MEDIC: A static analysis framework for equivalent mutant identification
Context: The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. In consequence of its undecidable nature, a complete automated solution is unattainable. To worsen the situation, the manual analysis of the generated mutants of a program under test is...
Saved in:
Published in | Information and software technology Vol. 68; pp. 1 - 17 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier B.V
01.12.2015
Elsevier Science Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Context: The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. In consequence of its undecidable nature, a complete automated solution is unattainable. To worsen the situation, the manual analysis of the generated mutants of a program under test is prohibitive due to their vast number and the complexity of determining their equivalence.
Objective: This paper focuses on the automated identification of equivalent and partially equivalent mutants, i.e. mutants that are equivalent to the original program for a specific subset of paths. To this end, the utilisation of a series of previously proposed data flow patterns is investigated. This study also examines the cross-language nature of these patterns and the killability of the detected partially equivalent mutants.
Method: A tool, named MEDIC (Mutants’ Equivalence DIsCovery), incorporating the aforementioned patterns was developed. Its efficiency and effectiveness were evaluated based on a set of manually analysed mutants from real-world programs, written in the Java programming language. Furthermore, MEDIC was employed to test subjects written in the JavaScript programming language.
Results: MEDIC managed to detect 56% of the examined equivalent mutants in 125 s, providing strong evidence regarding both its effectiveness and efficiency. Additionally, MEDIC was able to identify equivalent mutants in the JavaScript test subjects, lending colour to the cross-language nature of the implemented patterns. Finally, the identified partially equivalent mutant set consisted largely of killable mutants, 16% of which were stubborn ones.
Conclusion: It can be concluded that pattern-based equivalent mutant identification forms a viable approach for combating the equivalent mutant problem. MEDIC automatically detected a considerable number of the manually identified equivalent mutants and was successfully applied to test subjects in all examined programming languages. |
---|---|
AbstractList | The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. This paper focuses on the automated identification of equivalent and partially equivalent mutants, i.e. mutants that are equivalent to the original program for a specific subset of paths. To this end, the utilisation of a series of previously proposed data flow patterns is investigated. This study also examines the cross-language nature of these patterns and the killability of the detected partially equivalent mutants. A tool, named MEDIC (Mutants' Equivalence DIsCovery), incorporating the aforementioned patterns was developed. MEDIC was employed to test subjects written in the JavaScript programming language. MEDIC managed to detect 56% of the examined equivalent mutants in 125 s, providing strong evidence regarding both its effectiveness and efficiency. It can be concluded that pattern-based equivalent mutant identification forms a viable approach for combating the equivalent mutant problem. Context: The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. In consequence of its undecidable nature, a complete automated solution is unattainable. To worsen the situation, the manual analysis of the generated mutants of a program under test is prohibitive due to their vast number and the complexity of determining their equivalence. Objective: This paper focuses on the automated identification of equivalent and partially equivalent mutants, i.e. mutants that are equivalent to the original program for a specific subset of paths. To this end, the utilisation of a series of previously proposed data flow patterns is investigated. This study also examines the cross-language nature of these patterns and the killability of the detected partially equivalent mutants. Method: A tool, named MEDIC (Mutants’ Equivalence DIsCovery), incorporating the aforementioned patterns was developed. Its efficiency and effectiveness were evaluated based on a set of manually analysed mutants from real-world programs, written in the Java programming language. Furthermore, MEDIC was employed to test subjects written in the JavaScript programming language. Results: MEDIC managed to detect 56% of the examined equivalent mutants in 125 s, providing strong evidence regarding both its effectiveness and efficiency. Additionally, MEDIC was able to identify equivalent mutants in the JavaScript test subjects, lending colour to the cross-language nature of the implemented patterns. Finally, the identified partially equivalent mutant set consisted largely of killable mutants, 16% of which were stubborn ones. Conclusion: It can be concluded that pattern-based equivalent mutant identification forms a viable approach for combating the equivalent mutant problem. MEDIC automatically detected a considerable number of the manually identified equivalent mutants and was successfully applied to test subjects in all examined programming languages. |
