{"title":"An Automatic Testing Approach for Compiler Based on Metamorphic Testing Technique","authors":"Qiuming Tao, Wei Wu, Chen Zhao, Wuwei Shen","doi":"10.1109/APSEC.2010.39","DOIUrl":"https://doi.org/10.1109/APSEC.2010.39","url":null,"abstract":"Compilers play an important role in software development, and it is quite necessary to perform abundant testing to ensure the correctness of compilers. A critical task in compiler testing is to validate the semantic-soundness property which requires consistence between semantics of source programs and behavior of target executables. For validating this property, one main challenging issue is generation of a test oracle. Most existing approaches fall into two main categories when dealing with this issue: reference-based approaches and assertion-based approaches. All these approaches have their weakness when new programming languages are involved or test automation is required. To overcome the weakness in the existing approaches, we propose a new automatic approach for testing compiler. Our approach is based on the technique of metamorphic testing, which validates software systems via so-called \"metamorphic relations\". We select the equivalence-preservation relation as the metamorphic relation and propose an automatic metamorphic testing framework for compiler. We also propose three different techniques for automatically generating equivalent source programs as test inputs. Based on our approach, we developed a tool called Mettoc. Our mutation experiments show that Mettoc is effective to reveal compilers' errors in terms of the semantic-soundness property. Moreover, the empirical results also reveal that simple approaches for constructing test inputs are not weaker than complicated ones in terms of fault-detection capability. We also applied Mettoc in testing a number of open source compilers, and two real errors in GCC-4.4.3 and UCC-1.6 respectively have been detected by Mettoc.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"513 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116699017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Reliability of Web Services Based on BPEL Code Structure Analysis and Run-Time Information Capture","authors":"Bixin Li, Xiaocong Fan, Ying Zhou, Zhiyong Su","doi":"10.1109/APSEC.2010.32","DOIUrl":"https://doi.org/10.1109/APSEC.2010.32","url":null,"abstract":"In this article, an approach is proposed to evaluate the reliability of Web services, where three kinds of Web services are discussed, they are atomic service without the structural information, structural activity based composite service which is composed from other services by using a structural activity mechanism, and BPEL flow process based composite service which composes all kinds of atomic services and activity based composite services using BPEL language in an orchestration style. Firstly, the reliability of atomic service is evaluated based on an extended UDDI model, then, the reliability of activity based composite services is evaluated using BPEL code structure analysis, the reliability of atomic service, and function transition probability, finally, the reliability of BPEL flow process based composite web service was evaluated by a recursive algorithm. Case study and experimental results show the significance of the approach.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCRUM-PSP: Embracing Process Agility and Discipline","authors":"Guoping Rong, Dong Shao, He Zhang","doi":"10.1109/APSEC.2010.44","DOIUrl":"https://doi.org/10.1109/APSEC.2010.44","url":null,"abstract":"With the research and debates on software process, the mainstream software processes can be grouped into two categories, the plan-driven (disciplined) processes and the agile processes. In terms of the classification, personal software process (PSP) is a typical plan-driven process while SCRUM is an agile-style instance. Although they are distinct from each other per se, our research found that PSP and SCRUM may also complement each other when SCRUM provides an agile process management framework, and PSP provides the skills and disciplines that a qualified team member needs to estimate, plan and manage his/her job. This paper proposes an integrated process model, SCRUM-PSP, which combines the strengths of each. We also verified that this integrated process by adopting it into a real project environment where typical agile processes are favored, i.e. change-prone requirements, rapid development, fast delivery, etc. As a result, manageability and predictability which traditional plan-driven processes usually benefit can also be achieved. The work described in this paper is a worthy attempt to embrace both process agility and discipline.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129149435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the Impact of Refactoring on Security-Critical Object-Oriented Designs","authors":"Bandar M. Alshammari, C. Fidge, D. Corney","doi":"10.1109/APSEC.2010.30","DOIUrl":"https://doi.org/10.1109/APSEC.2010.30","url":null,"abstract":"Refactoring focuses on improving the reusability, maintainability and performance of programs. However, the impact of refactoring on the security of a given program has received little attention. In this work, we focus on the design of object-oriented applications and use metrics to assess the impact of a number of standard refactoring rules on their security by evaluating the metrics before and after refactoring. This assessment tells us which refactoring steps can increase the security level of a given program from the point of view of potential information flow, allowing application designers to improve their system's security at an early stage.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129337272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combinatorial Testing with Shielding Parameters","authors":"Baiqiang Chen, Jun Yan, Jian Zhang","doi":"10.1109/APSEC.2010.40","DOIUrl":"https://doi.org/10.1109/APSEC.2010.40","url":null,"abstract":"Combinatorial testing is an important approach to detecting interaction errors for a system with several parameters. Existing research in this area assumes that all parameters of the system under test are always effective. However, in many realistic applications, there may exist some parameters that can disable other parameters in certain conditions. These parameters are called shielding parameters. Shielding parameters make test cases generated by the existing test model, which uses the Mixed Covering Array (MCA), fail in exposing some potential errors that should be detected. In this paper, the Mixed Covering Array with Shielding parameters (MCAS) is proposed to describe such problems. Then test cases can be generated by constructing MCAS’s in three different approaches. According to the experimental results, our test model can generate satisfactory test cases for combinatorial testing with shielding parameters.