메뉴 건너뛰기




Volumn , Issue , 2012, Pages 716-726

Make test-zesti: A symbolic execution solution for improving regression testing

Author keywords

regression testing; symbolic execution; test improvement

Indexed keywords

CURRENT TESTING; OPEN-SOURCE CODE; PROTOTYPE SYSTEM; REGRESSION TESTING; REGRESSION TESTS; SOURCE CODES; SYMBOLIC EXECUTION; SYMBOLIC TEST; TEST IMPROVEMENT;

EID: 84864272279     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2012.6227146     Document Type: Conference Paper
Times cited : (77)

References (42)
  • 1
    • 43449134336 scopus 로고    scopus 로고
    • JPF-SE: A symbolic execution extension to Java PathFinder
    • Mar.-Apr.
    • S. Anand, C. S. Pǎsǎreanu, and W. Visser, "JPF-SE: a symbolic execution extension to Java PathFinder," in TACAS'07, Mar.-Apr. 2007.
    • (2007) TACAS'07
    • Anand, S.1    Pǎsǎreanu, C.S.2    Visser, W.3
  • 2
    • 77955877763 scopus 로고    scopus 로고
    • Directed test generation for effective fault localization
    • Jul.
    • S. Artzi, J. Dolby, F. Tip, and M. Pistoia, "Directed test generation for effective fault localization," in ISSTA'10, Jul. 2010.
    • (2010) ISSTA'10
    • Artzi, S.1    Dolby, J.2    Tip, F.3    Pistoia, M.4
  • 3
    • 80051934403 scopus 로고    scopus 로고
    • Statically-directed dynamic automated test generation
    • Jul.
    • D. Babić, L. Martignoni, S. McCamant, and D. Song, "Statically-directed dynamic automated test generation," in ISSTA'11, Jul. 2011.
    • (2011) ISSTA'11
    • Babić, D.1    Martignoni, L.2    McCamant, S.3    Song, D.4
  • 4
    • 0000422474 scopus 로고    scopus 로고
    • Automatically validating temporal safety properties of interfaces
    • May
    • T. Ball and S. K. Rajamani, "Automatically validating temporal safety properties of interfaces," in SPIN'01, May 2001.
    • (2001) SPIN'01
    • Ball, T.1    Rajamani, S.K.2
  • 5
    • 0027224411 scopus 로고
    • Incremental program testing using program dependence graphs
    • Jan.
    • S. Bates and S. Horwitz, "Incremental program testing using program dependence graphs," in POPL'93, Jan. 1993.
    • (1993) POPL'93
    • Bates, S.1    Horwitz, S.2
  • 6
    • 70349693589 scopus 로고    scopus 로고
    • RWset: Attacking path explosion in constraint-based test generation
    • Mar.-Apr.
    • P. Boonstoppel, C. Cadar, and D. Engler, "RWset: Attacking path explosion in constraint-based test generation," in TACAS'08, Mar.-Apr. 2008.
    • (2008) TACAS'08
    • Boonstoppel, P.1    Cadar, C.2    Engler, D.3
  • 7
    • 79955963313 scopus 로고    scopus 로고
    • Parallel symbolic execution for automated real-world software testing
    • Apr.
    • S. Bucur, V. Ureche, C. Zamfir, and G. Candea, "Parallel symbolic execution for automated real-world software testing," in EuroSys'11, Apr. 2011.
    • (2011) EuroSys'11
    • Bucur, S.1    Ureche, V.2    Zamfir, C.3    Candea, G.4
  • 8
    • 0033688092 scopus 로고    scopus 로고
    • A static analyzer for finding dynamic programming errors
    • W. R. Bush, J. D. Pincus, and D. J. Sielaff, "A static analyzer for finding dynamic programming errors," Software: Practice and Experience, vol. 30, no. 7, pp. 775-802, 2000.
    • (2000) Software: Practice and Experience , vol.30 , Issue.7 , pp. 775-802
    • Bush, W.R.1    Pincus, J.D.2    Sielaff, D.J.3
  • 9
    • 67650790221 scopus 로고    scopus 로고
    • KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
    • Dec.
    • C. Cadar, D. Dunbar, and D. Engler, "KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs," in OSDI'08, Dec. 2008.
    • (2008) OSDI'08
    • Cadar, C.1    Dunbar, D.2    Engler, D.3
  • 11
    • 85071952998 scopus 로고    scopus 로고
    • Mace: Model-inference-assisted concolic exploration for protocol and vulnerability discovery
    • Aug.
    • C. Y. Cho, D. Babić, P. Poosankam, K. Z. Chen, E. X. Wu, and D. Song, "Mace: model-inference-assisted concolic exploration for protocol and vulnerability discovery," in USENIX Security'11, Aug. 2011.