Author | Kintis, Marinos Malevris, Nicos |
Author_xml | – sequence: 1 givenname: Marinos surname: Kintis fullname: Kintis, Marinos email: kintism@aueb.gr – sequence: 2 givenname: Nicos surname: Malevris fullname: Malevris, Nicos email: ngm@aueb.gr |
BookMark | eNqFkE9LAzEUxIMoWKvfwMOC511fNvsn8SCUqlWoeNFzSJMXSG03NkkVv72p9eRBT8OD-Q3z5oQcDn5AQs4pVBRod7ms3GCjt1UNtK2grwDEARlR3rOyg7o9JCMQLZQtb8QxOYlxCUB7YDAis8fbm4fpVTEpYlLJ6UINavUZXSxsUGv88OG1sD4UuNm6d7XCIRXrbVJZnMmHs05nzA-n5MiqVcSzHx2Tl7vb5-l9OX-aPUwn81Iz1qTSUFH3BpmgutWK265GtuC8Q2G5pV3fiboxYoE1b21nNeOi6XGBXcsMmAU3bEwu9rlvwW-2GJNc-m3InaOkfQ5vWqA8u672Lh18jAGt1C5990xBuZWkIHfDyaXcDyd3w0noZR4uw80v-C24tQqf_2HXewzz--8Og4za4aDRuIA6SePd3wFfHn-MIg |
CitedBy_id | crossref_primary_10_1016_j_jss_2018_03_010 crossref_primary_10_1109_TSE_2017_2684805 crossref_primary_10_1016_j_cosrev_2017_06_001 crossref_primary_10_1007_s10664_017_9582_5 crossref_primary_10_1145_3170492_3136053 crossref_primary_10_1016_j_infsof_2020_106426 crossref_primary_10_1016_j_infsof_2020_106317 crossref_primary_10_1109_TSE_2017_2732347 crossref_primary_10_1109_TSE_2017_2786286 crossref_primary_10_1002_smr_2238 crossref_primary_10_1016_j_jss_2019_07_100 crossref_primary_10_1142_S0218194022500322 |
Cites_doi | 10.1145/115372.115320 10.1109/TSE.1977.231145 10.1109/TSE.2011.93 10.1002/stvr.1473 10.1016/j.infsof.2009.04.016 10.1002/stvr.4370040303 10.1109/32.92910 10.1109/C-M.1978.218136 10.1109/TSE.2010.62 10.1002/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3 10.1109/TSE.2006.83 10.1016/S0164-1212(96)00154-9 10.1007/BF00625279 10.1002/stvr.308 10.1109/TSE.2013.44 10.1002/stvr.392 10.1016/j.infsof.2012.02.004 10.1002/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U 10.1002/stvr.4370040104 |
ContentType | Journal Article |
Copyright | 2015 Elsevier B.V. Copyright Elsevier Science Ltd. Dec 2015 |
Copyright_xml | – notice: 2015 Elsevier B.V. – notice: Copyright Elsevier Science Ltd. Dec 2015 |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.infsof.2015.07.009 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Business |
EISSN | 1873-6025 |
EndPage | 17 |
ExternalDocumentID | 3827794641 10_1016_j_infsof_2015_07_009 S0950584915001329 |
Genre | Feature |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 77K 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN AAYOK ABBOA ABFNM ABFRF ABJNI ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFO ACGFS ACGOD ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TWZ UHS UNMZH WH7 WUQ XFK ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SC 8FD EFKBS JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c334t-d1927de391c5ca8f62e3b886e9f8f1676924d9be285f6fc38947ebe653d0db8d3 |
IEDL.DBID | .~1 |
ISSN | 0950-5849 |
IngestDate | Mon Jul 14 08:21:17 EDT 2025 Tue Jul 01 02:22:01 EDT 2025 Thu Apr 24 23:03:41 EDT 2025 Fri Feb 23 02:23:54 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Equivalent mutant detection Stubborn mutant detection Data flow analysis Mutation testing Static analysis |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c334t-d1927de391c5ca8f62e3b886e9f8f1676924d9be285f6fc38947ebe653d0db8d3 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 |
PQID | 1719245018 |
PQPubID | 41979 |
PageCount | 17 |
ParticipantIDs | proquest_journals_1719245018 crossref_citationtrail_10_1016_j_infsof_2015_07_009 crossref_primary_10_1016_j_infsof_2015_07_009 elsevier_sciencedirect_doi_10_1016_j_infsof_2015_07_009 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | December 2015 2015-12-00 20151201 |
PublicationDateYYYYMMDD | 2015-12-01 |
PublicationDate_xml | – month: 12 year: 2015 text: December 2015 |
PublicationDecade | 2010 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Information and software technology |
PublicationYear | 2015 |
Publisher | Elsevier B.V Elsevier Science Ltd |
Publisher_xml | – name: Elsevier B.V – name: Elsevier Science Ltd |
