MEDIC: A static analysis framework for equivalent mutant identification

Context: The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. In consequence of its undecidable nature, a complete automated solution is unattainable. To worsen the situation, the manual analysis of the generated mutants of a program under test is...

Full description

Saved in:
Bibliographic Details
Published inInformation and software technology Vol. 68; pp. 1 - 17
Main Authors Kintis, Marinos, Malevris, Nicos
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier B.V 01.12.2015
Elsevier Science Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Context: The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. In consequence of its undecidable nature, a complete automated solution is unattainable. To worsen the situation, the manual analysis of the generated mutants of a program under test is prohibitive due to their vast number and the complexity of determining their equivalence. Objective: This paper focuses on the automated identification of equivalent and partially equivalent mutants, i.e. mutants that are equivalent to the original program for a specific subset of paths. To this end, the utilisation of a series of previously proposed data flow patterns is investigated. This study also examines the cross-language nature of these patterns and the killability of the detected partially equivalent mutants. Method: A tool, named MEDIC (Mutants’ Equivalence DIsCovery), incorporating the aforementioned patterns was developed. Its efficiency and effectiveness were evaluated based on a set of manually analysed mutants from real-world programs, written in the Java programming language. Furthermore, MEDIC was employed to test subjects written in the JavaScript programming language. Results: MEDIC managed to detect 56% of the examined equivalent mutants in 125 s, providing strong evidence regarding both its effectiveness and efficiency. Additionally, MEDIC was able to identify equivalent mutants in the JavaScript test subjects, lending colour to the cross-language nature of the implemented patterns. Finally, the identified partially equivalent mutant set consisted largely of killable mutants, 16% of which were stubborn ones. Conclusion: It can be concluded that pattern-based equivalent mutant identification forms a viable approach for combating the equivalent mutant problem. MEDIC automatically detected a considerable number of the manually identified equivalent mutants and was successfully applied to test subjects in all examined programming languages.
AbstractList The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. This paper focuses on the automated identification of equivalent and partially equivalent mutants, i.e. mutants that are equivalent to the original program for a specific subset of paths. To this end, the utilisation of a series of previously proposed data flow patterns is investigated. This study also examines the cross-language nature of these patterns and the killability of the detected partially equivalent mutants. A tool, named MEDIC (Mutants' Equivalence DIsCovery), incorporating the aforementioned patterns was developed. MEDIC was employed to test subjects written in the JavaScript programming language. MEDIC managed to detect 56% of the examined equivalent mutants in 125 s, providing strong evidence regarding both its effectiveness and efficiency. It can be concluded that pattern-based equivalent mutant identification forms a viable approach for combating the equivalent mutant problem.
Context: The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. In consequence of its undecidable nature, a complete automated solution is unattainable. To worsen the situation, the manual analysis of the generated mutants of a program under test is prohibitive due to their vast number and the complexity of determining their equivalence. Objective: This paper focuses on the automated identification of equivalent and partially equivalent mutants, i.e. mutants that are equivalent to the original program for a specific subset of paths. To this end, the utilisation of a series of previously proposed data flow patterns is investigated. This study also examines the cross-language nature of these patterns and the killability of the detected partially equivalent mutants. Method: A tool, named MEDIC (Mutants’ Equivalence DIsCovery), incorporating the aforementioned patterns was developed. Its efficiency and effectiveness were evaluated based on a set of manually analysed mutants from real-world programs, written in the Java programming language. Furthermore, MEDIC was employed to test subjects written in the JavaScript programming language. Results: MEDIC managed to detect 56% of the examined equivalent mutants in 125 s, providing strong evidence regarding both its effectiveness and efficiency. Additionally, MEDIC was able to identify equivalent mutants in the JavaScript test subjects, lending colour to the cross-language nature of the implemented patterns. Finally, the identified partially equivalent mutant set consisted largely of killable mutants, 16% of which were stubborn ones. Conclusion: It can be concluded that pattern-based equivalent mutant identification forms a viable approach for combating the equivalent mutant problem. MEDIC automatically detected a considerable number of the manually identified equivalent mutants and was successfully applied to test subjects in all examined programming languages.
Author Kintis, Marinos
Malevris, Nicos
Author_xml – sequence: 1
  givenname: Marinos
  surname: Kintis
  fullname: Kintis, Marinos
  email: kintism@aueb.gr
– sequence: 2
  givenname: Nicos
  surname: Malevris
  fullname: Malevris, Nicos
  email: ngm@aueb.gr
BookMark eNqFkE9LAzEUxIMoWKvfwMOC511fNvsn8SCUqlWoeNFzSJMXSG03NkkVv72p9eRBT8OD-Q3z5oQcDn5AQs4pVBRod7ms3GCjt1UNtK2grwDEARlR3rOyg7o9JCMQLZQtb8QxOYlxCUB7YDAis8fbm4fpVTEpYlLJ6UINavUZXSxsUGv88OG1sD4UuNm6d7XCIRXrbVJZnMmHs05nzA-n5MiqVcSzHx2Tl7vb5-l9OX-aPUwn81Iz1qTSUFH3BpmgutWK265GtuC8Q2G5pV3fiboxYoE1b21nNeOi6XGBXcsMmAU3bEwu9rlvwW-2GJNc-m3InaOkfQ5vWqA8u672Lh18jAGt1C5990xBuZWkIHfDyaXcDyd3w0noZR4uw80v-C24tQqf_2HXewzz--8Og4za4aDRuIA6SePd3wFfHn-MIg
CitedBy_id crossref_primary_10_1016_j_jss_2018_03_010
crossref_primary_10_1109_TSE_2017_2684805
crossref_primary_10_1016_j_cosrev_2017_06_001
crossref_primary_10_1007_s10664_017_9582_5
crossref_primary_10_1145_3170492_3136053
crossref_primary_10_1016_j_infsof_2020_106426
crossref_primary_10_1016_j_infsof_2020_106317
crossref_primary_10_1109_TSE_2017_2732347
crossref_primary_10_1109_TSE_2017_2786286
crossref_primary_10_1002_smr_2238
crossref_primary_10_1016_j_jss_2019_07_100
crossref_primary_10_1142_S0218194022500322
Cites_doi 10.1145/115372.115320
10.1109/TSE.1977.231145
10.1109/TSE.2011.93
10.1002/stvr.1473
10.1016/j.infsof.2009.04.016
10.1002/stvr.4370040303
10.1109/32.92910
10.1109/C-M.1978.218136
10.1109/TSE.2010.62
10.1002/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3
10.1109/TSE.2006.83
10.1016/S0164-1212(96)00154-9
10.1007/BF00625279
10.1002/stvr.308
10.1109/TSE.2013.44
10.1002/stvr.392
10.1016/j.infsof.2012.02.004
10.1002/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U
10.1002/stvr.4370040104
ContentType Journal Article
Copyright 2015 Elsevier B.V.
Copyright Elsevier Science Ltd. Dec 2015
Copyright_xml – notice: 2015 Elsevier B.V.
– notice: Copyright Elsevier Science Ltd. Dec 2015
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.infsof.2015.07.009
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Business
EISSN 1873-6025
EndPage 17
ExternalDocumentID 3827794641
10_1016_j_infsof_2015_07_009
S0950584915001329
Genre Feature
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29I
4.4
457
4G.
5GY
5VS
7-5
71M
77K
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
AAYOK
ABBOA
ABFNM
ABFRF
ABJNI
ABMAC
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACGOD
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TWZ
UHS
UNMZH
WH7
WUQ
XFK
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7SC
8FD
EFKBS
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c334t-d1927de391c5ca8f62e3b886e9f8f1676924d9be285f6fc38947ebe653d0db8d3
IEDL.DBID .~1
ISSN 0950-5849
IngestDate Mon Jul 14 08:21:17 EDT 2025
Tue Jul 01 02:22:01 EDT 2025
Thu Apr 24 23:03:41 EDT 2025
Fri Feb 23 02:23:54 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Equivalent mutant detection
Stubborn mutant detection
Data flow analysis
Mutation testing
Static analysis
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c334t-d1927de391c5ca8f62e3b886e9f8f1676924d9be285f6fc38947ebe653d0db8d3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
PQID 1719245018
PQPubID 41979
PageCount 17
ParticipantIDs proquest_journals_1719245018
crossref_citationtrail_10_1016_j_infsof_2015_07_009
crossref_primary_10_1016_j_infsof_2015_07_009
elsevier_sciencedirect_doi_10_1016_j_infsof_2015_07_009
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate December 2015
2015-12-00
20151201
PublicationDateYYYYMMDD 2015-12-01
PublicationDate_xml – month: 12
  year: 2015
  text: December 2015
PublicationDecade 2010
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Information and software technology
PublicationYear 2015
Publisher Elsevier B.V
Elsevier Science Ltd
Publisher_xml – name: Elsevier B.V
– name: Elsevier Science Ltd
References Mathur, Wong (bib0008) 1994; 4
Baldwin, Sayward (bib0039) 1979
Cytron, Ferrante, Rosen, Wegman, Zadeck (bib0025) 1991; 13
Braun, Buchwald, Hack, Leia, Mallon, Zwinkau (bib0029) 2013; 7791
Schuler, Dallmeier, Zeller (bib0053) 2009
Harman, Hierons, Danicic (bib0018) 2001; 24
Fraser, Zeller (bib0015) 2012; 38
Schuler, Zeller (bib0020) 2013; 23
Offutt, Pan (bib0016) 1997; 7
Polo, Piattini, GarcÃa-RodrÃguez (bib0050) 2009; 19
Li, Praphamontripong, Offutt (bib0011) 2009
Nica, Wotawa (bib0045) 2012
Madeyski, Orzeszyna, Torkar, Jozala (bib0038) 2014; 40
Offutt, Pan, Tewary, Zhang (bib0009) 1996; 26
Ma, Offutt, Kwon (bib0012) 2005; 15
Papadakis, Malevris (bib0014) 2012; 54
Grün, Schuler, Zeller (bib0052) 2009
Budd, Angluin (bib0022) 1982; 18
Schuler, Zeller (bib0055) 2009
Kintis, Malevris (bib0021) 2014
.