    • (2011) USENIX Security'11
    • Cho, C.Y.1    Babić, D.2    Poosankam, P.3    Chen, K.Z.4    Wu, E.X.5    Song, D.6
  • 12
    • 0036040604 scopus 로고    scopus 로고
    • Path-sensitive program verification in polynomial time
    • Jun.
    • M. Das, S. Lerner, and M. Seigle, "Path-sensitive program verification in polynomial time," in PLDI'02, Jun. 2002.
    • (2002) PLDI'02
    • Das, M.1    Lerner, S.2    Seigle, M.3
  • 14
    • 0030651806 scopus 로고    scopus 로고
    • Model Checking for Programming Languages using VeriSoft
    • Jan.
    • P. Godefroid, "Model Checking for Programming Languages using VeriSoft," in POPL'97, Jan. 1997.
    • (1997) POPL'97
    • Godefroid, P.1
  • 15
    • 34548273557 scopus 로고    scopus 로고
    • Compositional dynamic test generation
    • Jan.
    • P. Godefroid, "Compositional dynamic test generation," in POPL'07, Jan. 2007.
    • (2007) POPL'07
    • Godefroid, P.1
  • 16
    • 31844450371 scopus 로고    scopus 로고
    • DART: Directed automated
    • random testing, Jun.
    • P. Godefroid, N. Klarlund, and K. Sen, "DART: Directed automated random testing," in PLDI'05, Jun. 2005.
    • (2005) PLDI'05
    • Godefroid, P.1    Klarlund, N.2    Sen, K.3
  • 18
    • 0030173997 scopus 로고    scopus 로고
    • Program slicing-based regression testing techniques
    • R. Gupta, M. Jean, H. Mary, and L. Soffa, "Program slicing-based regression testing techniques," STVR, vol. 6, pp. 83-112, 1996.
    • (1996) STVR , vol.6 , pp. 83-112
    • Gupta, R.1    Jean, M.2    Mary, H.3    Soffa, L.4
  • 19
    • 0027625420 scopus 로고
    • A methodology for controlling the size of a test suite
    • M. J. Harrold, C. Unwersity, R. Gupta, and M. L. Soffa, "A methodology for controlling the size of a test suite," ACM TOSEM, vol. 2, pp. 270-285, 1993.
    • (1993) ACM TOSEM , vol.2 , pp. 270-285
    • Harrold, M.J.1    Unwersity, C.2    Gupta, R.3    Soffa, M.L.4
  • 20
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • Jan.
    • R. Hastings and B. Joyce, "Purify: Fast detection of memory leaks and access errors," in USENIX-Winter'92, Jan. 1992.
    • (1992) USENIX-Winter'92
    • Hastings, R.1    Joyce, B.2
  • 21
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • G. J. Holzmann, "The model checker SPIN," Software Engineering, vol. 23, no. 5, pp. 279-295, 1997.
    • (1997) Software Engineering , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.J.1
  • 23
    • 37849012644 scopus 로고    scopus 로고
    • Predictive testing: Amplifying the effectiveness of software testing
    • Sep.
    • P. Joshi, K. Sen, and M. Shlimovich, "Predictive testing: amplifying the effectiveness of software testing," in ESEC/FSE'07, Sep. 2007.
    • (2007) ESEC/FSE'07
    • Joshi, P.1    Sen, K.2    Shlimovich, M.3
  • 24
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • July
    • J. C. King, "Symbolic execution and program testing," CACM, vol. 19, no. 7, pp. 385-394, July 1976.
    • (1976) CACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 25
    • 85077733517 scopus 로고    scopus 로고
    • High coverage detection of input-related security faults
    • Aug.
    • E. Larson and T. Austin, "High coverage detection of input-related security faults," in USENIX Security'03, Aug. 2003.
    • (2003) USENIX Security'03
    • Larson, E.1    Austin, T.2
  • 26
    • 3042658703 scopus 로고    scopus 로고
    • LLVM: A compilation framework for lifelong program analysis & transformation
    • Mar.
    • C. Lattner and V. Adve, "LLVM: A compilation framework for lifelong program analysis & transformation," in CGO'04, Mar. 2004.
    • (2004) CGO'04
    • Lattner, C.1    Adve, V.2
  • 27
    • 34548738230 scopus 로고    scopus 로고
    • Hybrid concolic testing
    • May
    • R. Majumdar and K. Sen, "Hybrid concolic testing," in ICSE'07, May 2007.
    • (2007) ICSE'07
    • Majumdar, R.1    Sen, K.2
  • 28
    • 0034172234 scopus 로고    scopus 로고