References | Mathur, Wong (bib0008) 1994; 4 Baldwin, Sayward (bib0039) 1979 Cytron, Ferrante, Rosen, Wegman, Zadeck (bib0025) 1991; 13 Braun, Buchwald, Hack, Leia, Mallon, Zwinkau (bib0029) 2013; 7791 Schuler, Dallmeier, Zeller (bib0053) 2009 Harman, Hierons, Danicic (bib0018) 2001; 24 Fraser, Zeller (bib0015) 2012; 38 Schuler, Zeller (bib0020) 2013; 23 Offutt, Pan (bib0016) 1997; 7 Polo, Piattini, GarcÃa-RodrÃguez (bib0050) 2009; 19 Li, Praphamontripong, Offutt (bib0011) 2009 Nica, Wotawa (bib0045) 2012 Madeyski, Orzeszyna, Torkar, Jozala (bib0038) 2014; 40 Offutt, Pan, Tewary, Zhang (bib0009) 1996; 26 Ma, Offutt, Kwon (bib0012) 2005; 15 Papadakis, Malevris (bib0014) 2012; 54 Grün, Schuler, Zeller (bib0052) 2009 Budd, Angluin (bib0022) 1982; 18 Schuler, Zeller (bib0055) 2009 Kintis, Malevris (bib0021) 2014 . DeMillo, Lipton, Sayward (bib0002) 1978; 11 Zhang, Gligoric, Marinov, Khurshid (bib0036) 2013 Papadakis, Jia, Harman, LeTraon (bib0042) 2015 Hamlet (bib0001) 1977; SE-3 Papadakis, Malevris (bib0051) 2010 Kintis, Papadakis, Malevris (bib0019) 2012 Offutt, Pan (bib0044) 1996 Maldonado, Delamaro, Fabbri, Silva Simão, Sugeta, Vincenzi, Masiero (bib0027) 2001; 24 Offutt, Craft (bib0041) 1994; 4 Briggs, Cooper, Harvey, Simpson (bib0030) 1998; 28 Andrews, Briand, Labiche (bib0005) 2005 Neo Technology. Neo4j graph database, Last Accessed June 2015 IBM T.J. Watson Research Center. T. j. watson libraries for analysis, Last Accessed June 2015 DeMillo, Guindi, McCracken, Offutt, King (bib0040) 1988 java home page (version 3), Last Accessed June 2015 Offutt, Pan, Tewary, Zhang (bib0007) 1994 J. Offutt, N. Li, The Kintis, Malevris (bib0057) 2013; 1 Jia, Harman (bib0003) 2011; 37 Nica, Wotawa (bib0046) 2012 Nanavati, Wu, Harman, Jia, Krinke (bib0056) 2015 Frankl, Weiss, Hu (bib0010) 1997; 38 Schuler, Zeller (bib0054) 2010 Kintis, Papadakis, Malevris (bib0034) 2010 Andrews, Briand, Labiche, Namin (bib0006) 2006; 32 Rosen, Wegman, Zadeck (bib0024) 1988 Jia, Harman (bib0049) 2009; 51 Voas, McGraw (bib0047) 1997 Offutt, Untch (bib0004) 2001; 24 DeMillo, Offutt (bib0013) 1991; 17 Yao, Harman, Jia (bib0033) 2014 Offutt, Ma, Kwon (bib0048) 2006 Alpern, Wegman, Zadeck (bib0023) 1988 Kintis, Papadakis, Malevris (bib0037) 2014 Choi, Cytron, Ferrante (bib0028) 1991 Hierons, Harman, Danicic (bib0017) 1999; 9 Ammann, Delamaro, Offutt (bib0035) 2014 Oracle Technology Network. The Java Hotspot performance engine architecture, Last Accessed June 2015 Voas (10.1016/j.infsof.2015.07.009_bib0047) 1997 Schuler (10.1016/j.infsof.2015.07.009_bib0055) 2009 Briggs (10.1016/j.infsof.2015.07.009_bib0030) 1998; 28 Braun (10.1016/j.infsof.2015.07.009_bib0029) 2013; 7791 Kintis (10.1016/j.infsof.2015.07.009_bib0037) 2014 Schuler (10.1016/j.infsof.2015.07.009_bib0020) 2013; 23 Offutt (10.1016/j.infsof.2015.07.009_bib0041) 1994; 4 Andrews (10.1016/j.infsof.2015.07.009_bib0006) 2006; 32 Kintis (10.1016/j.infsof.2015.07.009_bib0034) 2010 Andrews (10.1016/j.infsof.2015.07.009_bib0005) 2005 10.1016/j.infsof.2015.07.009_bib0026 Nanavati (10.1016/j.infsof.2015.07.009_bib0056) 2015 Nica (10.1016/j.infsof.2015.07.009_bib0046) 2012 Offutt (10.1016/j.infsof.2015.07.009_bib0009) 1996; 26 Hierons (10.1016/j.infsof.2015.07.009_bib0017) 1999; 9 Jia (10.1016/j.infsof.2015.07.009_bib0003) 2011; 37 Kintis (10.1016/j.infsof.2015.07.009_bib0021) 2014 DeMillo (10.1016/j.infsof.2015.07.009_bib0002) 1978; 11 Offutt (10.1016/j.infsof.2015.07.009_bib0048) 2006 Baldwin (10.1016/j.infsof.2015.07.009_bib0039) 1979 Grün (10.1016/j.infsof.2015.07.009_bib0052) 2009 10.1016/j.infsof.2015.07.009_bib0032 DeMillo (10.1016/j.infsof.2015.07.009_bib0040) 1988 10.1016/j.infsof.2015.07.009_bib0031 Jia (10.1016/j.infsof.2015.07.009_sbref0045) 2009; 51 Hamlet (10.1016/j.infsof.2015.07.009_bib0001) 1977; SE-3 Kintis (10.1016/j.infsof.2015.07.009_bib0057) 2013; 1 Ma (10.1016/j.infsof.2015.07.009_bib0012) 2005; 15 Papadakis (10.1016/j.infsof.2015.07.009_bib0014) 2012; 54 Papadakis (10.1016/j.infsof.2015.07.009_sbref0039) 2015 Frankl (10.1016/j.infsof.2015.07.009_bib0010) 1997; 38 DeMillo (10.1016/j.infsof.2015.07.009_bib0013) 1991; 17 Polo (10.1016/j.infsof.2015.07.009_bib0050) 2009; 19 Papadakis (10.1016/j.infsof.2015.07.009_bib0051) 2010 Zhang (10.1016/j.infsof.2015.07.009_bib0036) 2013 Schuler (10.1016/j.infsof.2015.07.009_bib0054) 2010 Cytron (10.1016/j.infsof.2015.07.009_bib0025) 1991; 13 Yao (10.1016/j.infsof.2015.07.009_bib0033) 2014 Offutt (10.1016/j.infsof.2015.07.009_bib0016) 1997; 7 Budd (10.1016/j.infsof.2015.07.009_bib0022) 1982; 18 10.1016/j.infsof.2015.07.009_bib0043 Schuler (10.1016/j.infsof.2015.07.009_bib0053) 2009 Choi (10.1016/j.infsof.2015.07.009_bib0028) 1991 Li (10.1016/j.infsof.2015.07.009_bib0011) 2009 Madeyski (10.1016/j.infsof.2015.07.009_bib0038) 2014; 40 Kintis (10.1016/j.infsof.2015.07.009_bib0019) 2012 Nica (10.1016/j.infsof.2015.07.009_bib0045) 2012 Fraser (10.1016/j.infsof.2015.07.009_bib0015) 2012; 38 Rosen (10.1016/j.infsof.2015.07.009_bib0024) 1988 Ammann (10.1016/j.infsof.2015.07.009_bib0035) 2014 Maldonado (10.1016/j.infsof.2015.07.009_bib0027) 2001; 24 Alpern (10.1016/j.infsof.2015.07.009_bib0023) 1988 Offutt (10.1016/j.infsof.2015.07.009_bib0044) 1996 Harman (10.1016/j.infsof.2015.07.009_bib0018) 2001; 24 Mathur (10.1016/j.infsof.2015.07.009_bib0008) 1994; 4 Offutt (10.1016/j.infsof.2015.07.009_bib0004) 2001; 24 Offutt (10.1016/j.infsof.2015.07.009_bib0007) 1994 |