DeMillo, Lipton, Sayward (bib0002) 1978; 11
Zhang, Gligoric, Marinov, Khurshid (bib0036) 2013
Papadakis, Jia, Harman, LeTraon (bib0042) 2015
Hamlet (bib0001) 1977; SE-3
Papadakis, Malevris (bib0051) 2010
Kintis, Papadakis, Malevris (bib0019) 2012
Offutt, Pan (bib0044) 1996
Maldonado, Delamaro, Fabbri, Silva Simão, Sugeta, Vincenzi, Masiero (bib0027) 2001; 24
Offutt, Craft (bib0041) 1994; 4
Briggs, Cooper, Harvey, Simpson (bib0030) 1998; 28
Andrews, Briand, Labiche (bib0005) 2005
Neo Technology. Neo4j graph database, Last Accessed June 2015
IBM T.J. Watson Research Center. T. j. watson libraries for analysis, Last Accessed June 2015
DeMillo, Guindi, McCracken, Offutt, King (bib0040) 1988
java home page (version 3), Last Accessed June 2015
Offutt, Pan, Tewary, Zhang (bib0007) 1994
J. Offutt, N. Li, The
Kintis, Malevris (bib0057) 2013; 1
Jia, Harman (bib0003) 2011; 37
Nica, Wotawa (bib0046) 2012
Nanavati, Wu, Harman, Jia, Krinke (bib0056) 2015
Frankl, Weiss, Hu (bib0010) 1997; 38
Schuler, Zeller (bib0054) 2010
Kintis, Papadakis, Malevris (bib0034) 2010
Andrews, Briand, Labiche, Namin (bib0006) 2006; 32
Rosen, Wegman, Zadeck (bib0024) 1988
Jia, Harman (bib0049) 2009; 51
Voas, McGraw (bib0047) 1997
Offutt, Untch (bib0004) 2001; 24
DeMillo, Offutt (bib0013) 1991; 17
Yao, Harman, Jia (bib0033) 2014
Offutt, Ma, Kwon (bib0048) 2006
Alpern, Wegman, Zadeck (bib0023) 1988
Kintis, Papadakis, Malevris (bib0037) 2014
Choi, Cytron, Ferrante (bib0028) 1991
Hierons, Harman, Danicic (bib0017) 1999; 9
Ammann, Delamaro, Offutt (bib0035) 2014
Oracle Technology Network. The Java Hotspot performance engine architecture, Last Accessed June 2015
Voas (10.1016/j.infsof.2015.07.009_bib0047) 1997
Schuler (10.1016/j.infsof.2015.07.009_bib0055) 2009
Briggs (10.1016/j.infsof.2015.07.009_bib0030) 1998; 28
Braun (10.1016/j.infsof.2015.07.009_bib0029) 2013; 7791
Kintis (10.1016/j.infsof.2015.07.009_bib0037) 2014
Schuler (10.1016/j.infsof.2015.07.009_bib0020) 2013; 23
Offutt (10.1016/j.infsof.2015.07.009_bib0041) 1994; 4
Andrews (10.1016/j.infsof.2015.07.009_bib0006) 2006; 32
Kintis (10.1016/j.infsof.2015.07.009_bib0034) 2010
Andrews (10.1016/j.infsof.2015.07.009_bib0005) 2005
10.1016/j.infsof.2015.07.009_bib0026
Nanavati (10.1016/j.infsof.2015.07.009_bib0056) 2015
Nica (10.1016/j.infsof.2015.07.009_bib0046) 2012
Offutt (10.1016/j.infsof.2015.07.009_bib0009) 1996; 26
Hierons (10.1016/j.infsof.2015.07.009_bib0017) 1999; 9
Jia (10.1016/j.infsof.2015.07.009_bib0003) 2011; 37
Kintis (10.1016/j.infsof.2015.07.009_bib0021) 2014
DeMillo (10.1016/j.infsof.2015.07.009_bib0002) 1978; 11
Offutt (10.1016/j.infsof.2015.07.009_bib0048) 2006
Baldwin (10.1016/j.infsof.2015.07.009_bib0039) 1979
Grün (10.1016/j.infsof.2015.07.009_bib0052) 2009
10.1016/j.infsof.2015.07.009_bib0032
DeMillo (10.1016/j.infsof.2015.07.009_bib0040) 1988
10.1016/j.infsof.2015.07.009_bib0031
Jia (10.1016/j.infsof.2015.07.009_sbref0045) 2009; 51
Hamlet (10.1016/j.infsof.2015.07.009_bib0001) 1977; SE-3
Kintis (10.1016/j.infsof.2015.07.009_bib0057) 2013; 1
Ma (10.1016/j.infsof.2015.07.009_bib0012) 2005; 15
Papadakis (10.1016/j.infsof.2015.07.009_bib0014) 2012; 54
Papadakis (10.1016/j.infsof.2015.07.009_sbref0039) 2015
Frankl (10.1016/j.infsof.2015.07.009_bib0010) 1997; 38
DeMillo (10.1016/j.infsof.2015.07.009_bib0013) 1991; 17
Polo (10.1016/j.infsof.2015.07.009_bib0050) 2009; 19
Papadakis (10.1016/j.infsof.2015.07.009_bib0051) 2010
Zhang (10.1016/j.infsof.2015.07.009_bib0036) 2013
Schuler (10.1016/j.infsof.2015.07.009_bib0054) 2010
Cytron (10.1016/j.infsof.2015.07.009_bib0025) 1991; 13
Yao (10.1016/j.infsof.2015.07.009_bib0033) 2014
Offutt (10.1016/j.infsof.2015.07.009_bib0016) 1997; 7
Budd (10.1016/j.infsof.2015.07.009_bib0022) 1982; 18
10.1016/j.infsof.2015.07.009_bib0043
Schuler (10.1016/j.infsof.2015.07.009_bib0053) 2009
Choi (10.1016/j.infsof.2015.07.009_bib0028) 1991
Li (10.1016/j.infsof.2015.07.009_bib0011) 2009
Madeyski (10.1016/j.infsof.2015.07.009_bib0038) 2014; 40
Kintis (10.1016/j.infsof.2015.07.009_bib0019) 2012
Nica (10.1016/j.infsof.2015.07.009_bib0045) 2012
Fraser (10.1016/j.infsof.2015.07.009_bib0015) 2012; 38
Rosen (10.1016/j.infsof.2015.07.009_bib0024) 1988
Ammann (10.1016/j.infsof.2015.07.009_bib0035) 2014
Maldonado (10.1016/j.infsof.2015.07.009_bib0027) 2001; 24
Alpern (10.1016/j.infsof.2015.07.009_bib0023) 1988
Offutt (10.1016/j.infsof.2015.07.009_bib0044) 1996
Harman (10.1016/j.infsof.2015.07.009_bib0018) 2001; 24
Mathur (10.1016/j.infsof.2015.07.009_bib0008) 1994; 4
Offutt (10.1016/j.infsof.2015.07.009_bib0004) 2001; 24
Offutt (10.1016/j.infsof.2015.07.009_bib0007) 1994
References_xml – reference: IBM T.J. Watson Research Center. T. j. watson libraries for analysis, Last Accessed June 2015
– start-page: 701
  year: 2012
  end-page: 710
  ident: bib0019
  article-title: Isolating first order equivalent mutants via second order mutation
  publication-title: Proceedings of the IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST)
– reference: java home page (version 3), Last Accessed June 2015
– start-page: 142
  year: 1988
  end-page: 151
  ident: bib0040
  article-title: An extended overview of the mothra software testing environment
  publication-title: Proceedings of the Second Workshop on Software Testing, Verification, and Analysis
– start-page: 1
  year: 2012
  end-page: 8
  ident: bib0045
  article-title: Using constraints for equivalent mutant detection
  publication-title: Proceedings of the Second Workshop on Formal Methods in the Development of Software, 2012. WS-FMDS
– volume: 37
  start-page: 649
  year: 2011
  end-page: 678
  ident: bib0003
  article-title: An analysis and survey of the development of mutation testing
  publication-title: IEEE Trans. Softw. Eng.
– start-page: 55
  year: 1991
  end-page: 66
  ident: bib0028
  article-title: Automatic construction of sparse data flow evaluation graphs
  publication-title: Proceedings of the 18th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
– reference: J. Offutt, N. Li, The
– start-page: 192
  year: 2009
  end-page: 199
  ident: bib0052
  article-title: The impact of equivalent mutants
  publication-title: Proceedings of the International Conference on Proceedings of the Software Testing, Verification and Validation Workshops, 2009. ICSTW ’09.
– start-page: 220
  year: 2009
  end-page: 229
  ident: bib0011
  article-title: An experimental comparison of four unit test criteria: mutation, edge-pair, all-uses and prime path coverage
  publication-title: Proceedings of the International Conference on Software Testing, Verification and Validation Workshops, 2009. ICSTW ’09.
– volume: 23
  start-page: 353
  year: 2013
  end-page: 374
  ident: bib0020
  article-title: Covering and uncovering equivalent mutants
  publication-title: Softw. Test., Verification Reliability
– volume: 13
  start-page: 451
  year: 1991
  end-page: 490
  ident: bib0025
  article-title: Efficiently computing static single assignment form and the control dependence graph
  publication-title: ACM Trans. Program. Lang. Syst.
– volume: 15
  start-page: 97
  year: 2005
  end-page: 133
  ident: bib0012
  article-title: Mujava: an automated class mutation system
  publication-title: Softw. Test. Verification Reliability
– year: 1979
  ident: bib0039
  article-title: Heuristics for Determining Equivalence of Program Mutations.
  publication-title: Technical Report 276
– year: 2015
  ident: bib0042
  article-title: Trivial compiler equivalence: a large scale empirical study of a simple, fast and effective equivalent mutant detection technique
  publication-title: Proceedings of the 2015 International Conference on Software Engineering
– volume: 54
  start-page: 915
  year: 2012
  end-page: 932
  ident: bib0014
  article-title: Mutation based test case generation via a path selection strategy
  publication-title: Informat. Softw. Technol.
– volume: 7
  start-page: 165
  year: 1997
  end-page: 192
  ident: bib0016
  article-title: Automatically detecting equivalent mutants and infeasible paths
  publication-title: Softw. Test., Verification Reliability
– start-page: 196
  year: 2014
  end-page: 205
  ident: bib0021
  article-title: Using data flow patterns for equivalent mutant detection
  publication-title: Proceedings of the IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
– start-page: 45
  year: 2010
  end-page: 54
  ident: bib0054
  article-title: (Un-)Covering equivalent mutants
  publication-title: Proceedings of the Third International Conference on Software Testing, Verification and Validation (ICST), 2010
– reference: Neo Technology. Neo4j graph database, Last Accessed June 2015
– volume: 24
  start-page: 5
  year: 2001
  end-page: 13
  ident: bib0018
  article-title: The relationship between program dependence and mutation analysis
  publication-title: Mutation Testing for the New Century
– start-page: 1
  year: 1988
  end-page: 11
  ident: bib0023
  article-title: Detecting equality of variables in programs
  publication-title: Proceedings of the 15th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
– volume: 40
  start-page: 23
  year: 2014
  end-page: 42
  ident: bib0038
  article-title: Overcoming the equivalent mutant problem: a systematic literature review and a comparative experiment of second order mutation
  publication-title: IEEE Trans. Software Eng.,
– volume: 32
  start-page: 608
  year: 2006
  end-page: 624
  ident: bib0006
  article-title: Using mutation analysis for assessing and comparing testing coverage criteria
  publication-title: IEEE Trans. Software Eng.
