skip to main content
10.1145/154183.154269acmconferencesArticle/Chapter ViewAbstractPublication PagesisstaConference Proceedingsconference-collections
Article
Free Access

Dynamic impact analysis: a cost-effective technique to enforce error-propagation

Published:01 July 1993Publication History

ABSTRACT

This paper introduces dynamic impact analysis as a cost-effective technique to enforce the error-propagation condition for detecting a fault. The intuition behind dynamic impact analysis is as follows. In a specific test-case, if an execution of a syntactic component has a strong impact on the program output and if the output is correct, then the value of that component-execution is not likely to be erroneous. To capture this intuition in a theoretical framework the notion of impact is formally defined and the concept of impact strength is proposed as a quantitative measure of the impact. In order to provide an infrastructure supporting the computation of impact strengths, program impact graphs and execution impact graphs are introduced. An empirical study validating the computation of impact strengths is presented. It is shown that the impact strengths computed by dynamic impact analysis provide reasonable estimates for the error-sensitivity with respect to the output except when the impact is via one or more error-tolerant components of the program. Potential applications of dynamic impact analysis in the area of mutation testing and dynamic program slicing are discussed.

References

  1. 1.H. Agrawal and J. R. Horgan. Dynamic Program Slicing. In Proc. A CM $IGPLAN Conf. Programmzng Language Deszgn and fmplementatzon, pages 246-256, White Plains, New York, June 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.M. J. Balcer, W. M. Hasling, and T. J. Ostrand. Automatic Generation of Test Scripts from Formal Test Specifications. In Proc. A CM $}GSOFT Thzrd Workshop on Software Testzng, Analysis and Verzficatzon, pages 210-218, KeyWest-Florida, Dec. 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.T. A. Budd. Mutation Analysis: Ideas, Examples, Problems and Prospects. In B. Chandrasekaran and S. Radicchi, editors, Computer Program Testing, pages 129-148. North-Holland Publishing Company, 1981.Google ScholarGoogle Scholar
  4. 4.R. A. Demillo, R. J. Lipton, and F. G. Sayward. Hints on test data selection: Help for the practising programmer. Computer, 11(4):34-41, April 1978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.E. Duesterwald, R. Gupta, and M. L. Sofia. Rigorous Data Flow Testing through Output Influences. In Proc. 2nd Irwne Software Symposium (ISS'92), pages 131-145, Irvine, CA, March 1992.Google ScholarGoogle Scholar
  6. 6.J. Ferrante, K. J. Ottenstein, and J. D. Warren. The Program Dependence Graph and Its Use in Optimization. A CM Trans. Prog. Lang. $yst., pages 319-349, July 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.R. G. Hamlet. Testing Programs with the Aid of a Compiler. IEEE Trans. Sofiw. Eng., SE-3(4):279- 290, July 1977.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.W. A. Howden. Weak Mutation Testing and Completeness of Test Sets. }EEE Trans. Sofiw. Eng., SE-8(4):371-379, July 1982.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.B. Korel and J. Laski. Dynamic Program Slicing. In Information Processzng Letters 29, pages 155-163. Elsevier Science Publishers B.V. (North-Holland), October 1988. Google ScholarGoogle Scholar
  10. 10.B. Marick. Two Experiments in Software Testing. Technical Report UIUCDCS-R-90-1644, University of Illinois, i990.Google ScholarGoogle Scholar
  11. 11.E. W. Minium. Statzstical Reasoning in Psychology and Educatzon. John Wiley & Sons, 2nd edition, 1978.Google ScholarGoogle Scholar
  12. 12.L. j. Morell. Theoretical Insights into Fault-Based Testing. in Proc. A CM SIGSOFT Second Workshop on Software Testing, Analyszs and Vcmficatzon, pages 45-62, Banff-Canada, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  13. 13.S. Rapps and E. J. Weyuker. Data Flow Analysis Techniques for Program Test Data Selection. In Proc. Sixth International Conference on Software Engineering, pages 272-278, Tokyo-Japan, Sept. 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.D. J. Richardson and M. C. Thompson. The RE- LAY Model of Error Detection and its Application. In Proc. A 6'31 SIGSOFT Second Workshop on Software Tcstzng, Analyszs and Vcrzficatzon, pages 223- 230, Banff-Canada, 1988.Google ScholarGoogle Scholar
  15. 15.H. Ural and B. Yang. A Structural Test Selection Criterion. Informatzon Processzng Letters, 28(3):157-163, July 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.G. A. Ventkatesh. The Semantic Approach to Program Slicing. in Proc. A CM SIGPLAN Conf. Programming Language Design and Implemcntatzon, pages 107-119, Toronto, June 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.J. M. Voas. PIE: A Dynamic Failure-Based Technique. {EEE Trans. Sofiw. Eng., 18(8):717-727, Aug. 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Dynamic impact analysis: a cost-effective technique to enforce error-propagation

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                ISSTA '93: Proceedings of the 1993 ACM SIGSOFT international symposium on Software testing and analysis
                August 1993
                193 pages
                ISBN:0897916085
                DOI:10.1145/154183

                Copyright © 1993 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 July 1993

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate58of213submissions,27%

                Upcoming Conference

                ISSTA '24

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader