Towards Generating Realistic and High Coverage Test Data for Constraint-Based Fault Injection

Generating faulty data is a key issue in fault injection. The faulty data include not only the ones of extreme values or bad formats, but also the ones which are logically unreasonable. Constraint-...

[1]  Bernhard K. Aichernig,et al.  Test Case Generation by Contract Mutation in Spec# , 2009, Electron. Notes Theor. Comput. Sci..

[2]  Myra B. Cohen,et al.  An orchestrated survey of methodologies for automated software test case generation , 2013, J. Syst. Softw..

[3]  Ravishankar K. Iyer,et al.  Failure Diagnosis for Distributed Systems Using Targeted Fault Injection , 2017, IEEE Transactions on Parallel and Distributed Systems.

[4]  Simone do Rocio Senger de Souza,et al.  A systematic review on search based mutation testing , 2017, Inf. Softw. Technol..

[5]  Ying Jiang,et al.  Contract-based mutation for testing components , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).

[6]  Neeraj Suri,et al.  An empirical study of injected versus actual interface errors , 2014, ISSTA 2014.

[7]  Domenico Cotroneo,et al.  On Fault Representativeness of Software Fault Injection , 2013, IEEE Transactions on Software Engineering.

[8]  Adam Kiezun,et al.  Grammar-based whitebox fuzzing , 2008, PLDI '08.

[9]  Neeraj Suri,et al.  simFI: From single to simultaneous software fault injections , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[10]  Jordi Cabot,et al.  Test Data Generation for Model Transformations Combining Partition and Constraint Analysis , 2014, ICMT.

[11]  Anup K. Ghosh,et al.  Testing the robustness of Windows NT software , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).

[12]  Avelino Francisco Zorzo,et al.  Systematic mapping study on MBT: tools and models , 2017, IET Softw..

[13]  Hossain Shahriar,et al.  OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[14]  Nikolaj Bjørner,et al.  Z3: An Efficient SMT Solver , 2008, TACAS.

[15]  Neeraj Suri,et al.  On the Selection of Error Model(s) for OS Robustness Evaluation , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[16]  Daniel P. Siewiorek,et al.  Fault Injection Experiments Using FIAT , 1990, IEEE Trans. Computers.

[17]  Antonia Bertolino,et al.  Online Robustness Testing of Distributed Embedded Systems: An Industrial Approach , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP).

[18]  Zhe Chen,et al.  Generating Realistic Logically Unreasonable Faulty Data for Fault Injection , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[19]  Lionel C. Briand,et al.  Adaptive random testing: an illusion of effectiveness? , 2011, ISSTA '11.

[20]  Arnaud Gotlieb,et al.  Constraint-Based Testing: An Emerging Trend in Software Testing , 2015, Adv. Comput..

[21]  Domenico Cotroneo,et al.  Assessing Dependability with Software Fault Injection , 2016, ACM Comput. Surv..

[22]  Soonhoi Ha,et al.  FIFA: A Kernel-Level Fault Injection Framework for ARM-Based Embedded Linux System , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).

[23]  Neeraj Suri,et al.  The impact of fault models on software robustness evaluations , 2011, 2011 33rd International Conference on Software Engineering (ICSE).

[24]  Stephen McCamant,et al.  The Daikon system for dynamic detection of likely invariants , 2007, Sci. Comput. Program..