– volume: 4
  start-page: 131
  year: 1994
  end-page: 154
  ident: bib0041
  article-title: Using compiler optimization techniques to detect equivalent mutants
  publication-title: Softw.Test. Verification Reliability
– start-page: 1
  year: 2015
  end-page: 10
  ident: bib0056
  article-title: Mutation testing of memory-related operators
  publication-title: Proceedings of the IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2015
– volume: 38
  start-page: 278
  year: 2012
  end-page: 292
  ident: bib0015
  article-title: Mutation-driven generation of unit tests and oracles
  publication-title: IEEE Trans. Softw. Eng.
– start-page: 224
  year: 1996
  end-page: 236
  ident: bib0044
  article-title: Detecting equivalent mutants and the feasible path problem
  publication-title: Proceedings of the Eleventh Annual Conference on Computer Assurance, 1996. COMPASS ’96, Systems Integrity. Software Safety. Process Security.
– reference: Oracle Technology Network. The Java Hotspot performance engine architecture, Last Accessed June 2015
– volume: 38
  start-page: 235
  year: 1997
  end-page: 253
  ident: bib0010
  article-title: All-uses vs mutation testing: an experimental comparison of effectiveness
  publication-title: J. Syst. Softw.
– volume: 4
  start-page: 9
  year: 1994
  end-page: 31
  ident: bib0008
  article-title: An empirical comparison of data flow and mutation-based test adequacy criteria
  publication-title: Softw. Test., Verification Reliability
– start-page: 297
  year: 2009
  end-page: 298
  ident: bib0055
  article-title: Javalanche: efficient mutation testing for java
  publication-title: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering
– volume: 17
  start-page: 900
  year: 1991
  end-page: 910
  ident: bib0013
  article-title: Constraint-based automatic test data generation
  publication-title: IEEE Trans. Softw. Eng.
– year: 1997
  ident: bib0047
  publication-title: Software Fault Injection: Inoculating Programs Against Errors
– volume: 28
  start-page: 859
  year: 1998
  end-page: 881
  ident: bib0030
  article-title: Practical improvements to the construction and destruction of static single assignment form
  publication-title: Software: Practice and Experience
– start-page: 919
  year: 2014
  end-page: 930
  ident: bib0033
  article-title: A study of equivalent and stubborn mutation operators using human analysis of equivalence
  publication-title: Proceedings of the 36th International Conference on Software Engineering
– volume: SE-3
  start-page: 279
  year: 1977
  end-page: 290
  ident: bib0001
  article-title: Testing programs with the aid of a compiler
  publication-title: IEEE Trans. Softw. Eng.
– volume: 1
  start-page: 180
  year: 2013
  end-page: 188
  ident: bib0057
  article-title: Identifying more equivalent mutants via code similarity
  publication-title: Proceedings of the 20th Asia-Pacific Software Engineering Conference (APSEC)
– start-page: 57
  year: 2012
  end-page: 62
  ident: bib0046
  article-title: EqMutDetect – A tool for equivalent mutant detection in embedded systems
  publication-title: Proceedings of the Tenth Workshop on Intelligent Solutions in Embedded Systems, 2012. WISES
– volume: 9
  start-page: 233
  year: 1999
  end-page: 262
  ident: bib0017
  article-title: Using program slicing to assist in the detection of equivalent mutants
  publication-title: Softw. Test., Verification. Reliability
– start-page: 92
  year: 2013
  end-page: 102
  ident: bib0036
  article-title: Operator-based and random mutant selection: Better together
  publication-title: Proceedings of the IEEE/ACM 28th International Conference on Automated Software Engineering (ASE)
– volume: 18
  start-page: 31
  year: 1982
  end-page: 45
  ident: bib0022
  article-title: Two notions of correctness and their relation to testing
  publication-title: Acta Inform.
– start-page: 12
  year: 1988
  end-page: 27
  ident: bib0024
  article-title: Global value numbers and redundant computations
  publication-title: Proceedings of the 15th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
– start-page: 90
  year: 2010
  end-page: 99
  ident: bib0051
  article-title: An empirical evaluation of the first and second order mutation testing strategies
  publication-title: Proceedings of the Third International Conference on Software Testing, Verification, and Validation Workshops (ICSTW), 2010
– volume: 24
  start-page: 113
  year: 2001
  end-page: 116
  ident: bib0027
  article-title: Proteum: a family of tools to support specification and program testing based on mutation
  publication-title: Mutation Testing for the New Century
– start-page: 300
  year: 2010
  end-page: 309
  ident: bib0034
  article-title: Evaluating mutation testing alternatives: A collateral experiment
  publication-title: Proceedings of the 17th Asia Pacific Software Engineering Conference (APSEC)
– start-page: 402
  year: 2005
  end-page: 411
  ident: bib0005
  article-title: Is mutation an appropriate tool for testing experiments?
  publication-title: Proceedings of the 27th International Conference on Software Engineering
– year: 1994
  ident: bib0007
  article-title: Experiments with data flow and mutation testing.
  publication-title: Technical Report ISSE-TR-94-105
– volume: 51
  start-page: 1379
  year: 2009
  end-page: 1393
  ident: bib0049
  article-title: Higher order mutation testing
  publication-title: Informat. Softw. Technol.
– volume: 11
  start-page: 34
  year: 1978
  end-page: 41
  ident: bib0002
  article-title: Hints on test data selection: help for the practicing programmer
  publication-title: Computer
– start-page: 21
  year: 2014
  end-page: 30
  ident: bib0035
  article-title: Establishing theoretical minimal sets of mutants
  publication-title: Proceedings of the 2014 IEEE International Conference on Software Testing, Verification, and Validation
– reference: .