References_xml | – reference: IBM T.J. Watson Research Center. T. j. watson libraries for analysis, Last Accessed June 2015 – start-page: 701 year: 2012 end-page: 710 ident: bib0019 article-title: Isolating first order equivalent mutants via second order mutation publication-title: Proceedings of the IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST) – reference: java home page (version 3), Last Accessed June 2015 – start-page: 142 year: 1988 end-page: 151 ident: bib0040 article-title: An extended overview of the mothra software testing environment publication-title: Proceedings of the Second Workshop on Software Testing, Verification, and Analysis – start-page: 1 year: 2012 end-page: 8 ident: bib0045 article-title: Using constraints for equivalent mutant detection publication-title: Proceedings of the Second Workshop on Formal Methods in the Development of Software, 2012. WS-FMDS – volume: 37 start-page: 649 year: 2011 end-page: 678 ident: bib0003 article-title: An analysis and survey of the development of mutation testing publication-title: IEEE Trans. Softw. Eng. – start-page: 55 year: 1991 end-page: 66 ident: bib0028 article-title: Automatic construction of sparse data flow evaluation graphs publication-title: Proceedings of the 18th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages – reference: J. Offutt, N. Li, The – start-page: 192 year: 2009 end-page: 199 ident: bib0052 article-title: The impact of equivalent mutants publication-title: Proceedings of the International Conference on Proceedings of the Software Testing, Verification and Validation Workshops, 2009. ICSTW ’09. – start-page: 220 year: 2009 end-page: 229 ident: bib0011 article-title: An experimental comparison of four unit test criteria: mutation, edge-pair, all-uses and prime path coverage publication-title: Proceedings of the International Conference on Software Testing, Verification and Validation Workshops, 2009. ICSTW ’09. – volume: 23 start-page: 353 year: 2013 end-page: 374 ident: bib0020 article-title: Covering and uncovering equivalent mutants publication-title: Softw. Test., Verification Reliability – volume: 13 start-page: 451 year: 1991 end-page: 490 ident: bib0025 article-title: Efficiently computing static single assignment form and the control dependence graph publication-title: ACM Trans. Program. Lang. Syst. – volume: 15 start-page: 97 year: 2005 end-page: 133 ident: bib0012 article-title: Mujava: an automated class mutation system publication-title: Softw. Test. Verification Reliability – year: 1979 ident: bib0039 article-title: Heuristics for Determining Equivalence of Program Mutations. publication-title: Technical Report 276 – year: 2015 ident: bib0042 article-title: Trivial compiler equivalence: a large scale empirical study of a simple, fast and effective equivalent mutant detection technique publication-title: Proceedings of the 2015 International Conference on Software Engineering – volume: 54 start-page: 915 year: 2012 end-page: 932 ident: bib0014 article-title: Mutation based test case generation via a path selection strategy publication-title: Informat. Softw. Technol. – volume: 7 start-page: 165 year: 1997 end-page: 192 ident: bib0016 article-title: Automatically detecting equivalent mutants and infeasible paths publication-title: Softw. Test., Verification Reliability – start-page: 196 year: 2014 end-page: 205 ident: bib0021 article-title: Using data flow patterns for equivalent mutant detection publication-title: Proceedings of the IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops (ICSTW) – start-page: 45 year: 2010 end-page: 54 ident: bib0054 article-title: (Un-)Covering equivalent mutants publication-title: Proceedings of the Third International Conference on Software Testing, Verification and Validation (ICST), 2010 – reference: Neo Technology. Neo4j graph database, Last Accessed June 2015 – volume: 24 start-page: 5 year: 2001 end-page: 13 ident: bib0018 article-title: The relationship between program dependence and mutation analysis publication-title: Mutation Testing for the New Century – start-page: 1 year: 1988 end-page: 11 ident: bib0023 article-title: Detecting equality of variables in programs publication-title: Proceedings of the 15th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages – volume: 40 start-page: 23 year: 2014 end-page: 42 ident: bib0038 article-title: Overcoming the equivalent mutant problem: a systematic literature review and a comparative experiment of second order mutation publication-title: IEEE Trans. Software Eng., – volume: 32 start-page: 608 year: 2006 end-page: 624 ident: bib0006 article-title: Using mutation analysis for assessing and comparing testing coverage criteria publication-title: IEEE Trans. Software Eng. – volume: 4 start-page: 131 year: 1994 end-page: 154 ident: bib0041 article-title: Using compiler optimization techniques to detect equivalent mutants publication-title: Softw.Test. Verification Reliability – start-page: 1 year: 2015 end-page: 10 ident: bib0056 article-title: Mutation testing of memory-related operators publication-title: Proceedings of the IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2015 – volume: 38 start-page: 278 year: 2012 end-page: 292 ident: bib0015 article-title: Mutation-driven generation of unit tests and oracles publication-title: IEEE Trans. Softw. Eng. – start-page: 224 year: 1996 end-page: 236 ident: bib0044 article-title: Detecting equivalent mutants and the feasible path problem publication-title: Proceedings of the Eleventh Annual Conference on Computer Assurance, 1996. COMPASS ’96, Systems Integrity. Software Safety. Process Security. – reference: Oracle Technology Network. The Java Hotspot performance engine architecture, Last Accessed June 2015 – volume: 38 start-page: 235 year: 1997 end-page: 253 ident: bib0010 article-title: All-uses vs mutation testing: an experimental comparison of effectiveness publication-title: J. Syst. Softw. – volume: 4 start-page: 9 year: 1994 end-page: 31 ident: bib0008 article-title: An empirical comparison of data flow and mutation-based test adequacy criteria publication-title: Softw. Test., Verification Reliability – start-page: 297 year: 2009 end-page: 298 ident: bib0055 article-title: Javalanche: efficient mutation testing for java publication-title: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering – volume: 17 start-page: 900 year: 1991 end-page: 910 ident: bib0013 article-title: Constraint-based automatic test data generation publication-title: IEEE Trans. Softw. Eng. – year: 1997 ident: bib0047 publication-title: Software Fault Injection: Inoculating Programs Against Errors – volume: 28 start-page: 859 year: 1998 end-page: 881 ident: bib0030 article-title: Practical improvements to the construction and destruction of static single assignment form publication-title: Software: Practice and Experience – start-page: 919 year: 2014 end-page: 930 ident: bib0033 article-title: A study of equivalent and stubborn mutation operators using human analysis of equivalence publication-title: Proceedings of the 36th International Conference on Software Engineering – volume: SE-3 start-page: 279 year: 1977 end-page: 290 ident: bib0001 article-title: Testing programs with the aid of a compiler publication-title: IEEE Trans. Softw. Eng. – volume: 1 start-page: 180 year: 2013 end-page: 188 ident: bib0057 article-title: Identifying more equivalent mutants via code similarity publication-title: Proceedings of the 20th Asia-Pacific Software Engineering Conference (APSEC) – start-page: 57 year: 2012 end-page: 62 ident: bib0046 article-title: EqMutDetect – A tool for equivalent mutant detection in embedded systems publication-title: Proceedings of the Tenth Workshop on Intelligent Solutions in Embedded Systems, 2012. WISES – volume: 9 start-page: 233 year: 1999 end-page: 262 ident: bib0017 article-title: Using program slicing to assist in the detection of equivalent mutants publication-title: Softw. Test., Verification. Reliability – start-page: 92 year: 2013 end-page: 102 ident: bib0036 article-title: Operator-based and random mutant selection: Better together publication-title: Proceedings of the IEEE/ACM 28th International Conference on Automated Software Engineering (ASE) – volume: 18 start-page: 31 year: 1982 end-page: 45 ident: bib0022 article-title: Two notions of correctness and their relation to testing publication-title: Acta Inform. – start-page: 12 year: 1988 end-page: 27 ident: bib0024 article-title: Global value numbers and redundant computations publication-title: Proceedings of the 15th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages – start-page: 90 year: 2010 end-page: 99 ident: bib0051 article-title: An empirical evaluation of the first and second order mutation testing strategies publication-title: Proceedings of the Third International Conference on Software Testing, Verification, and Validation Workshops (ICSTW), 2010 – volume: 24 start-page: 113 year: 2001 end-page: 116 ident: bib0027 article-title: Proteum: a family of tools to support specification and program testing based on mutation publication-title: Mutation Testing for the New Century – start-page: 300 year: 2010 end-page: 309 ident: bib0034 article-title: Evaluating mutation testing alternatives: A collateral experiment publication-title: Proceedings of the 17th Asia Pacific Software Engineering Conference (APSEC) – start-page: 402 year: 2005 end-page: 411 ident: bib0005 article-title: Is mutation an appropriate tool for testing experiments? publication-title: Proceedings of the 27th International Conference on Software Engineering – year: 1994 ident: bib0007 article-title: Experiments with data flow and mutation testing. publication-title: Technical Report ISSE-TR-94-105 – volume: 51 start-page: 1379 year: 2009 end-page: 1393 ident: bib0049 article-title: Higher order mutation testing publication-title: Informat. Softw. Technol. – volume: 11 start-page: 34 year: 1978 end-page: 41 ident: bib0002 article-title: Hints on test data selection: help for the practicing programmer publication-title: Computer – start-page: 21 year: 2014 end-page: 30 ident: bib0035 article-title: Establishing theoretical minimal sets of mutants publication-title: Proceedings of the 2014 IEEE International Conference on Software Testing, Verification, and Validation – reference: . – volume: 19 start-page: 111 year: 2009 end-page: 131 ident: bib0050 article-title: Decreasing the cost of mutation testing with second-order mutants publication-title: Softw. Test., Verification Reliability – start-page: 69 year: 2009 end-page: 80 ident: bib0053 article-title: Efficient mutation testing by checking invariant violations publication-title: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis – year: 2014 ident: bib0037 article-title: Employing second-order mutation for isolating first-order equivalent mutants publication-title: Softw. Test., Verification Reliability – volume: 26 start-page: 165 year: 1996 end-page: 176 ident: bib0009 article-title: An experimental evaluation of data flow and mutation testing publication-title: Softw.: Pract. Experience – volume: 24 start-page: 34 year: 2001 end-page: 44 ident: bib0004 article-title: Mutation 2000: uniting the orthogonal publication-title: Mutation Testing for the New Century – start-page: 78 year: 2006 end-page: 84 ident: bib0048 article-title: The class-level mutants of mujava publication-title: Proceedings of the 2006 International Workshop on Automation of Software Test – volume: 7791 start-page: 102 year: 2013 end-page: 122 ident: bib0029 article-title: Simple and efficient construction of static single assignment form publication-title: Compiler Construction – volume: 13 start-page: 451 issue: 4 year: 1991 ident: 10.1016/j.infsof.2015.07.009_bib0025 article-title: Efficiently computing static single assignment form and the control dependence graph publication-title: ACM Trans. Program. Lang. Syst. doi: 10.1145/115372.115320 – volume: 1 start-page: 180 year: 2013 ident: 10.1016/j.infsof.2015.07.009_bib0057 article-title: Identifying more equivalent mutants via code similarity – start-page: 90 year: 2010 ident: 10.1016/j.infsof.2015.07.009_bib0051 article-title: An empirical evaluation of the first and second order mutation testing strategies – start-page: 1 year: 2012 ident: 10.1016/j.infsof.2015.07.009_bib0045 article-title: Using constraints for equivalent mutant detection – year: 1997 ident: 10.1016/j.infsof.2015.07.009_bib0047 – start-page: 1 year: 1988 ident: 10.1016/j.infsof.2015.07.009_bib0023 article-title: Detecting equality of variables in programs – volume: SE-3 start-page: 279 issue: 4 year: 1977 ident: 10.1016/j.infsof.2015.07.009_bib0001 article-title: Testing programs with the aid of a compiler publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.1977.231145 – start-page: 55 year: 1991 ident: 10.1016/j.infsof.2015.07.009_bib0028 article-title: Automatic construction of sparse data flow evaluation graphs – ident: 10.1016/j.infsof.2015.07.009_bib0032 – volume: 38 start-page: 278 issue: 2 year: 2012 ident: 10.1016/j.infsof.2015.07.009_bib0015 article-title: Mutation-driven generation of unit tests and oracles publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.2011.93 – volume: 23 start-page: 353 issue: 5 year: 2013 ident: 10.1016/j.infsof.2015.07.009_bib0020 article-title: Covering and uncovering equivalent mutants publication-title: Softw. Test., Verification Reliability doi: 10.1002/stvr.1473 – volume: 28 start-page: 859 issue: 8 year: 1998 ident: 10.1016/j.infsof.2015.07.009_bib0030 article-title: Practical improvements to the construction and destruction of static single assignment form publication-title: Software: Practice and Experience – volume: 51 start-page: 1379 issue: 10 year: 2009 ident: 10.1016/j.infsof.2015.07.009_sbref0045 article-title: Higher order mutation testing publication-title: Informat. Softw. Technol. doi: 10.1016/j.infsof.2009.04.016 – ident: 10.1016/j.infsof.2015.07.009_bib0026 – volume: 4 start-page: 131 issue: 3 year: 1994 ident: 10.1016/j.infsof.2015.07.009_bib0041 article-title: Using compiler optimization techniques to detect equivalent mutants publication-title: Softw.Test. Verification Reliability doi: 10.1002/stvr.4370040303 – volume: 26 start-page: 165 issue: 2 year: 1996 ident: 10.1016/j.infsof.2015.07.009_bib0009 article-title: An experimental evaluation of data flow and mutation testing publication-title: Softw.: Pract. Experience – volume: 17 start-page: 900 issue: 9 year: 1991 ident: 10.1016/j.infsof.2015.07.009_bib0013 article-title: Constraint-based automatic test data