Filters








408 Hits in 6.0 sec

Tailored Mutants Fit Bugs Better [article]

Miltiadis Allamanis, Earl T. Barr, René Just, Charles Sutton
2016 arXiv   pre-print
Mutation analysis measures test suite adequacy, the degree to which a test suite detects seeded faults: one test suite is better than another if it detects more mutants.  ...  We introduce tailored mutation operators to reach and capture these defects. Tailored mutation operators are built from and apply to an existing codebase and its history.  ...  improve the effectiveness of the mutation analysis; • When using either traditional mutants and tailored mutants, methods that select mutants based on their location can provide better efficiency for  ... 
arXiv:1611.02516v1 fatcat:urmpa757jrdsdfmo6o7y77fhtq

Can we learn from developer mistakes? Learning to localize and repair real bugs from real bug fixes [article]

Cedric Richter, Heike Wehrheim
2022 arXiv   pre-print
This raises the question whether bug localization and repair models trained on real bug fixes are more effective in localizing and repairing real bugs.  ...  Real bug fixes found in open source repositories seem to be the perfect source for learning to localize and repair real bugs.  ...  to the repair model [4] or by finding replacements that naturally fit the context [25] .  ... 
arXiv:2207.00301v1 fatcat:eq7hdk76mbg47pwnu4hcorq4me

Does mutation testing improve testing practices? [article]

Goran Petrović, Marko Ivanković, Gordon Fraser, René Just
2021 arXiv   pre-print
In other words, had mutation testing been used for the changes introducing the faults, it would have reported a live mutant that could have prevented the bug.  ...  In this paper we aim to fill this gap: By analyzing a large dataset of almost 15 million mutants, we investigate how these mutants influenced developers over time, and how these mutants relate to real  ...  more and better tests.  ... 
arXiv:2103.07189v1 fatcat:lilhxamgtfeehnkxvv3hs3b7ka

Bespoke Processors for Applications with Ultra-Low Area and Power Constraints

Hari Cherupalli, Henry Duwe, Weidong Ye, Rakesh Kumar, John Sartori
2018 IEEE Micro  
In this paper, we make a case for bespoke processor design, an automated approach that tailors a general purpose processor IP to a target application by removing all gates from the design that can never  ...  Figure 14 shows the increase in gate count, area, and power required to tailor a bespoke processor to the six benchmarks with the most mutants by including all possible mutants (i.e., bug fixes) generated  ...  As an example, this may be used to support common bug fixes by automatically creating mutants of the original software by injecting common bugs [38] bespoke design that supports all the mutant versions  ... 
doi:10.1109/mm.2018.032271059 fatcat:cfhtpvp6mrg2hlf5oqd5bym63a

Bespoke Processors for Applications with Ultra-low Area and Power Constraints

Hari Cherupalli, Henry Duwe, Weidong Ye, Rakesh Kumar, John Sartori
2017 Proceedings of the 44th Annual International Symposium on Computer Architecture - ISCA '17  
In this paper, we make a case for bespoke processor design, an automated approach that tailors a general purpose processor IP to a target application by removing all gates from the design that can never  ...  Figure 14 shows the increase in gate count, area, and power required to tailor a bespoke processor to the six benchmarks with the most mutants by including all possible mutants (i.e., bug fixes) generated  ...  As an example, this may be used to support common bug fixes by automatically creating mutants of the original software by injecting common bugs [38] bespoke design that supports all the mutant versions  ... 
doi:10.1145/3079856.3080247 dblp:conf/isca/CherupalliDY0S17 fatcat:llm6v3o3yrdaxkfvxmtlv2yjyu

Bespoke Processors for Applications with Ultra-low Area and Power Constraints

Hari Cherupalli, Henry Duwe, Weidong Ye, Rakesh Kumar, John Sartori
2017 SIGARCH Computer Architecture News  
In this paper, we make a case for bespoke processor design, an automated approach that tailors a general purpose processor IP to a target application by removing all gates from the design that can never  ...  Figure 14 shows the increase in gate count, area, and power required to tailor a bespoke processor to the six benchmarks with the most mutants by including all possible mutants (i.e., bug fixes) generated  ...  As an example, this may be used to support common bug fixes by automatically creating mutants of the original software by injecting common bugs [38] bespoke design that supports all the mutant versions  ... 
doi:10.1145/3140659.3080247 fatcat:ont7xlw3cncsvlhs22x62lxihy

Learning How to Mutate Source Code from Bug-Fixes [article]

Michele Tufano, Cody Watson, Gabriele Bavota, Massimiliano Di Penta, Martin White, Denys Poshyvanyk
2019 arXiv   pre-print
Empirical studies have shown that mutants are representative of real faults; yet they also indicated a clear need for better, possibly customized, mutation operators and strategies.  ...  Our empirical evaluation showed that our models are able to predict mutants that resemble the actual fixed bugs in between 9% and 45% of the cases, and over 98% of the automatically generated mutants are  ...  [63] generate tailored mutants, e.g., exploiting API calls occurring elsewhere in the project and show that tailored mutants are well-coupled to real bugs.  ... 
arXiv:1812.10772v2 fatcat:rncudsdqzfdfhhjsn6zwzphuaa

Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities

Manh-Dung Nguyen, Sébastien Bardin, Richard Bonichon, Roland Groz, Matthieu Lemerre
2020 Zenodo  
The technique features a fuzzing engine tailored to UAF specifics, a lightweight code instrumentation and an efficient bug triage step.  ...  Experimental evaluation for bug reproduction on real cases demonstrates that UAFUZZ significantly outperforms state-of-the-art directed fuzzers in terms of fault detection rate, time to exposure and bug  ...  Bug Trace Flattening A bug trace ( §2.2) is a sequence of stack traces, i.e. it is a large object not fit for the lightweight instrumentation required by greybox fuzzing.  ... 
doi:10.5281/zenodo.6787051 fatcat:s7pfo46fe5gztjxyv4orii4h3q

Genetic Improvement of Software (Dagstuhl Seminar 18052)

Justyna Petke, Claire Le Goues, Stephanie Forrest, William B. Langdon, Michael Wagner
2018 Dagstuhl Reports  
Genetic improvement can be used to create large numbers of versions of programs, each tailored to be better for a particular use or for a particular computer, or indeed (e.g. to defeat the authors of computer  ...  More recent work in program invariants [2] has been used for fault localisation -perhaps this can be leveraged both for better localisation of repair locations but also for giving a more informed fitness  ... 
doi:10.4230/dagrep.8.1.158 dblp:journals/dagstuhl-reports/PetkeGFL18 fatcat:xedhvc5bpvd23gmtzduijkvl4a

API-Constrained Genetic Improvement [chapter]

William B. Langdon, David R. White, Mark Harman, Yue Jia, Justyna Petke
2016 Lecture Notes in Computer Science  
If identical, fitness is nanoseconds to run Superpixel- SEEDS::iterate(pic,4) else mutant is killed. To reduce noise, run on local disk on otherwise idle networked Linux PC.  ...  (These five failed to compile due to a bug in the new swap mutation's use of scoping rules). Eight failed run time array bound checks.  ... 
doi:10.1007/978-3-319-47106-8_16 fatcat:xcxdaa2hofearatnnzk22cghua

IMPROVEMENT IN MUTATION TESTING USING BOLTZMANN LEARNING FOR FAULT PREDICTION IN TEST CASES

Akanksha Tiwari
2018 International Journal of Advanced Research in Computer Science  
The last step is calculation of fitness value. The calculation of fitness value depends upon the initial population value which is selected randomly.  ...  This model is verified using new projects to confirm that it is fit for actual implementation [9] .  ... 
doi:10.26483/ijarcs.v9i3.6046 fatcat:j5bc3xdewrfvvaiyxzsse5hwxi

What Are We Really Testing in Mutation Testing for Machine Learning? A Critical Reflection

Annibale Panichella, Cynthia C. S. Liem
2021 2021 IEEE/ACM 43rd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)  
Based on our observations, we propose several action points for better alignment of mutation testing techniques for ML with paradigms and vocabularies of classical mutation testing.  ...  testing has been extended to machine learning (ML) systems, and deep learning (DL) in particular; researchers have proposed approaches, tools, and statistically sound heuristics to determine whether mutants  ...  Work with experts to better determine what 'realistic mutants', 'realistic faults' and 'realistic tests' are. Ma et al.  ... 
doi:10.1109/icse-nier52604.2021.00022 fatcat:qt6524eg7jbxfapbmgv3wy4kyq

Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities [article]

Manh-Dung Nguyen, Sébastien Bardin, Richard Bonichon, Roland Groz, Matthieu Lemerre
2020 arXiv   pre-print
The technique features a fuzzing engine tailored to UAF specifics, a lightweight code instrumentation and an efficient bug triage step.  ...  Experimental evaluation for bug reproduction on real cases demonstrates that UAFuzz significantly outperforms state-of-the-art directed fuzzers in terms of fault detection rate, time to exposure and bug  ...  Bug Trace Flattening A bug trace ( §2.2) is a sequence of stack traces, i.e. it is a large object not fit for the lightweight instrumentation required by greybox fuzzing.  ... 
arXiv:2002.10751v2 fatcat:z4utyiuoy5ccvopynodcjx7nge

Assertion-Driven Development: Assessing the Quality of Contracts Using Meta-Mutations

Thomas Knauth, Christof Fetzer, Pascal Felber
2009 2009 International Conference on Software Testing, Verification, and Validation Workshops  
We then use random mutation testing to determine a lower and upper bound on the detectable mutations and compare these bounds with the number of mutants detected by the contracts.  ...  Our results seem to indicate that more complete contracts do provide better detection of bugs that were introduced by the students themselves.  ...  Ideally, the contracts in the program should detect all mutants: this will make sure that all likely bugs are detectable.  ... 
doi:10.1109/icstw.2009.40 dblp:conf/icst/KnauthFF09 fatcat:fsyqiqde5fccjjosrpfa5sc77q

MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing [article]

Yaohui Chen, Mansour Ahmadi, Reza Mirzazade farkhani, Boyu Wang, Long Lu
2020 arXiv   pre-print
However, such heuristics are not generalizable as there exists no one-size-fits-all rule applicable to different programs.  ...  MEUZZ determines which new seeds are expected to produce better fuzzing yields based on the knowledge learned from past seed scheduling decisions made on the same or similar programs.  ...  When an input is selected to explore, the concolic engine will produce mutants of the running input. These mutants can further cover the neighbor branches ( § 4.3) of the re-visited path.  ... 
arXiv:2002.08568v2 fatcat:as2xekj7rnfltbm4ok25aculhe
« Previous Showing results 1 — 15 out of 408 results