– volume: 19
  start-page: 111
  year: 2009
  end-page: 131
  ident: bib0050
  article-title: Decreasing the cost of mutation testing with second-order mutants
  publication-title: Softw. Test., Verification Reliability
– start-page: 69
  year: 2009
  end-page: 80
  ident: bib0053
  article-title: Efficient mutation testing by checking invariant violations
  publication-title: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis
– year: 2014
  ident: bib0037
  article-title: Employing second-order mutation for isolating first-order equivalent mutants
  publication-title: Softw. Test., Verification Reliability
– volume: 26
  start-page: 165
  year: 1996
  end-page: 176
  ident: bib0009
  article-title: An experimental evaluation of data flow and mutation testing
  publication-title: Softw.: Pract. Experience
– volume: 24
  start-page: 34
  year: 2001
  end-page: 44
  ident: bib0004
  article-title: Mutation 2000: uniting the orthogonal
  publication-title: Mutation Testing for the New Century
– start-page: 78
  year: 2006
  end-page: 84
  ident: bib0048
  article-title: The class-level mutants of mujava
  publication-title: Proceedings of the 2006 International Workshop on Automation of Software Test
– volume: 7791
  start-page: 102
  year: 2013
  end-page: 122
  ident: bib0029
  article-title: Simple and efficient construction of static single assignment form
  publication-title: Compiler Construction
– volume: 13
  start-page: 451
  issue: 4
  year: 1991
  ident: 10.1016/j.infsof.2015.07.009_bib0025
  article-title: Efficiently computing static single assignment form and the control dependence graph
  publication-title: ACM Trans. Program. Lang. Syst.
  doi: 10.1145/115372.115320
– volume: 1
  start-page: 180
  year: 2013
  ident: 10.1016/j.infsof.2015.07.009_bib0057
  article-title: Identifying more equivalent mutants via code similarity
– start-page: 90
  year: 2010
  ident: 10.1016/j.infsof.2015.07.009_bib0051
  article-title: An empirical evaluation of the first and second order mutation testing strategies
– start-page: 1
  year: 2012
  ident: 10.1016/j.infsof.2015.07.009_bib0045
  article-title: Using constraints for equivalent mutant detection
– year: 1997
  ident: 10.1016/j.infsof.2015.07.009_bib0047
– start-page: 1
  year: 1988
  ident: 10.1016/j.infsof.2015.07.009_bib0023
  article-title: Detecting equality of variables in programs
– volume: SE-3
  start-page: 279
  issue: 4
  year: 1977
  ident: 10.1016/j.infsof.2015.07.009_bib0001
  article-title: Testing programs with the aid of a compiler
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/TSE.1977.231145
– start-page: 55
  year: 1991
  ident: 10.1016/j.infsof.2015.07.009_bib0028
  article-title: Automatic construction of sparse data flow evaluation graphs
– ident: 10.1016/j.infsof.2015.07.009_bib0032
– volume: 38
  start-page: 278
  issue: 2
  year: 2012
  ident: 10.1016/j.infsof.2015.07.009_bib0015
  article-title: Mutation-driven generation of unit tests and oracles
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/TSE.2011.93
– volume: 23
  start-page: 353
  issue: 5
  year: 2013
  ident: 10.1016/j.infsof.2015.07.009_bib0020
  article-title: Covering and uncovering equivalent mutants
  publication-title: Softw. Test., Verification Reliability
  doi: 10.1002/stvr.1473
– volume: 28
  start-page: 859
  issue: 8
  year: 1998
  ident: 10.1016/j.infsof.2015.07.009_bib0030
  article-title: Practical improvements to the construction and destruction of static single assignment form
  publication-title: Software: Practice and Experience
– volume: 51
  start-page: 1379
  issue: 10
  year: 2009
  ident: 10.1016/j.infsof.2015.07.009_sbref0045
  article-title: Higher order mutation testing
  publication-title: Informat. Softw. Technol.
  doi: 10.1016/j.infsof.2009.04.016
– ident: 10.1016/j.infsof.2015.07.009_bib0026
– volume: 4
  start-page: 131
  issue: 3
  year: 1994
  ident: 10.1016/j.infsof.2015.07.009_bib0041
  article-title: Using compiler optimization techniques to detect equivalent mutants
  publication-title: Softw.Test. Verification Reliability
  doi: 10.1002/stvr.4370040303
– volume: 26
  start-page: 165
  issue: 2
  year: 1996
  ident: 10.1016/j.infsof.2015.07.009_bib0009
  article-title: An experimental evaluation of data flow and mutation testing
  publication-title: Softw.: Pract. Experience
– volume: 17
  start-page: 900
  issue: 9
  year: 1991
  ident: 10.1016/j.infsof.2015.07.009_bib0013
  article-title: Constraint-based automatic test data generation
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/32.92910
– ident: 10.1016/j.infsof.2015.07.009_bib0043
– start-page: 1
  year: 2015
  ident: 10.1016/j.infsof.2015.07.009_bib0056
  article-title: Mutation testing of memory-related operators
– volume: 11
  start-page: 34
  issue: 4
  year: 1978
  ident: 10.1016/j.infsof.2015.07.009_bib0002
  article-title: Hints on test data selection: help for the practicing programmer
  publication-title: Computer
  doi: 10.1109/C-M.1978.218136
– volume: 24
  start-page: 34
  year: 2001
  ident: 10.1016/j.infsof.2015.07.009_bib0004
  article-title: Mutation 2000: uniting the orthogonal
– start-page: 297
  year: 2009
  ident: 10.1016/j.infsof.2015.07.009_bib0055
  article-title: Javalanche: efficient mutation testing for java
– volume: 37
  start-page: 649
  issue: 5
  year: 2011
  ident: 10.1016/j.infsof.2015.07.009_bib0003
  article-title: An analysis and survey of the development of mutation testing
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/TSE.2010.62
– volume: 9
  start-page: 233
  issue: 4
  year: 1999
  ident: 10.1016/j.infsof.2015.07.009_bib0017
  article-title: Using program slicing to assist in the detection of equivalent mutants
  publication-title: Softw. Test., Verification. Reliability
  doi: 10.1002/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3
– volume: 32
  start-page: 608
  issue: 8
  year: 2006
  ident: 10.1016/j.infsof.2015.07.009_bib0006
  article-title: Using mutation analysis for assessing and comparing testing coverage criteria
  publication-title: IEEE Trans. Software Eng.
