On the effectiveness of mutation analysis as a black box testing technique

被引:21
|
作者
Murnane, T [1 ]
Reed, K [1 ]
机构
[1] TATE Associates, Carlton, Vic, Australia
关键词
D O I
10.1109/ASWEC.2001.948492
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The technique of mutation testing, in which the effectiveness of tests is determined by creating variants of a program in which statements are mutated, is well known. Whilst of considerable theoretical interest the technique requires costly tools and is computationally expensive. Very large numbers of 'mutants' can be generated for even simple programs. More recently it has been proposed that the concept be applied to specification based (black box) testing. The proposal is to generate test cases by systematically replacing data-items relevant to a particular part of a specification with a data-item relevant to another. If the specification is considered as generating a language that describes the set of valid inputs then the mutation process is intended to generate syntactically valid and invalid statements. Irrespective of their 'correctness' in terms of the specification, these can then be used to test a program in the usual (black box) manner. For this approach to have practical value it must produce test cases that would not be generated by other popular black box test generation approaches. This paper reports a case study involving the application of mutation based black box testing to two programs of different types. Test cases were also generated using equivalence class testing and boundary value testing approaches. The test cases from each method were examined to judge the overlap and to assess the value of the additional cases generated. It was found that less than 20% of the mutation test cases for a data-vetting program were generated by the other two methods, as against 75% for a statistical analysis program. This paper analyses these results and suggests classes of specifications for which mutation based test-case generation may be effective.
引用
收藏
页码:12 / 20
页数:9
相关论文
共 50 条
  • [1] On the Effectiveness of the System Validation Based on the Black Box Testing Methodology
    Marijan, Dusica
    Teslic, Nikola
    Temerinac, Miodrag
    Pekovic, Vukota
    IEEE CIRCUITS AND SYSTEMS INTERNATIONAL CONFERENCE ON TESTING AND DIAGNOSIS, 2009, : 100 - +
  • [2] On the Effectiveness of the System Validation Based on the Black Box Testing Methodology
    Dusica Marijan
    Nikola Teslic
    Miodrag Temerinac
    Vukota Pekovic
    Journal of Electronic Science and Technology of China, 2009, 7 (04) : 385 - 389
  • [3] A Comparative analysis on Black Box Testing Strategies
    Jacob, Pramod Mathew
    Prasanna, M.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE (ICIS), 2016, : 1 - 6
  • [4] Using MC/DC as a Black-Box Testing Technique
    Vilkomir, Sergiy
    Baptista, John
    Das, Gourav
    2017 IEEE 28TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC), 2017,
  • [5] Teaching black box testing
    Chen, TY
    Poon, PL
    1998 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: EDUCATION & PRACTICE, PROCEEDINGS, 1998, : 324 - 329
  • [6] Bypassing Heaven's Gate Technique Using Black-Box Testing
    Hwang, Seon-Jin
    Utaliyeva, Assem
    Kim, Jae-Seok
    Choi, Yoon-Ho
    SENSORS, 2023, 23 (23)
  • [7] An approach to testing black-box components using contract-based mutation
    Jiang, Ying
    Hou, Shan-Shan
    Shan, Jin-Hui
    Zhang, Lu
    Xie, Bing
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2008, 18 (01) : 93 - 117
  • [8] Black-box testing based on colorful taint analysis
    Chen Kai
    Feng DengGuo
    Su PuRui
    Zhang YingJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (01) : 171 - 183
  • [9] Black-box testing based on colorful taint analysis
    Kai Chen
    DengGuo Feng
    PuRui Su
    YingJun Zhang
    Science China Information Sciences, 2012, 55 : 171 - 183
  • [10] Black-box testing based on colorful taint analysis
    CHEN Kai1
    2State Key Laboratory of Information Security
    3National Engineering Research Center of Information Security
    ScienceChina(InformationSciences), 2012, 55 (01) : 171 - 183