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133832850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Interaction-Pattern-Based Approach to Prevent Performance Degradation of Fault Detection in Service Robot Software","authors":"Seung-Yeol Seo, Hyung-Min Koo, In-Young Ko","doi":"10.1109/APSEC.2010.37","DOIUrl":"https://doi.org/10.1109/APSEC.2010.37","url":null,"abstract":"In component-based robot software, it is crucial to monitor software faults and deal with them on time before they lead to critical failures. The main causes of software failures include limited resources, component-interoperation mismatches, and internal errors of components. Message-sniffing is one of the popular methods to monitor black-box components and handle these types of faults during runtime. However, this method normally causes some performance problems of the target software system because the fault monitoring and detection process consumes a significant amount of resources of the target system. There are three types of overheads that cause the performance degradation problems: frequent monitoring, transmission of a large amount of monitoring-data, and the processing time for fault analysis. In this paper, we propose an interaction-pattern-based approach to reduce the performance degradation caused by fault monitoring and detection in component-based service robot software. The core idea of this approach is to minimize the number of messages to monitor and analyze in detecting faults. Message exchanges are formalized as interaction patterns which are commonly observed in robot software. In addition, important messages that need to be monitored are identified in each of the interaction patterns. An automatic interaction pattern-identification method is also developed. To prove the effectiveness of our approach, we have conducted a performance simulation. We are also currently applying our approach to silver-care robot systems.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132763095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meixia Zhu, Hanpin Wang, Yongzhi Cao, Zizhen Wang, W. Jin
{"title":"The Analysis of Sequence Diagram with Time Properties in Qualitative and Quantitative Aspects by Model Transformation","authors":"Meixia Zhu, Hanpin Wang, Yongzhi Cao, Zizhen Wang, W. Jin","doi":"10.1109/APSEC.2010.23","DOIUrl":"https://doi.org/10.1109/APSEC.2010.23","url":null,"abstract":"The Sequence Diagram (SD) with time properties is frequently used in the preliminary developing phase of embedded real time system, however, it is not easy to verify due to its informal semantics. An extended time Petri net (TPN) with emph{weak} semantics–TLOPNforSD–is defined and proved to be decidable as far as reach ability, boundedness and cover ability are concerned. A method for progressively refining the SD is also offered in the transformation phase. The SD with time properties are made to be more reliable in two aspects: (1) an enabled transitions generating algorithm based on emph{weak} semantics is designed. Based on this algorithm, the verification of SD with time properties in qualitative aspect can be realized by dint of ROMEO, (2) using the state-class diagram obtained in qualitative analysis phase, a scheduling strategy satisfying all the time constraints specified in the SD is worked out. The strategy is used to get compelling time intervals which are more accurate than the static intervals predefined on the SD for every event.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124439530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Configuration Management in Global Software Development: A Systematic Map","authors":"S. Fauzi, Paul L. Bannerman, M. Staples","doi":"10.1109/APSEC.2010.53","DOIUrl":"https://doi.org/10.1109/APSEC.2010.53","url":null,"abstract":"Many companies use Global Software Development (GSD) to access skilled people, reduce costs and utilize around the clock development. GSD has numerous social and technical difficulties, but most literature only examines social difficulties. Few studies concern technical difficulties or address Software Configuration Management (SCM) issues. SCM is widely used, and supports the infrastructure and practices that enable change management and version control. SCM has potential to support more effective GSD, but is more difficult in GSD, because coordination and synchronization are more complex. This paper presents our findings of a systematic mapping study of SCM in GSD. Systematic mapping is a methodology to discover and categorize research on a topic, and can be used to identify common themes and areas requiring further study. We find most research on SCM in GSD has used case studies, and there has been little empirical validation. The lack of coordination and group awareness causes difficulties for SCM in GSD, but no SCM process has been proposed to address this. More research is required on Software Configuration Control for GSD.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127103881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Aoyama, Takako Nakatani, Shinobu Saito, Mikio Suzuki, K. Fujita, Hiroaki Nakazaki, Ritsuo Suzuki
{"title":"A Model and Architecture of REBOK (Requirements Engineering Body of Knowledge) and Its Evaluation","authors":"M. Aoyama, Takako Nakatani, Shinobu Saito, Mikio Suzuki, K. Fujita, Hiroaki Nakazaki, Ritsuo Suzuki","doi":"10.1109/APSEC.2010.16","DOIUrl":"https://doi.org/10.1109/APSEC.2010.16","url":null,"abstract":"Requirements engineering has been extensively developed as a discipline. Many statistics on the software development indicate requirements process is the most influential to both success and failure of software development. However, practitioners are still difficult to learn and apply requirements engineering. As a guideline for practitioners to learn and apply requirements engineering, we developed REBOK (Requirements Engineering Body Of Knowledge). In the development, we found there is no common model of BOKs in software engineering. This article proposes the model and architecture of the body of knowledge of REBOK and its proof of the concept.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122683426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Variants of Risk and Opportunity","authors":"H. Leung","doi":"10.1109/APSEC.2010.52","DOIUrl":"https://doi.org/10.1109/APSEC.2010.52","url":null,"abstract":"The common definition of risk has not explicitly included the time element. This limits our ability to effectively model the risk resolution process. This paper first introduces variants of risks and proposes a risk life cycle that can better communicate and track the evolution of risk from its initial identification to its final deposition. We also introduce opportunity variants and an opportunity life cycle. A number of indicators based on these variants are defined to better monitor risk management and opportunity management performance.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}