• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yu Chang, Wang Yawen, Lin Huan, Gong Yunzhan. Fault Detection Context Based Equivalent Mutant Identification Algorithm[J]. Journal of Computer Research and Development, 2021, 58(1): 83-97. DOI: 10.7544/issn1000-1239.2021.20190817
Citation: Yu Chang, Wang Yawen, Lin Huan, Gong Yunzhan. Fault Detection Context Based Equivalent Mutant Identification Algorithm[J]. Journal of Computer Research and Development, 2021, 58(1): 83-97. DOI: 10.7544/issn1000-1239.2021.20190817

Fault Detection Context Based Equivalent Mutant Identification Algorithm

Funds: This work was supported by the National Natural Science Foundation of China(U1736110, 61702044).
More Information
  • Published Date: December 31, 2020
  • Although studied for almost forty years, the mutation testing has been prevented from being widely applied in industrial practice by the problem of equivalent mutants. To overcome the problem, a algorithm of using fault detection context to predict the equivalence of mutants is proposed. It makes use of static analysis technique to extract feature information about the program context around mutated program, which is called its fault detection context. Then the context information is translated into a document model, which describes the feature of mutant using natural language. The representation learning network is further used to encode fault context features. Finally, machine learning model is used to predict the equivalence of each mutant with respect to its fault detection context. An empirical study on 118000 mutants from 22 C programs is performed to validate the proposed method. The results show that the method achieves 91% of precision and 82% of recall in classifying mutants as equivalent, while 77% of precision and 78% of recall are achieved in cross-project validation. It implies the fault detection context based technique can dramatically improve the efficiency and effectiveness of equivalent mutants detection, which effectively facilitates the efficiency for mutation testing process.
  • Related Articles

    [1]Pei Zhongyi, Liu Lin, Wang Chen, Wang Jianmin. An Explainability-Centric Requirements Analysis Framework for Machine Learning Applications[J]. Journal of Computer Research and Development, 2024, 61(4): 983-1002. DOI: 10.7544/issn1000-1239.202220794
    [2]Yin Xiaokang, Lu Bin, Cai Ruijie, Zhu Xiaoya, Yang Qichao, Liu Shengli. Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 326-340. DOI: 10.7544/issn1000-1239.202110990
    [3]Tan Tian, Ma Xiaoxing, Xu Chang, Ma Chunyan, Li Yue. Survey on Java Pointer Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 274-293. DOI: 10.7544/issn1000-1239.202220901
    [4]Zhu Yi’an, Shi Xianchen, Yao Ye, Li Lian, Ren Pengyuan, Dong Weizhen, Li Jiayu. A WCET Analysis Method for Multi-Core Processors with Multi-Tier Coherence Protocol[J]. Journal of Computer Research and Development, 2023, 60(1): 30-42. DOI: 10.7544/issn1000-1239.202111244
    [5]Zhou Hongbo, Jin Dahai, and Gong Yunzhan. Application of Interval Arithmetic in Software Testing Based on Field-Sensitive Point-to Analysis[J]. Journal of Computer Research and Development, 2012, 49(9): 1852-1862.
    [6]Wang Yawen, Yao Xinhong, Gong Yunzhan, Yang Zhaohong. A Method of Buffer Overflow Detection Based on Static Code Analysis[J]. Journal of Computer Research and Development, 2012, 49(4): 839-845.
    [7]Wang Lei, Chen Gui, and Jin Maozhong. Detection of Code Vulnerabilities via Constraint-Based Analysis and Model Checking[J]. Journal of Computer Research and Development, 2011, 48(9): 1659-1666.
    [8]Han Wei, He Yeping. Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System[J]. Journal of Computer Research and Development, 2011, 48(8): 1430-1437.
    [9]Ye Pengfei, Peng Xin, and Zhao Wenyun. Recovering the Use Case from Object-Oriented Programs by Static Analysis[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Bian Xiaofeng, Zhou Xuehai. Study on Modeling MIPS Processors for Static WCET Analysis[J]. Journal of Computer Research and Development, 2006, 43(10): 1828-1834.
  • Cited by

    Periodical cited type(0)

    Other cited types(5)

Catalog

    Article views (697) PDF downloads (394) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return