  doi: 10.1109/TSE.2006.83
– year: 2014
  ident: 10.1016/j.infsof.2015.07.009_bib0037
  article-title: Employing second-order mutation for isolating first-order equivalent mutants
  publication-title: Softw. Test., Verification Reliability
– volume: 38
  start-page: 235
  issue: 3
  year: 1997
  ident: 10.1016/j.infsof.2015.07.009_bib0010
  article-title: All-uses vs mutation testing: an experimental comparison of effectiveness
  publication-title: J. Syst. Softw.
  doi: 10.1016/S0164-1212(96)00154-9
– start-page: 21
  year: 2014
  ident: 10.1016/j.infsof.2015.07.009_bib0035
  article-title: Establishing theoretical minimal sets of mutants
– start-page: 69
  year: 2009
  ident: 10.1016/j.infsof.2015.07.009_bib0053
  article-title: Efficient mutation testing by checking invariant violations
– volume: 24
  start-page: 113
  year: 2001
  ident: 10.1016/j.infsof.2015.07.009_bib0027
  article-title: Proteum: a family of tools to support specification and program testing based on mutation
– volume: 18
  start-page: 31
  issue: 1
  year: 1982
  ident: 10.1016/j.infsof.2015.07.009_bib0022
  article-title: Two notions of correctness and their relation to testing
  publication-title: Acta Inform.
  doi: 10.1007/BF00625279
– volume: 15
  start-page: 97
  issue: 2
  year: 2005
  ident: 10.1016/j.infsof.2015.07.009_bib0012
  article-title: Mujava: an automated class mutation system
  publication-title: Softw. Test. Verification Reliability
  doi: 10.1002/stvr.308
– start-page: 300
  year: 2010
  ident: 10.1016/j.infsof.2015.07.009_bib0034
  article-title: Evaluating mutation testing alternatives: A collateral experiment
– volume: 7791
  start-page: 102
  year: 2013
  ident: 10.1016/j.infsof.2015.07.009_bib0029
  article-title: Simple and efficient construction of static single assignment form
– start-page: 142
  year: 1988
  ident: 10.1016/j.infsof.2015.07.009_bib0040
  article-title: An extended overview of the mothra software testing environment
– start-page: 196
  year: 2014
  ident: 10.1016/j.infsof.2015.07.009_bib0021
  article-title: Using data flow patterns for equivalent mutant detection
– start-page: 192
  year: 2009
  ident: 10.1016/j.infsof.2015.07.009_bib0052
  article-title: The impact of equivalent mutants
– year: 1994
  ident: 10.1016/j.infsof.2015.07.009_bib0007
  article-title: Experiments with data flow and mutation testing.
– start-page: 224
  year: 1996
  ident: 10.1016/j.infsof.2015.07.009_bib0044
  article-title: Detecting equivalent mutants and the feasible path problem
– volume: 40
  start-page: 23
  issue: 1
  year: 2014
  ident: 10.1016/j.infsof.2015.07.009_bib0038
  article-title: Overcoming the equivalent mutant problem: a systematic literature review and a comparative experiment of second order mutation
  publication-title: IEEE Trans. Software Eng.,
  doi: 10.1109/TSE.2013.44
– start-page: 12
  year: 1988
  ident: 10.1016/j.infsof.2015.07.009_bib0024
  article-title: Global value numbers and redundant computations
– start-page: 402
  year: 2005
  ident: 10.1016/j.infsof.2015.07.009_bib0005
  article-title: Is mutation an appropriate tool for testing experiments?
– start-page: 919
  year: 2014
  ident: 10.1016/j.infsof.2015.07.009_bib0033
  article-title: A study of equivalent and stubborn mutation operators using human analysis of equivalence
– year: 1979
  ident: 10.1016/j.infsof.2015.07.009_bib0039
  article-title: Heuristics for Determining Equivalence of Program Mutations.
– start-page: 78
  year: 2006
  ident: 10.1016/j.infsof.2015.07.009_bib0048
  article-title: The class-level mutants of mujava
– volume: 19
  start-page: 111
  issue: 2
  year: 2009
  ident: 10.1016/j.infsof.2015.07.009_bib0050
  article-title: Decreasing the cost of mutation testing with second-order mutants
  publication-title: Softw. Test., Verification Reliability
  doi: 10.1002/stvr.392
– start-page: 701
  year: 2012
  ident: 10.1016/j.infsof.2015.07.009_bib0019
  article-title: Isolating first order equivalent mutants via second order mutation
– volume: 54
  start-page: 915
  issue: 9
  year: 2012
  ident: 10.1016/j.infsof.2015.07.009_bib0014
  article-title: Mutation based test case generation via a path selection strategy
  publication-title: Informat. Softw. Technol.
