Using symbolic execution and data flow criteria to aid test data selection
The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program paths according to a certain control flow criterion. This subset is called the ZOT‐subset, since it requires paths that traverse loops zero, one...
Saved in:
Published in | Software testing, verification & reliability Vol. 3; no. 2; pp. 101 - 112 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
New York
John Wiley & Sons, Ltd
01.06.1993
|
Subjects | |
Online Access | Get full text |
ISSN | 0960-0833 1099-1689 |
DOI | 10.1002/stvr.4370030205 |
Cover
Loading…
Abstract | The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program paths according to a certain control flow criterion. This subset is called the ZOT‐subset, since it requires paths that traverse loops zero, one and two times. Experience indicates that traversing this subset of program paths is enough to cover most control flow and data flow components of the program. The problem with the ZOT‐subset is that it might contain, for large programs, a large number of paths. The number of paths in this subset can be reduced by concentrating on executable paths that cover vital components of programs such as data flow components. This object is achieved by employing a data flow path selection criterion in the system. The system symbolically executes the paths of the ZOT‐subset, and creates a system of branch conditions for each one. The user determines infeasible paths by checking the consistency of each system of conditions. The system selects feasible paths from the ZOT‐subset that cover the data flow criterion. Solving the systems of conditions of the selected paths provides the user with test data to fulfil the given data flow criterion. |
---|---|
AbstractList | The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program paths according to a certain control flow criterion. This subset is called the ZOT‐subset, since it requires paths that traverse loops zero, one and two times. Experience indicates that traversing this subset of program paths is enough to cover most control flow and data flow components of the program. The problem with the ZOT‐subset is that it might contain, for large programs, a large number of paths. The number of paths in this subset can be reduced by concentrating on executable paths that cover vital components of programs such as data flow components. This object is achieved by employing a data flow path selection criterion in the system. The system symbolically executes the paths of the ZOT‐subset, and creates a system of branch conditions for each one. The user determines infeasible paths by checking the consistency of each system of conditions. The system selects feasible paths from the ZOT‐subset that cover the data flow criterion. Solving the systems of conditions of the selected paths provides the user with test data to fulfil the given data flow criterion. The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program path according to a certain control flow criterion. This subset is called ZOT-subset, since it requires paths that traverse loops zero, one and two times. Experience indicates that traversing this subset of program path is enough to cover most control flow and data flow components of the program. The problem with the ZOT-subset is that it might contain, large programs, a large number of paths. The number of paths in this subset can be reduced by concentrating on executable paths that cover vital components of the programs such as data flow components. This object is achieved by employing a data flow path selection criterion in the system. The system symbolically executes the paths of the ZOT-subset, and creates a system of branch conditions for each one. The user determines infeasible paths by checking the consistency of each system of conditions. The system selects feasible paths from the ZOT-subset that cover the data flow criterion. Solving the systems of conditions of the selected paths provides the user with test data to fulfill the given data flow criterion. |
Author | Girgis, Moheb R. |
Author_xml | – sequence: 1 givenname: Moheb R. surname: Girgis fullname: Girgis, Moheb R. organization: Department of Computer Science, University of Bahrain, P.O. Box 32038, Bahrain |
BookMark | eNqF0DtPwzAUBWALgUQpzKye2EKv49ipxUQr3ggknqPlV5AhTcB2gf57UgWBYAAvHnw-696zgVabtnEIbRPYJQD5KKbXsFvQEoBCDmwFDQgIkRE-FqtoAIJDBmNK19FGjI8AwAUXA3R6G33zgONiptvaG-zenZkn3zZYNRZblRSu6vYNm-CTC17h1GLlLU4upv45utqZpdhEa5Wqo9v6vIfo9vDgZnqcnV8enUz3zzOTl4xlRIuyIBqIoNqBUJyKwpYFM5UC0NxWmmuwRhd5pUtHLLd5pQrruqVyxRinQ7TT__sc2pd5N4ec-WhcXavGtfMoc553B1gXZH3QhDbG4CppfFLLUVNQvpYE5LI5uWxOfjfXudEv9xz8TIXFH2KvF2--dov_4vL65u7qh8567WNy719ahSfJS1oyeX9xJMXx5GwMk0NJ6QdOO5RX |
CitedBy_id | crossref_primary_10_32604_iasc_2021_015708 crossref_primary_10_1145_3020266 crossref_primary_10_1109_ACCESS_2020_2966433 |
Cites_doi | 10.1145/390016.808445 10.1109/T-C.1975.224259 10.1109/32.6194 10.1145/360018.360025 10.1109/TSE.1976.233817 10.1049/sej.1988.0029 10.1109/TSE.1977.231144 10.1145/360248.360252 10.1109/TSE.1979.234184 10.1093/comjnl/30.1.63 10.1049/sej.1992.0029 10.1109/TSE.1985.232226 10.1109/52.1996 |
ContentType | Journal Article |
Copyright | Copyright © 1993 John Wiley & Sons, Ltd |
Copyright_xml | – notice: Copyright © 1993 John Wiley & Sons, Ltd |
DBID | BSCLL AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1002/stvr.4370030205 |
DatabaseName | Istex CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | CrossRef Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1099-1689 |
EndPage | 112 |
ExternalDocumentID | 10_1002_stvr_4370030205 STVR4370030205 ark_67375_WNG_9HBK80BF_3 |
Genre | article |
GroupedDBID | .3N .4S .DC .GA .Y3 05W 0R~ 123 1L6 1OB 1OC 31~ 33P 3SF 3WU 4.4 50Y 50Z 52M 52O 52T 52U 52W 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AANLZ AAONW AASGY AAXRX AAYOK AAZKR ABCUV ABIJN ABPVW ACAHQ ACBWZ ACCFJ ACCZN ACGFS ACIWK ACPOU ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN AEEZP AEIGN AEIMD AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFZJQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS ALUQN AMBMR AMYDB ARCSS ASPBG ATUGU AUFTA AVWKF AZBYB AZFZN AZVAB BAFTC BDRZF BFHJK BHBCM BMNLL BMXJE BNHUX BROTX BRXPI BSCLL CS3 CWDTD D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM EBS EDO EJD F00 F01 F04 F21 FEDTE G-S G.N GNP GODZA H.T H.X HF~ HGLYW HHY HVGLF HZ~ I-F IX1 JPC KQQ LATKE LAW LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LW6 LYRES M61 MEWTI MK4 MK~ ML~ MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 NF~ NNB O66 O9- OIG P2P P2W P2X P4D PALCI PQQKQ Q.N QB0 QRW R.K RIWAO RJQFR ROL RWI RX1 SAMSI SUPJJ TUS UB1 V2E W8V W99 WBKPD WIB WIH WIK WOHZO WWW WXSBR WYISQ WZISG XPP XV2 ZZTAW ~IA ~WT AAHQN AAMNL AANHP AAYCA ACRPL ACYXJ ADNMO AFWVQ ALVPJ AAYXX ADMLS AEYWJ AGHNM AGQPQ AGYGG CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c2755-1b9741b0193be09a6394d745cfa00b6dfb6b0dcb42fb7e1d6d2fa4de0202a5563 |
ISSN | 0960-0833 |
IngestDate | Fri Sep 05 03:40:32 EDT 2025 Tue Jul 01 03:23:20 EDT 2025 Thu Apr 24 23:08:43 EDT 2025 Wed Jan 22 16:52:39 EST 2025 Wed Oct 30 09:51:39 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c2755-1b9741b0193be09a6394d745cfa00b6dfb6b0dcb42fb7e1d6d2fa4de0202a5563 |
Notes | istex:37D0D0D7C0D4047956AD70C124BF17F6418925C7 ark:/67375/WNG-9HBK80BF-3 ArticleID:STVR4370030205 ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 26222205 |
PQPubID | 23500 |
PageCount | 12 |
ParticipantIDs | proquest_miscellaneous_26222205 crossref_citationtrail_10_1002_stvr_4370030205 crossref_primary_10_1002_stvr_4370030205 wiley_primary_10_1002_stvr_4370030205_STVR4370030205 istex_primary_ark_67375_WNG_9HBK80BF_3 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 1900 |
PublicationDate | June 1993 |
PublicationDateYYYYMMDD | 1993-06-01 |
PublicationDate_xml | – month: 06 year: 1993 text: June 1993 |
PublicationDecade | 1990 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | Software testing, verification & reliability |
PublicationTitleAlternate | Softw. Test. Verif. Reliab |
PublicationYear | 1993 |
Publisher | John Wiley & Sons, Ltd |
Publisher_xml | – name: John Wiley & Sons, Ltd |
References | Allen, F. E. and Cocke, J. (1976) 'A program data flow analysis procedure,' Communications of the ACM, 19 (3), 137-147. Huang, J. C. (1979) 'Detection of data flow anomaly through program instrumentation,' IEEE Transactions on Software Engineering, 5 (3), 226-236. King, J. C. (1976) 'Symbolic execution and program testing,' Communications of the ACM, 19 (7), 385-394. Rapps, S. and Weyuker, E. J. (1985) 'Selecting software test data using data flow information,' IEEE Transactions on Software Engineering, 11 (4), 367-375. Ince, D. C. (1987) 'The automatic generation of the test data,' The Computer Journal, 30 (1), 63-69. Clarke, L. A. (1976) 'A system to generate test data and symbolically execute programs,' IEEE Transactions on Software Engineering, 2 (3), 215-222. Frankl, P. G. and Weyuker, E. J. (1988) 'An applicable family of data flow testing criteria,' IEEE Transactions on Software Engineering, 14 (10), 1483-1498. Girgis, M. R. (1992) 'An experimental evaluation of a symbolic execution system,' Software Engineering Journal, 7 (4), 285-290. Lindquist, T. E. and Jenkins, J. R. (1988) 'Test-case generation with IOGen,' IEEE Software, 5 (1), 72-79. Howden, W. E. (1975) 'Methodology for the generation of program test data,' IEEE Transactions on Computers, 24 (5), 554-559. Coward, P. D. (1988) 'Symbolic execution systems-a review,' Software Engineering Journal, 3 (6), 229-239. Howden, W. E. (1977) 'Symbolic testing and the DISSECT symbolic evaluation system,' IEEE Transactions on Software Engineering, 3 (4), 266-278. 1992; 7 1988; 3 1987; 30 1988; 14 1988; 5 1976; 2 1985b 1975; 24 1977; 3 1975 1985a 1979; 5 1985 1982 1985; 11 1976; 19 e_1_2_1_7_1 e_1_2_1_8_1 e_1_2_1_5_1 e_1_2_1_6_1 e_1_2_1_3_1 e_1_2_1_12_1 e_1_2_1_4_1 e_1_2_1_13_1 e_1_2_1_10_1 e_1_2_1_2_1 e_1_2_1_11_1 e_1_2_1_16_1 e_1_2_1_17_1 e_1_2_1_14_1 e_1_2_1_15_1 e_1_2_1_9_1 e_1_2_1_18_1 |