generation publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/32.92910 – ident: 10.1016/j.infsof.2015.07.009_bib0043 – start-page: 1 year: 2015 ident: 10.1016/j.infsof.2015.07.009_bib0056 article-title: Mutation testing of memory-related operators – volume: 11 start-page: 34 issue: 4 year: 1978 ident: 10.1016/j.infsof.2015.07.009_bib0002 article-title: Hints on test data selection: help for the practicing programmer publication-title: Computer doi: 10.1109/C-M.1978.218136 – volume: 24 start-page: 34 year: 2001 ident: 10.1016/j.infsof.2015.07.009_bib0004 article-title: Mutation 2000: uniting the orthogonal – start-page: 297 year: 2009 ident: 10.1016/j.infsof.2015.07.009_bib0055 article-title: Javalanche: efficient mutation testing for java – volume: 37 start-page: 649 issue: 5 year: 2011 ident: 10.1016/j.infsof.2015.07.009_bib0003 article-title: An analysis and survey of the development of mutation testing publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.2010.62 – volume: 9 start-page: 233 issue: 4 year: 1999 ident: 10.1016/j.infsof.2015.07.009_bib0017 article-title: Using program slicing to assist in the detection of equivalent mutants publication-title: Softw. Test., Verification. Reliability doi: 10.1002/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3 – volume: 32 start-page: 608 issue: 8 year: 2006 ident: 10.1016/j.infsof.2015.07.009_bib0006 article-title: Using mutation analysis for assessing and comparing testing coverage criteria publication-title: IEEE Trans. Software Eng. doi: 10.1109/TSE.2006.83 – year: 2014 ident: 10.1016/j.infsof.2015.07.009_bib0037 article-title: Employing second-order mutation for isolating first-order equivalent mutants publication-title: Softw. Test., Verification Reliability – volume: 38 start-page: 235 issue: 3 year: 1997 ident: 10.1016/j.infsof.2015.07.009_bib0010 article-title: All-uses vs mutation testing: an experimental comparison of effectiveness publication-title: J. Syst. Softw. doi: 10.1016/S0164-1212(96)00154-9 – start-page: 21 year: 2014 ident: 10.1016/j.infsof.2015.07.009_bib0035 article-title: Establishing theoretical minimal sets of mutants – start-page: 69 year: 2009 ident: 10.1016/j.infsof.2015.07.009_bib0053 article-title: Efficient mutation testing by checking invariant violations – volume: 24 start-page: 113 year: 2001 ident: 10.1016/j.infsof.2015.07.009_bib0027 article-title: Proteum: a family of tools to support specification and program testing based on mutation – volume: 18 start-page: 31 issue: 1 year: 1982 ident: 10.1016/j.infsof.2015.07.009_bib0022 article-title: Two notions of correctness and their relation to testing publication-title: Acta Inform. doi: 10.1007/BF00625279 – volume: 15 start-page: 97 issue: 2 year: 2005 ident: 10.1016/j.infsof.2015.07.009_bib0012 article-title: Mujava: an automated class mutation system publication-title: Softw. Test. Verification Reliability doi: 10.1002/stvr.308 – start-page: 300 year: 2010 ident: 10.1016/j.infsof.2015.07.009_bib0034 article-title: Evaluating mutation testing alternatives: A collateral experiment – volume: 7791 start-page: 102 year: 2013 ident: 10.1016/j.infsof.2015.07.009_bib0029 article-title: Simple and efficient construction of static single assignment form – start-page: 142 year: 1988 ident: 10.1016/j.infsof.2015.07.009_bib0040 article-title: An extended overview of the mothra software testing environment – start-page: 196 year: 2014 ident: 10.1016/j.infsof.2015.07.009_bib0021 article-title: Using data flow patterns for equivalent mutant detection – start-page: 192 year: 2009 ident: 10.1016/j.infsof.2015.07.009_bib0052 article-title: The impact of equivalent mutants – year: 1994 ident: 10.1016/j.infsof.2015.07.009_bib0007 article-title: Experiments with data flow and mutation testing. – start-page: 224 year: 1996 ident: 10.1016/j.infsof.2015.07.009_bib0044 article-title: Detecting equivalent mutants and the feasible path problem – volume: 40 start-page: 23 issue: 1 year: 2014 ident: 10.1016/j.infsof.2015.07.009_bib0038 article-title: Overcoming the equivalent mutant problem: a systematic literature review and a comparative experiment of second order mutation publication-title: IEEE Trans. Software Eng., doi: 10.1109/TSE.2013.44 – start-page: 12 year: 1988 ident: 10.1016/j.infsof.2015.07.009_bib0024 article-title: Global value numbers and redundant computations – start-page: 402 year: 2005 ident: 10.1016/j.infsof.2015.07.009_bib0005 article-title: Is mutation an appropriate tool for testing experiments? – start-page: 919 year: 2014 ident: 10.1016/j.infsof.2015.07.009_bib0033 article-title: A study of equivalent and stubborn mutation operators using human analysis of equivalence – year: 1979 ident: 10.1016/j.infsof.2015.07.009_bib0039 article-title: Heuristics for Determining Equivalence of Program Mutations. – start-page: 78 year: 2006 ident: 10.1016/j.infsof.2015.07.009_bib0048 article-title: The class-level mutants of mujava – volume: 19 start-page: 111 issue: 2 year: 2009 ident: 10.1016/j.infsof.2015.07.009_bib0050 article-title: Decreasing the cost of mutation testing with second-order mutants publication-title: Softw. Test., Verification Reliability doi: 10.1002/stvr.392 – start-page: 701 year: 2012 ident: 10.1016/j.infsof.2015.07.009_bib0019 article-title: Isolating first order equivalent mutants via second order mutation – volume: 54 start-page: 915 issue: 9 year: 2012 ident: 10.1016/j.infsof.2015.07.009_bib0014 article-title: Mutation based test case generation via a path selection strategy publication-title: Informat. Softw. Technol. doi: 10.1016/j.infsof.2012.02.004 – volume: 24 start-page: 5 year: 2001 ident: 10.1016/j.infsof.2015.07.009_bib0018 article-title: The relationship between program dependence and mutation analysis – start-page: 220 year: 2009 ident: 10.1016/j.infsof.2015.07.009_bib0011 article-title: An experimental comparison of four unit test criteria: mutation, edge-pair, all-uses and prime path coverage – volume: 7 start-page: 165 issue: 3 year: 1997 ident: 10.1016/j.infsof.2015.07.009_bib0016 article-title: Automatically detecting equivalent mutants and infeasible paths publication-title: Softw. Test., Verification Reliability doi: 10.1002/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U – start-page: 57 year: 2012 ident: 10.1016/j.infsof.2015.07.009_bib0046 article-title: EqMutDetect – A tool for equivalent mutant detection in embedded systems – start-page: 45 year: 2010 ident: 10.1016/j.infsof.2015.07.009_bib0054 article-title: (Un-)Covering equivalent mutants – year: 2015 ident: 10.1016/j.infsof.2015.07.009_sbref0039 article-title: Trivial compiler equivalence: a large scale empirical study of a simple, fast and effective equivalent mutant detection technique – ident: 10.1016/j.infsof.2015.07.009_bib0031 – start-page: 92 year: 2013 ident: 10.1016/j.infsof.2015.07.009_bib0036 article-title: Operator-based and random mutant selection: Better together – volume: 4 start-page: 9 issue: 1 year: 1994 ident: 10.1016/j.infsof.2015.07.009_bib0008 article-title: An empirical comparison of data flow and mutation-based test adequacy criteria publication-title: Softw. Test., Verification Reliability doi: 10.1002/stvr.4370040104 |
SSID | ssj0017030 |
Score | 2.2579012 |
Snippet | Context: The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. In consequence of its undecidable nature, a... The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. This paper focuses on the automated identification of... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Automation Data analysis Data flow analysis Equivalent mutant detection Genetic testing Mutation Mutation testing Programming languages Static analysis Stubborn mutant detection Studies |
Title | MEDIC: A static analysis framework for equivalent mutant identification |
URI | https://dx.doi.org/10.1016/j.infsof.2015.07.009 https://www.proquest.com/docview/1719245018 |
Volume | 68 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NSwMxEA2lgngRP7FaSw5e13a_kqy3UqxVsRct9BZ2NwmsaFtte_W3O5NNCopQ8LjLZllmZmfekDcvhFwpjptL2KmaKIUGJdGBEEYFjIdFwXgcKY2N4tOYjSbJwzSdNsjAz8IgrdLl_jqn22zt7nSdNbuLquo-AzjoQfnMANLghgEO8SUJxyi__trQPEKM6Fpvrxfg0358znK8wInLuRXyTK2EJ9IS_y5PvxK1rT7DA7LvYCPt1192SBp6dkR2PWv9mNxZmcYb2qc4IVSVNHdiI9R49hUFeEr1x7qC2IJKQ9_XeIAwrZTjC1kXnZDJ8PZlMArcGQlBGcfJKlCA0LjScRaWaZkLwyIdF0IwnRlhQuSvRonKCh2J1DBTAjxJOPiNpbHqqUKo-JQ0Z_OZPiPUhBEXoSkAdBjo-lQGnR-4LMtzljPGeYvE3jSydALieI7Fm_RMsVdZG1SiQWUPd7azFgk2qxa1gMaW57m3uvwRCBJy_JaVbe8k6X7EpQw5dpioWnj-7xdfkD28qkksbdJcfa71JUCRVdGxsdYhO_37x9H4G6-p3Kk |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB60gnoRn1itugevoc1rd-OtFDVq24st9LYk2V2IaOuj_f_OJBtBEQSvSTaEmcnMN8y33wJcakHDJepUbRBjgxIZT0qrPS78POciDLShRnE05uk0up_FszUYNHthiFbpcn-d06ts7a50nTW7r2XZfURw0MPymSCkoYFBsg4bpE4Vt2Cjf_eQjr-GCRTUteRez6MFzQ66iuaFfvxYVFqecaXiSczE3yvUj1xdFaCbXdhxyJH164_bgzUz34fNhrh-ALeVUuMV6zPaJFQWLHN6I8w2BCyGCJWZt1WJ4YXFhr2s6AxhVmpHGaq8dAjTm-vJIPXcMQleEYbR0tMI0oQ2YeIXcZFJywMT5lJyk1hpfaKwBpFOchPI2HJbIEKJBLqOx6Hu6Vzq8Aha88XcHAOzfiCkb3PEHRYbP51g84deS7KMZ5wL0YawMY0qnIY4HWXxrBqy2JOqDarIoKpHw-2kDd7XqtdaQ-OP50VjdfUtFhSm-T9WdhonKfcvfihfUJNJwoUn_37xBWylk9FQDe_GD6ewTXdqTksHWsv3lTlDZLLMz13kfQJLxt9a |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MEDIC%3A+A+static+analysis+framework+for+equivalent+mutant+identification&rft.jtitle=Information+and+software+technology&rft.au=Kintis%2C+Marinos&rft.au=Malevris%2C+Nicos&rft.date=2015-12-01&rft.issn=0950-5849&rft.volume=68&rft.spage=1&rft.epage=17&rft_id=info:doi/10.1016%2Fj.infsof.2015.07.009&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_infsof_2015_07_009 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0950-5849&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0950-5849&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0950-5849&client=summon |