[15] MALDONADO J C,VINCENZI A M R, DELAMARO M E.Proteum/IM 2.0:An Integrated Mutation Testing Environment[C]∥Mutation 2000 Symposium.San Jose,CA:Kluwer Academic Publishers,2000:91-101.
[16] DO H,ELBAUM S,ROTHERMEL G.Supporting controlledexperimentation with testing techniques:An infrastructure and its potential impact[J].Empirical Software Engineering,2005,10(4):405-435.
[17] XIE X,CHEN T Y,KUO F C,et al.A theoretical analysis of the risk evaluation formulas for spectrum-based fault localization[J].ACM Transactions on Software Engineering and Me-thodology (TOSEM),2013,22(4):31.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .