Using symbolic execution and data flow criteria to aid test data selection

The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program paths according to a certain control flow criterion. This subset is called the ZOT‐subset, since it requires paths that traverse loops zero, one...

Full description

Saved in:
Bibliographic Details
Published inSoftware testing, verification & reliability Vol. 3; no. 2; pp. 101 - 112
Main Author Girgis, Moheb R.
Format Journal Article
LanguageEnglish
Published New York John Wiley & Sons, Ltd 01.06.1993
Subjects
Online AccessGet full text
ISSN0960-0833
1099-1689
DOI10.1002/stvr.4370030205

Cover

Loading…
Abstract The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program paths according to a certain control flow criterion. This subset is called the ZOT‐subset, since it requires paths that traverse loops zero, one and two times. Experience indicates that traversing this subset of program paths is enough to cover most control flow and data flow components of the program. The problem with the ZOT‐subset is that it might contain, for large programs, a large number of paths. The number of paths in this subset can be reduced by concentrating on executable paths that cover vital components of programs such as data flow components. This object is achieved by employing a data flow path selection criterion in the system. The system symbolically executes the paths of the ZOT‐subset, and creates a system of branch conditions for each one. The user determines infeasible paths by checking the consistency of each system of conditions. The system selects feasible paths from the ZOT‐subset that cover the data flow criterion. Solving the systems of conditions of the selected paths provides the user with test data to fulfil the given data flow criterion.
AbstractList The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program paths according to a certain control flow criterion. This subset is called the ZOT‐subset, since it requires paths that traverse loops zero, one and two times. Experience indicates that traversing this subset of program paths is enough to cover most control flow and data flow components of the program. The problem with the ZOT‐subset is that it might contain, for large programs, a large number of paths. The number of paths in this subset can be reduced by concentrating on executable paths that cover vital components of programs such as data flow components. This object is achieved by employing a data flow path selection criterion in the system. The system symbolically executes the paths of the ZOT‐subset, and creates a system of branch conditions for each one. The user determines infeasible paths by checking the consistency of each system of conditions. The system selects feasible paths from the ZOT‐subset that cover the data flow criterion. Solving the systems of conditions of the selected paths provides the user with test data to fulfil the given data flow criterion.
The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program path according to a certain control flow criterion. This subset is called ZOT-subset, since it requires paths that traverse loops zero, one and two times. Experience indicates that traversing this subset of program path is enough to cover most control flow and data flow components of the program. The problem with the ZOT-subset is that it might contain, large programs, a large number of paths. The number of paths in this subset can be reduced by concentrating on executable paths that cover vital components of the programs such as data flow components. This object is achieved by employing a data flow path selection criterion in the system. The system symbolically executes the paths of the ZOT-subset, and creates a system of branch conditions for each one. The user determines infeasible paths by checking the consistency of each system of conditions. The system selects feasible paths from the ZOT-subset that cover the data flow criterion. Solving the systems of conditions of the selected paths provides the user with test data to fulfill the given data flow criterion.
Author Girgis, Moheb R.
Author_xml – sequence: 1
  givenname: Moheb R.
  surname: Girgis
  fullname: Girgis, Moheb R.