  doi: 10.1016/j.infsof.2012.02.004
– volume: 24
  start-page: 5
  year: 2001
  ident: 10.1016/j.infsof.2015.07.009_bib0018
  article-title: The relationship between program dependence and mutation analysis
– start-page: 220
  year: 2009
  ident: 10.1016/j.infsof.2015.07.009_bib0011
  article-title: An experimental comparison of four unit test criteria: mutation, edge-pair, all-uses and prime path coverage
– volume: 7
  start-page: 165
  issue: 3
  year: 1997
  ident: 10.1016/j.infsof.2015.07.009_bib0016
  article-title: Automatically detecting equivalent mutants and infeasible paths
  publication-title: Softw. Test., Verification Reliability
  doi: 10.1002/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U
– start-page: 57
  year: 2012
  ident: 10.1016/j.infsof.2015.07.009_bib0046
  article-title: EqMutDetect – A tool for equivalent mutant detection in embedded systems
– start-page: 45
  year: 2010
  ident: 10.1016/j.infsof.2015.07.009_bib0054
  article-title: (Un-)Covering equivalent mutants
– year: 2015
  ident: 10.1016/j.infsof.2015.07.009_sbref0039
  article-title: Trivial compiler equivalence: a large scale empirical study of a simple, fast and effective equivalent mutant detection technique
– ident: 10.1016/j.infsof.2015.07.009_bib0031
– start-page: 92
  year: 2013
  ident: 10.1016/j.infsof.2015.07.009_bib0036
  article-title: Operator-based and random mutant selection: Better together
– volume: 4
  start-page: 9
  issue: 1
  year: 1994
  ident: 10.1016/j.infsof.2015.07.009_bib0008
  article-title: An empirical comparison of data flow and mutation-based test adequacy criteria
  publication-title: Softw. Test., Verification Reliability
  doi: 10.1002/stvr.4370040104
SSID ssj0017030
Score 2.2579012
Snippet Context: The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. In consequence of its undecidable nature, a...
The equivalent mutant problem is a well-known impediment to the adoption of mutation testing in practice. This paper focuses on the automated identification of...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Automation
Data analysis
Data flow analysis
Equivalent mutant detection
Genetic testing
Mutation
Mutation testing
Programming languages
Static analysis
Stubborn mutant detection
Studies
Title MEDIC: A static analysis framework for equivalent mutant identification
URI https://dx.doi.org/10.1016/j.infsof.2015.07.009
https://www.proquest.com/docview/1719245018
Volume 68
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NSwMxEA2lgngRP7FaSw5e13a_kqy3UqxVsRct9BZ2NwmsaFtte_W3O5NNCopQ8LjLZllmZmfekDcvhFwpjptL2KmaKIUGJdGBEEYFjIdFwXgcKY2N4tOYjSbJwzSdNsjAz8IgrdLl_jqn22zt7nSdNbuLquo-AzjoQfnMANLghgEO8SUJxyi__trQPEKM6Fpvrxfg0358znK8wInLuRXyTK2EJ9IS_y5PvxK1rT7DA7LvYCPt1192SBp6dkR2PWv9mNxZmcYb2qc4IVSVNHdiI9R49hUFeEr1x7qC2IJKQ9_XeIAwrZTjC1kXnZDJ8PZlMArcGQlBGcfJKlCA0LjScRaWaZkLwyIdF0IwnRlhQuSvRonKCh2J1DBTAjxJOPiNpbHqqUKo-JQ0Z_OZPiPUhBEXoSkAdBjo-lQGnR-4LMtzljPGeYvE3jSydALieI7Fm_RMsVdZG1SiQWUPd7azFgk2qxa1gMaW57m3uvwRCBJy_JaVbe8k6X7EpQw5dpioWnj-7xdfkD28qkksbdJcfa71JUCRVdGxsdYhO_37x9H4G6-p3Kk
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB60gnoRn1itugevoc1rd-OtFDVq24st9LYk2V2IaOuj_f_OJBtBEQSvSTaEmcnMN8y33wJcakHDJepUbRBjgxIZT0qrPS78POciDLShRnE05uk0up_FszUYNHthiFbpcn-d06ts7a50nTW7r2XZfURw0MPymSCkoYFBsg4bpE4Vt2Cjf_eQjr-GCRTUteRez6MFzQ66iuaFfvxYVFqecaXiSczE3yvUj1xdFaCbXdhxyJH164_bgzUz34fNhrh-ALeVUuMV6zPaJFQWLHN6I8w2BCyGCJWZt1WJ4YXFhr2s6AxhVmpHGaq8dAjTm-vJIPXcMQleEYbR0tMI0oQ2YeIXcZFJywMT5lJyk1hpfaKwBpFOchPI2HJbIEKJBLqOx6Hu6Vzq8Aha88XcHAOzfiCkb3PEHRYbP51g84deS7KMZ5wL0YawMY0qnIY4HWXxrBqy2JOqDarIoKpHw-2kDd7XqtdaQ-OP50VjdfUtFhSm-T9WdhonKfcvfihfUJNJwoUn_37xBWylk9FQDe_GD6ewTXdqTksHWsv3lTlDZLLMz13kfQJLxt9a
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MEDIC%3A+A+static+analysis+framework+for+equivalent+mutant+identification&rft.jtitle=Information+and+software+technology&rft.au=Kintis%2C+Marinos&rft.au=Malevris%2C+Nicos&rft.date=2015-12-01&rft.issn=0950-5849&rft.volume=68&rft.spage=1&rft.epage=17&rft_id=info:doi/10.1016%2Fj.infsof.2015.07.009&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_infsof_2015_07_009
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0950-5849&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0950-5849&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0950-5849&client=summon