    • Predicting risk of software changes
    • A. Mockus and D. M. Weiss, "Predicting risk of software changes," Bell Labs Technical Journal, vol. 5, no. 2, pp. 169-180, 2000.
    • (2000) Bell Labs Technical Journal , vol.5 , Issue.2 , pp. 169-180
    • Mockus, A.1    Weiss, D.M.2
  • 29
    • 35448955692 scopus 로고    scopus 로고
    • Valgrind: A framework for heavyweight dynamic binary instrumentation
    • Jun.
    • N. Nethercote and J. Seward, "Valgrind: a framework for heavyweight dynamic binary instrumentation," in PLDI'07, Jun. 2007.
    • (2007) PLDI'07
    • Nethercote, N.1    Seward, J.2
  • 30
    • 0001208865 scopus 로고    scopus 로고
    • Analyzing regression test selection techniques
    • G. Rothermel and M. J. Harrold, "Analyzing regression test selection techniques," IEEE TSE, vol. 22, 1996.
    • (1996) IEEE TSE , vol.22
    • Rothermel, G.1    Harrold, M.J.2
  • 32
    • 32344447459 scopus 로고    scopus 로고
    • CUTE: A concolic unit testing engine for C
    • Sep.
    • K. Sen, D. Marinov, and G. Agha, "CUTE: A concolic unit testing engine for C," in ESEC/FSE'05, Sep. 2005.
    • (2005) ESEC/FSE'05
    • Sen, K.1    Marinov, D.2    Agha, G.3
  • 34
    • 0036983191 scopus 로고    scopus 로고
    • Effectively prioritizing tests in development environment
    • Jul.
    • A. Srivastava and J. Thiagarajan, "Effectively prioritizing tests in development environment," in ISSTA'02, Jul. 2002.
    • (2002) ISSTA'02
    • Srivastava, A.1    Thiagarajan, J.2
  • 35
    • 80051930248 scopus 로고    scopus 로고
    • eXpress: Guided path exploration for efficient regression test generation
    • Jul.
    • K. Taneja, T. Xie, N. Tillmann, and J. de Halleux, "eXpress: guided path exploration for efficient regression test generation," in ISSTA'11, Jul. 2011.
    • (2011) ISSTA'11
    • Taneja, K.1    Xie, T.2    Tillmann, N.3    De Halleux, J.4
  • 37
    • 70349698143 scopus 로고    scopus 로고
    • Pex: White box test generation for.net
    • Apr.
    • N. Tillmann and J. De Halleux, "Pex: white box test generation for .net," in TAP'08, Apr. 2008.
    • (2008) TAP'08
    • Tillmann, N.1    De Halleux, J.2
  • 38
    • 85081874807 scopus 로고    scopus 로고
    • A first step towards automated detection of buffer overrun vulnerabilities
    • Feb.
    • D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken, "A first step towards automated detection of buffer overrun vulnerabilities," in NDSS'00, Feb. 2000.
    • (2000) NDSS'00
    • Wagner, D.1    Foster, J.S.2    Brewer, E.A.3    Aiken, A.4
  • 39
    • 78751495155 scopus 로고    scopus 로고
    • Directed test suite augmentation: Techniques and tradeoffs
    • Nov.
    • Z. Xu, Y. Kim, M. Kim, G. Rothermel, and M. B. Cohen, "Directed test suite augmentation: techniques and tradeoffs," in FSE'10, Nov. 2010.
    • (2010) FSE'10
    • Xu, Z.1    Kim, Y.2    Kim, M.3    Rothermel, G.4    Cohen, M.B.5
  • 40
    • 84885668018 scopus 로고    scopus 로고
    • Using model checking to find serious file system errors
    • Dec.
    • J. Yang, P. Twohey, D. Engler, and M. Musuvathi, "Using model checking to find serious file system errors," in OSDI'04, Dec. 2004.
    • (2004) OSDI'04
    • Yang, J.1    Twohey, P.2    Engler, D.3    Musuvathi, M.4
  • 41
    • 69949089663 scopus 로고    scopus 로고
    • Measuring and improving latency to avoid test suite wear out
    • Apr.
    • S. Yoo, M. Harman, and S. Ur, "Measuring and improving latency to avoid test suite wear out," in ICSTW'09, Apr. 2009.
    • (2009) ICSTW'09
    • Yoo, S.1    Harman, M.2    Ur, S.3
  • 42
    • 0036472476 scopus 로고    scopus 로고
    • Simplifying and isolating failure-inducing input
    • A. Zeller and R. Hildebrandt, "Simplifying and isolating failure-inducing input," IEEE TSE, vol. 28, no. 2, pp. 183-200, 2002.
    • (2002) IEEE TSE , vol.28 , Issue.2 , pp. 183-200
    • Zeller, A.1    Hildebrandt, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.