  organization: Department of Computer Science, University of Bahrain, P.O. Box 32038, Bahrain
BookMark eNqF0DtPwzAUBWALgUQpzKye2EKv49ipxUQr3ggknqPlV5AhTcB2gf57UgWBYAAvHnw-696zgVabtnEIbRPYJQD5KKbXsFvQEoBCDmwFDQgIkRE-FqtoAIJDBmNK19FGjI8AwAUXA3R6G33zgONiptvaG-zenZkn3zZYNRZblRSu6vYNm-CTC17h1GLlLU4upv45utqZpdhEa5Wqo9v6vIfo9vDgZnqcnV8enUz3zzOTl4xlRIuyIBqIoNqBUJyKwpYFM5UC0NxWmmuwRhd5pUtHLLd5pQrruqVyxRinQ7TT__sc2pd5N4ec-WhcXavGtfMoc553B1gXZH3QhDbG4CppfFLLUVNQvpYE5LI5uWxOfjfXudEv9xz8TIXFH2KvF2--dov_4vL65u7qh8567WNy719ahSfJS1oyeX9xJMXx5GwMk0NJ6QdOO5RX
CitedBy_id crossref_primary_10_32604_iasc_2021_015708
crossref_primary_10_1145_3020266
crossref_primary_10_1109_ACCESS_2020_2966433
Cites_doi 10.1145/390016.808445
10.1109/T-C.1975.224259
10.1109/32.6194
10.1145/360018.360025
10.1109/TSE.1976.233817
10.1049/sej.1988.0029
10.1109/TSE.1977.231144
10.1145/360248.360252
10.1109/TSE.1979.234184
10.1093/comjnl/30.1.63
10.1049/sej.1992.0029
10.1109/TSE.1985.232226
10.1109/52.1996
ContentType Journal Article
Copyright Copyright © 1993 John Wiley & Sons, Ltd
Copyright_xml – notice: Copyright © 1993 John Wiley & Sons, Ltd
DBID BSCLL
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/stvr.4370030205
DatabaseName Istex
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef
Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1099-1689
EndPage 112
ExternalDocumentID 10_1002_stvr_4370030205
STVR4370030205
ark_67375_WNG_9HBK80BF_3
Genre article
GroupedDBID .3N
.4S
.DC
.GA
.Y3
05W
0R~
123
1L6
1OB
1OC
31~
33P
3SF
3WU
4.4
50Y
50Z
52M
52O
52T
52U
52W
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AANLZ
AAONW
AASGY
AAXRX
AAYOK
AAZKR
ABCUV
ABIJN
ABPVW
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACGFS
ACIWK
ACPOU
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
AEEZP
AEIGN
AEIMD
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFZJQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
AMBMR
AMYDB
ARCSS
ASPBG
ATUGU
AUFTA
AVWKF
AZBYB
AZFZN
AZVAB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BROTX
BRXPI
BSCLL
CS3
CWDTD
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
EDO
EJD
F00
F01
F04
F21
FEDTE
G-S
G.N
GNP
GODZA
H.T
H.X
HF~
HGLYW
HHY
HVGLF
HZ~
I-F
IX1
JPC
KQQ
LATKE
LAW
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LW6
LYRES
M61
MEWTI
MK4
MK~
ML~
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
NF~
NNB
O66
O9-
OIG
P2P
P2W
P2X
P4D
PALCI
PQQKQ
Q.N
QB0
QRW
R.K
RIWAO
RJQFR
ROL
RWI
RX1
SAMSI
SUPJJ
TUS
UB1
V2E
W8V
W99
WBKPD
WIB
WIH
WIK
WOHZO
WWW
WXSBR
WYISQ
WZISG
XPP
XV2
ZZTAW
~IA
~WT
AAHQN
AAMNL
AANHP
AAYCA
ACRPL
ACYXJ
ADNMO
AFWVQ
ALVPJ
AAYXX
ADMLS
AEYWJ
AGHNM
AGQPQ
AGYGG
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2755-1b9741b0193be09a6394d745cfa00b6dfb6b0dcb42fb7e1d6d2fa4de0202a5563
ISSN 0960-0833
IngestDate Fri Sep 05 03:40:32 EDT 2025
Tue Jul 01 03:23:20 EDT 2025
Thu Apr 24 23:08:43 EDT 2025
Wed Jan 22 16:52:39 EST 2025
Wed Oct 30 09:51:39 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c2755-1b9741b0193be09a6394d745cfa00b6dfb6b0dcb42fb7e1d6d2fa4de0202a5563
Notes istex:37D0D0D7C0D4047956AD70C124BF17F6418925C7
ark:/67375/WNG-9HBK80BF-3
ArticleID:STVR4370030205
ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
PQID 26222205
PQPubID 23500
PageCount 12
ParticipantIDs proquest_miscellaneous_26222205
crossref_citationtrail_10_1002_stvr_4370030205
crossref_primary_10_1002_stvr_4370030205
wiley_primary_10_1002_stvr_4370030205_STVR4370030205
istex_primary_ark_67375_WNG_9HBK80BF_3
ProviderPackageCode CITATION
AAYXX
PublicationCentury 1900
PublicationDate June 1993
PublicationDateYYYYMMDD 1993-06-01
PublicationDate_xml – month: 06
  year: 1993
  text: June 1993
PublicationDecade 1990
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Software testing, verification & reliability
PublicationTitleAlternate Softw. Test. Verif. Reliab
PublicationYear 1993
Publisher John Wiley & Sons, Ltd
Publisher_xml – name: John Wiley & Sons, Ltd
References Allen, F. E. and Cocke, J. (1976) 'A program data flow analysis procedure,' Communications of the ACM, 19 (3), 137-147.
Huang, J. C. (1979) 'Detection of data flow anomaly through program instrumentation,' IEEE Transactions on Software Engineering, 5 (3), 226-236.
King, J. C. (1976) 'Symbolic execution and program testing,' Communications of the ACM, 19 (7), 385-394.
Rapps, S. and Weyuker, E. J. (1985) 'Selecting software test data using data flow information,' IEEE Transactions on Software Engineering, 11 (4), 367-375.
Ince, D. C. (1987) 'The automatic generation of the test data,' The Computer Journal, 30 (1), 63-69.
Clarke, L. A. (1976) 'A system to generate test data and symbolically execute programs,' IEEE Transactions on Software Engineering, 2 (3), 215-222.
Frankl, P. G. and Weyuker, E. J. (1988) 'An applicable family of data flow testing criteria,' IEEE Transactions on Software Engineering, 14 (10), 1483-1498.
Girgis, M. R. (1992) 'An experimental evaluation of a symbolic execution system,' Software Engineering Journal, 7 (4), 285-290.
Lindquist, T. E. and Jenkins, J. R. (1988) 'Test-case generation with IOGen,' IEEE Software, 5 (1), 72-79.
Howden, W. E. (1975) 'Methodology for the generation of program test data,' IEEE Transactions on Computers, 24 (5), 554-559.
Coward, P. D. (1988) 'Symbolic execution systems-a review,' Software Engineering Journal, 3 (6), 229-239.
Howden, W. E. (1977) 'Symbolic testing and the DISSECT symbolic evaluation system,' IEEE Transactions on Software Engineering, 3 (4), 266-278.
1992; 7
1988; 3
1987; 30
1988; 14
1988; 5
1976; 2
1985b
1975; 24
1977; 3
1975
1985a
1979; 5
1985
1982
1985; 11
1976; 19
e_1_2_1_7_1
e_1_2_1_8_1
e_1_2_1_5_1
e_1_2_1_6_1
e_1_2_1_3_1
e_1_2_1_12_1
e_1_2_1_4_1
e_1_2_1_13_1
e_1_2_1_10_1
e_1_2_1_2_1
e_1_2_1_11_1
e_1_2_1_16_1
e_1_2_1_17_1
e_1_2_1_14_1
e_1_2_1_15_1
e_1_2_1_9_1
e_1_2_1_18_1
References_xml – reference: Howden, W. E. (1977) 'Symbolic testing and the DISSECT symbolic evaluation system,' IEEE Transactions on Software Engineering, 3 (4), 266-278.
– reference: Lindquist, T. E. and Jenkins, J. R. (1988) 'Test-case generation with IOGen,' IEEE Software, 5 (1), 72-79.
– reference: Coward, P. D. (1988) 'Symbolic execution systems-a review,' Software Engineering Journal, 3 (6), 229-239.
– reference: Howden, W. E. (1975) 'Methodology for the generation of program test data,' IEEE Transactions on Computers, 24 (5), 554-559.
– reference: Clarke, L. A. (1976) 'A system to generate test data and symbolically execute programs,' IEEE Transactions on Software Engineering, 2 (3), 215-222.
– reference: Ince, D. C. (1987) 'The automatic generation of the test data,' The Computer Journal, 30 (1), 63-69.
– reference: Rapps, S. and Weyuker, E. J. (1985) 'Selecting software test data using data flow information,' IEEE Transactions on Software Engineering, 11 (4), 367-375.
– reference: Huang, J. C. (1979) 'Detection of data flow anomaly through program instrumentation,' IEEE Transactions on Software Engineering, 5 (3), 226-236.
– reference: Girgis, M. R. (1992) 'An experimental evaluation of a symbolic execution system,' Software Engineering Journal, 7 (4), 285-290.
– reference: Allen, F. E. and Cocke, J. (1976) 'A program data flow analysis procedure,' Communications of the ACM, 19 (3), 137-147.
– reference: King, J. C. (1976) 'Symbolic execution and program testing,' Communications of the ACM, 19 (7), 385-394.
– reference: Frankl, P. G. and Weyuker, E. J. (1988) 'An applicable family of data flow testing criteria,' IEEE Transactions on Software Engineering, 14 (10), 1483-1498.
– start-page: 234
  year: 1975
  end-page: 245
– volume: 2
  start-page: 215
  issue: 3
  year: 1976
  end-page: 222
  article-title: A system to generate test data and symbolically execute programs
  publication-title: IEEE Transactions on Software Engineering
– start-page: 313
  year: 1985b
  end-page: 319
– year: 1985a
– volume: 7
  start-page: 285
  issue: 4
  year: 1992
  end-page: 290
  article-title: An experimental evaluation of a symbolic execution system
  publication-title: Software Engineering Journal
– volume: 3
  start-page: 266
  issue: 4
  year: 1977
  end-page: 278
  article-title: Symbolic testing and the DISSECT symbolic evaluation system
  publication-title: IEEE Transactions on Software Engineering
– volume: 30
  start-page: 63
  issue: 1
  year: 1987
  end-page: 69
  article-title: The automatic generation of the test data
  publication-title: The Computer Journal
– volume: 11
  start-page: 367
  issue: 4
  year: 1985
  end-page: 375
  article-title: Selecting software test data using data flow information
  publication-title: IEEE Transactions on Software Engineering
– volume: 5
  start-page: 226
  issue: 3
  year: 1979
  end-page: 236
  article-title: Detection of data flow anomaly through program instrumentation
  publication-title: IEEE Transactions on Software Engineering
– volume: 5
  start-page: 72
  issue: 1
  year: 1988
  end-page: 79
  article-title: Test‐case generation with IOGen
  publication-title: IEEE Software
– volume: 14
  start-page: 1483
  issue: 10
  year: 1988
  end-page: 1498
  article-title: An applicable family of data flow testing criteria
  publication-title: IEEE Transactions on Software Engineering
– volume: 19
  start-page: 385
  issue: 7
  year: 1976
  end-page: 394
  article-title: Symbolic execution and program testing
  publication-title: Communications of the ACM
– volume: 19
  start-page: 137
  issue: 3
  year: 1976
  end-page: 147
  article-title: A program data flow analysis procedure
  publication-title: Communications of the ACM
– volume: 24
  start-page: 554
  issue: 5
  year: 1975
  end-page: 559
  article-title: Methodology for the generation of program test data
  publication-title: IEEE Transactions on Computers
– start-page: 272
  year: 1982
  end-page: 278
– volume: 3
  start-page: 229
  issue: 6
  year: 1988
  end-page: 239
  article-title: Symbolic execution systems—a review
  publication-title: Software Engineering Journal
– start-page: 259
  year: 1985
  end-page: 266
– ident: e_1_2_1_3_1
  doi: 10.1145/390016.808445
– ident: e_1_2_1_11_1
  doi: 10.1109/T-C.1975.224259
– ident: e_1_2_1_6_1
  doi: 10.1109/32.6194
– ident: e_1_2_1_17_1
– ident: e_1_2_1_2_1
  doi: 10.1145/360018.360025
– ident: e_1_2_1_4_1
  doi: 10.1109/TSE.1976.233817
– ident: e_1_2_1_5_1
  doi: 10.1049/sej.1988.0029
– ident: e_1_2_1_12_1
  doi: 10.1109/TSE.1977.231144
– ident: e_1_2_1_8_1
– ident: e_1_2_1_15_1
  doi: 10.1145/360248.360252
– ident: e_1_2_1_13_1
  doi: 10.1109/TSE.1979.234184
– ident: e_1_2_1_14_1
  doi: 10.1093/comjnl/30.1.63
– ident: e_1_2_1_7_1
  doi: 10.1049/sej.1992.0029
– ident: e_1_2_1_9_1
– ident: e_1_2_1_10_1
– ident: e_1_2_1_18_1
  doi: 10.1109/TSE.1985.232226
– ident: e_1_2_1_16_1
  doi: 10.1109/52.1996
SSID ssj0006969
Score 1.4097426
Snippet The utilization is described of a data flow path selection criterion in a symbolic execution system. The system automatically generates a subset of program...
SourceID proquest
crossref
wiley
istex
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 101
SubjectTerms Control flow criteria
Data flow criteria
Path selection
Software testing
Symbolic execution
Test data generation
Title Using symbolic execution and data flow criteria to aid test data selection
URI https://api.istex.fr/ark:/67375/WNG-9HBK80BF-3/fulltext.pdf
https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fstvr.4370030205
https://www.proquest.com/docview/26222205
Volume 3
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZge-HCG1GePiCEVKUkjuO0x13YUi3dIrEt9GbZiQ2F0qI2ZYFfz0wcJ10eWuAStYnttPM545l45htCHgnGNctVL0BytYDzrB-oJLWBESrNODORMiXb51gMp_xolsyaYopldkmhu9n33-aV_A-qcA5wxSzZf0C2HhROwGfAF46AMBz_CmO337_59kkjuy-WT8q2hY8vxtjPjl2sTjugGJCRWaGdqeZ5B6zLwl3elFVwPDQffMauLU4xIAzbVSVPQDQYU9TMlrVZzB3FdxMOOl-_c4wFx6v3RlehiHmVYhc3kU_-1aDAGDdHUOG1ZLwzGdiOxouqnm7xjFxM9C962fG8boov6y6PU9QsLEyaJchvu49fycF0NJKTw9nkImmxNMWt99b-8-PRSb2-ir5wDIrVr_SETSF7-tMNztgaLXxsvp5xJHbdkdKemFwllytHgO47VK-RC2Z5nVzxRTZopXNvkKMSZOpBpjXIFECmiCJFkKkHmRYrCiBTBM9drkG-SaaDw8mzYVAVwAgyliZJEGnw9iINVnisTdhXYE3yPOVJZlUYapFbLXSYZ5ozq1MT5SJnVvHcwH9nCpnfbpG95WppbhNqQmUs9DA2stxwrVSkNXgHoqcsj2PeJl0vKplV7PBYpGQhHa81kyhb2ci2TZ7UHT47YpQ_N31cyr5up9YfMZ4wTeTb8QvZHx687IUHAxm3yUMPjgQth1tXamlW241kAuzYciheYnbeLeXJ5M3r5uudcwe-Sy41j8I9slest-Y-mJuFflDNvx9OdYB9
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Using+symbolic+execution+and+data+flow+criteria+to+aid+test+data+selection&rft.jtitle=Software+testing%2C+verification+%26+reliability&rft.au=Girgis%2C+Moheb+R&rft.date=1993-06-01&rft.issn=0960-0833&rft.volume=3&rft.issue=2&rft.spage=101&rft.epage=112&rft_id=info:doi/10.1002%2Fstvr.4370030205&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0960-0833&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0960-0833&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0960-0833&client=summon