References_xml | – reference: Howden, W. E. (1977) 'Symbolic testing and the DISSECT symbolic evaluation system,' IEEE Transactions on Software Engineering, 3 (4), 266-278. – reference: Lindquist, T. E. and Jenkins, J. R. (1988) 'Test-case generation with IOGen,' IEEE Software, 5 (1), 72-79. – reference: Coward, P. D. (1988) 'Symbolic execution systems-a review,' Software Engineering Journal, 3 (6), 229-239. – reference: Howden, W. E. (1975) 'Methodology for the generation of program test data,' IEEE Transactions on Computers, 24 (5), 554-559. – reference: Clarke, L. A. (1976) 'A system to generate test data and symbolically execute programs,' IEEE Transactions on Software Engineering, 2 (3), 215-222. – reference: Ince, D. C. (1987) 'The automatic generation of the test data,' The Computer Journal, 30 (1), 63-69. – reference: Rapps, S. and Weyuker, E. J. (1985) 'Selecting software test data using data flow information,' IEEE Transactions on Software Engineering, 11 (4), 367-375. – reference: Huang, J. C. (1979) 'Detection of data flow anomaly through program instrumentation,' IEEE Transactions on Software Engineering, 5 (3), 226-236. – reference: Girgis, M. R. (1992) 'An experimental evaluation of a symbolic execution system,' Software Engineering Journal, 7 (4), 285-290. – reference: Allen, F. E. and Cocke, J. (1976) 'A program data flow analysis procedure,' Communications of the ACM, 19 (3), 137-147. – reference: King, J. C. (1976) 'Symbolic execution and program testing,' Communications of the ACM, 19 (7), 385-394. – reference: Frankl, P. G. and Weyuker, E. J. (1988) 'An applicable family of data flow testing criteria,' IEEE Transactions on Software Engineering, 14 (10), 1483-1498. – start-page: 234 year: 1975 end-page: 245 – volume: 2 start-page: 215 issue: 3 year: 1976 end-page: 222 article-title: A system to generate test data and symbolically execute programs publication-title: IEEE Transactions on Software Engineering – start-page: 313 year: 1985b end-page: 319 – year: 1985a – volume: 7 start-page: 285 issue: 4 year: 1992 end-page: 290 article-title: An experimental evaluation of a symbolic execution system publication-title: Software Engineering Journal – volume: 3 start-page: 266 issue: 4 year: 1977 end-page: 278 article-title: Symbolic testing and the DISSECT symbolic evaluation system publication-title: IEEE Transactions on Software Engineering – volume: 30 start-page: 63 issue: 1 year: 1987 end-page: 69 article-title: The automatic generation of the test data publication-title: The Computer Journal – volume: 11 start-page: 367 issue: 4 year: 1985 end-page: 375 article-title: Selecting software test data using data flow information publication-title: IEEE Transactions on Software Engineering – volume: 5 start-page: 226 issue: 3 year: 1979 end-page: 236 article-title: Detection of data flow anomaly through program instrumentation publication-title: IEEE Transactions on Software Engineering – volume: 5 start-page: 72 issue: 1 year: 1988 end-page: 79 article-title: Test‐case generation with IOGen publication-title: IEEE Software – volume: 14 start-page: 1483 issue: 10 year: 1988 end-page: 1498 article-title: An applicable family of data flow testing criteria publication-title: IEEE Transactions on Software Engineering – volume: 19 start-page: 385 issue: 7 year: 1976 end-page: 394 article-title: Symbolic execution and program testing publication-title: Communications of the ACM – volume: 19 start-page: 137 issue: 3 year: 1976 end-page: 147 article-title: A program data flow analysis procedure publication-title: Communications of the ACM – volume: 24 start-page: 554 issue: 5 year: 1975 end-page: 559 article-title: Methodology for the generation of program test data publication-title: IEEE Transactions on Computers – start-page: 272 year: 1982 end-page: 278 – volume: 3 start-page: 229 issue: 6 year: 1988 end-page: 239 article-title: Symbolic execution systems—a review publication-title: Software Engineering Journal – start-page: 259 year: 1985 end-page: 266 – ident: e_1_2_1_3_1 doi: 10.1145/390016.808445 – ident: e_1_2_1_11_1 doi: 10.1109/T-C.1975.224259 – ident: e_1_2_1_6_1 doi: 10.1109/32.6194 – ident: e_1_2_1_17_1 – ident: e_1_2_1_2_1 doi: 10.1145/360018.360025 – ident: e_1_2_1_4_1 doi: 10.1109/TSE.1976.233817 – ident: e_1_2_1_5_1 doi: 10.1049/sej.1988.0029 – ident: e_1_2_1_12_1 doi: 10.1109/TSE.1977.231144 – ident: e_1_2_1_8_1 – ident: e_1_2_1_15_1 doi: 10.1145/360248.360252 – ident: e_1_2_1_13_1 doi: 10.1109/TSE.1979.234184 – ident: e_1_2_1_14_1 doi: 10.1093/comjnl/30.1.63 – ident: e_1_2_1_7_1 doi: 10.1049/sej.1992.0029 – ident: e_1_2_1_9_1 – ident: e_1_2_1_10_1 – ident: e_1_2_1_18_1 doi: 10.1109/TSE.1985.232226 – ident: e_1_2_1_16_1 doi: 10.1109/52.1996 |
SSID | ssj0006969 |
Score | 1.4097426 |
Snippet | The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program... |
SourceID | proquest crossref wiley istex |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 101 |
SubjectTerms | Control flow criteria Data flow criteria Path selection Software testing Symbolic execution Test data generation |
Title | Using symbolic execution and data flow criteria to aid test data selection |
URI | https://api.istex.fr/ark:/67375/WNG-9HBK80BF-3/fulltext.pdf https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fstvr.4370030205 https://www.proquest.com/docview/26222205 |
Volume | 3 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZge-HCG1GePiCEVKUkjuO0x13YUi3dIrEt9GbZiQ2F0qI2ZYFfz0wcJ10eWuAStYnttPM545l45htCHgnGNctVL0BytYDzrB-oJLWBESrNODORMiXb51gMp_xolsyaYopldkmhu9n33-aV_A-qcA5wxSzZf0C2HhROwGfAF46AMBz_CmO337_59kkjuy-WT8q2hY8vxtjPjl2sTjugGJCRWaGdqeZ5B6zLwl3elFVwPDQffMauLU4xIAzbVSVPQDQYU9TMlrVZzB3FdxMOOl-_c4wFx6v3RlehiHmVYhc3kU_-1aDAGDdHUOG1ZLwzGdiOxouqnm7xjFxM9C962fG8boov6y6PU9QsLEyaJchvu49fycF0NJKTw9nkImmxNMWt99b-8-PRSb2-ir5wDIrVr_SETSF7-tMNztgaLXxsvp5xJHbdkdKemFwllytHgO47VK-RC2Z5nVzxRTZopXNvkKMSZOpBpjXIFECmiCJFkKkHmRYrCiBTBM9drkG-SaaDw8mzYVAVwAgyliZJEGnw9iINVnisTdhXYE3yPOVJZlUYapFbLXSYZ5ozq1MT5SJnVvHcwH9nCpnfbpG95WppbhNqQmUs9DA2stxwrVSkNXgHoqcsj2PeJl0vKplV7PBYpGQhHa81kyhb2ci2TZ7UHT47YpQ_N31cyr5up9YfMZ4wTeTb8QvZHx687IUHAxm3yUMPjgQth1tXamlW241kAuzYciheYnbeLeXJ5M3r5uudcwe-Sy41j8I9slest-Y-mJuFflDNvx9OdYB9 |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Using+symbolic+execution+and+data+flow+criteria+to+aid+test+data+selection&rft.jtitle=Software+testing%2C+verification+%26+reliability&rft.au=Girgis%2C+Moheb+R&rft.date=1993-06-01&rft.issn=0960-0833&rft.volume=3&rft.issue=2&rft.spage=101&rft.epage=112&rft_id=info:doi/10.1002%2Fstvr.4370030205&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0960-0833&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0960-0833&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0960-0833&client=summon |