skip to main content
10.1145/229000.226313acmconferencesArticle/Chapter ViewAbstractPublication PagesisstaConference Proceedingsconference-collections
Article
Free Access

Software error analysis: a real case study involving real faults and mutations

Authors Info & Claims
Published:01 May 1996Publication History

ABSTRACT

The paper reports on a first experimental comparison of software errors generated by real faults and by 1st-order mutations. The experiments were conducted on a program developed by a student from the industrial specification of a critical software from the civil nuclear field. Emphasis was put on the analysis of errors produced upon activation of 12 real faults by focusing on the mechanisms of error creation, masking, and propagation up to failure occurrence, and on the comparison of these errors with those created by 24 mutations. The results involve a total of 3730 errors recorded from program execution traces: 1458 errors were produced by the real faults, and the 2272 others by the mutations. They are in favor of a suitable consistency between errors generated by mutations and by real faults: 85% of the 2272 errors due to the mutations were also produced by the real faults. Moreover, it was observed that although the studied mutations were simple faults, they can create erroneous behaviors as complex as those identified for the real faults. This lends support to the representativeness of errors due to mutations.

References

  1. Bis 89.Bishop P.G. and Pullen F.D., "Error Masking: a Source of Failure Dependency in Multi-Version Programs", Proc./st IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-1), Santa-Barbara, USA, pp. 53-73, 1989.Google ScholarGoogle Scholar
  2. DeM 78.DeMillo R.A., Lipton R.J. and Sayward F.G., "Hints on Test Data Selection: Help for the Practicing Programmer", Computer, vol. 11, no. 4, pp. 34-41, 1978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. DeM 94.DeMillo R.A. and Mathur A.P., "On the Use of Software Artifacts to Evaluate the Effectiveness of Mutation Analysis for Detecting Errors in Production Software", Software Engineering Research Center report, Purdue University, W. Lafayette, USA, 1994.Google ScholarGoogle Scholar
  4. Gor 93.Goradia T., "Dynamic Impact Analysis : A Cost-effective Technique to Enforce Errorpropagation", Proc. 1 st International Symposium on Software Testing and Analysis (ISSTA), Cambridge, USA, pp. 171-181, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lap 92.Laprie J.C. (Ed.), Dependability: Basic Concepts and Terminology, Springer-Verlag, vol. 5, Dependable Computing and Fault Tolerance Systems, Springer-Verlag, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mur 94.Murrill B.W. and Morell L., "An Experimental Approach to Analyzing Software Semantics Using Error Flow Information", Proc. 2nd International Symposium on Software Testing and Analysis (ISSTA), Seattle, USA, p. 200, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Off 89.Offutt A.J., "The Coupling Effect: Fact or Fiction?", Proc. 3rd Symposium on Testing, Analysis and Verification (TAV 3), Key West, USA, pp. 131-140, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Pod 90.Podgurski A. and Clarke L.A., "A Formal Model of Program Dependences and Its Implications for Software Testing, Debugging, and Maintenance", IEEE Transactions on Software Engineering, vol. 16, no. 9, pp. 965- 979, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ric 88.Richardson D.j. and Thompson M.C., "The RELAY Model of Error Detection and its Application", Proc. 2nd Workshop on Software Testing, Verification and Analysis, Banff, Canada, pp. 223-230, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  10. Ric 93.Richardson D.J. and Thompson M.C., "An Analysis of Test Data Selection Criteria Using the RELAY Model of Fault Detection", IEEE Transactions on Software Engineering, vol. 19, no. 6, pp. 533-553, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. The 93.Th6venod-Fosse P. and Waeselynck H., "STATEMATE Applied to Statistical Software Testing", Proc. 1st International Symposium on Software Testing and Analysis (ISSTA), Cambridge, USA, pp. 99-109, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. The 95.Th6venod-Fosse P. and Crouzet Y., "On the Adequacy of Functional Test Criteria Based on Software Behaviour Models", Proc. 5th IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-5), Urbana- Champaign, USA, pp. 176-187, 1995.Google ScholarGoogle Scholar
  13. Tho 93.Thompson M.C., Richardson D.J. and Clarke L.A., "An Information Flow Model of Fault Detection", Proc. 1st international Symposium on Software Testing and Analysis (ISSTA), Cambridge, USA, pp. 182-192, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Voa 92a.Voas J.M. and Miller K.W., "The Revealing Power of a Test Case", Journal of Software Testing, Verification and Reliability, vol. 2, pp. 25-42, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  15. Voa 92b.Voas J.M., Morell L.M. and Miller K., "Predicting Where Faults Can Hide from Testing", IEEE Software, vol. 8, no. 2, pp. 41- 48, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Zei 89.Zeil S.J., "Perturbation Techniques for Detecting Domain Errors", IEEE Transactions on Software Engineering , vol. 15, no. 6, pp. 737-746, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Software error analysis: a real case study involving real faults and mutations

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ISSTA '96: Proceedings of the 1996 ACM SIGSOFT international symposium on Software testing and analysis
          May 1996
          294 pages
          ISBN:0897917871
          DOI:10.1145/229000

          Copyright © 1996 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 May 1996

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate58of213submissions,27%

          Upcoming Conference

          ISSTA '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader