{"title":"Suggestion of Testing Method for Industrial Level Cyber-Physical System in Complex Environment","authors":"Jiseob Kim, Sunil Chon, Jihwan Park","doi":"10.1109/ICSTW.2019.00043","DOIUrl":"https://doi.org/10.1109/ICSTW.2019.00043","url":null,"abstract":"In this paper, we suggest the testing method for industrial level cyber-physical system and its automation under the various environmental, restrictive condition. There are other testing methods, such as Software in the Loop Test, Hardware in the Loop Test, Field Test. But these methods have limitations of high cost, not enough testing and hard to test because the complexity of the situation is going up. The systems that work near human, like drones, autonomous cars, or used in extreme environments should be tested under same extreme environments and proof that it is safe. And the area in which those systems are used is increasing. For example, the drone is used in the various area not only for leisure but also for broadcasting, surveillance on fire, and parcel delivery. It means the test with a combination of various environment and condition is required to the system. We report the case that we have tested and automated the test with the simulation. With the simulation, we tested the system under the extreme environment, a variety of combination of legal restrictions and situational condition.","PeriodicalId":310230,"journal":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127108694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mutation 2019 Program Committee","authors":"","doi":"10.1109/icstw.2019.00011","DOIUrl":"https://doi.org/10.1109/icstw.2019.00011","url":null,"abstract":"","PeriodicalId":310230,"journal":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134500800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaming Ye, Mingliang Ma, T. Peng, Yun Peng, Yinxing Xue
{"title":"Towards Automated Generation of Bug Benchmark for Smart Contracts","authors":"Jiaming Ye, Mingliang Ma, T. Peng, Yun Peng, Yinxing Xue","doi":"10.1109/ICSTW.2019.00049","DOIUrl":"https://doi.org/10.1109/ICSTW.2019.00049","url":null,"abstract":"Smart Contracts bring Ethereum transactions great convenience, meanwhile they can have potentially devastating financial consequences. To address the lack of security guarantee, we investigate state-of-art bug detection tools and conduct experiments to analyze their pros and cons. Finally, we conduct research to answer why they have false positives and a convincing bug benchmark is provided.","PeriodicalId":310230,"journal":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131345178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. H. Moghadam, Mehrdad Saadatmand, Markus Borg, M. Bohlin, B. Lisper
{"title":"Machine Learning to Guide Performance Testing: An Autonomous Test Framework","authors":"M. H. Moghadam, Mehrdad Saadatmand, Markus Borg, M. Bohlin, B. Lisper","doi":"10.1109/ICSTW.2019.00046","DOIUrl":"https://doi.org/10.1109/ICSTW.2019.00046","url":null,"abstract":"Satisfying performance requirements is of great importance for performance-critical software systems. Performance analysis to provide an estimation of performance indices and ascertain whether the requirements are met is essential for achieving this target. Model-based analysis as a common approach might provide useful information but inferring a precise performance model is challenging, especially for complex systems. Performance testing is considered as a dynamic approach for doing performance analysis. In this work-in-progress paper, we propose a self-adaptive learning-based test framework which learns how to apply stress testing as one aspect of performance testing on various software systems to find the performance breaking point. It learns the optimal policy of generating stress test cases for different types of software systems, then replays the learned policy to generate the test cases with less required effort. Our study indicates that the proposed learning-based framework could be applied to different types of software systems and guides towards autonomous performance testing.","PeriodicalId":310230,"journal":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123728743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Team Activities Measurement Method for Open Source Software Development Using the Gini Coefficient","authors":"Ayako Masuda, T. Matsuodani, K. Tsuda","doi":"10.1109/ICSTW.2019.00042","DOIUrl":"https://doi.org/10.1109/ICSTW.2019.00042","url":null,"abstract":"In recent years, open source software (OSS) has made remarkable contributions as social infrastructure. The model of the OSS development (OSSD) team, as seen in the case of GitHub, is becoming the de facto standard. The OSSD team develops source codes for realizing requirements and, further, test codes for testing the source codes. The present study measures the team activity in OSSD, and it includes aspects of software testing activity. Our previous research revealed the characteristic of the OSSD team, which was that the team consists of a small number of enthusiastic contributors (core members) and a large number of small contributors. This characteristic has some inequalities. The Gini coefficient is a well-known economic index used to measure inequality. This study proposes a method to estimate and use an Effort Person-Months metric as an object of the Gini coefficient for software development. In this method, the difference in team activity can be detected more precisely than by the Gini coefficient obtained from the number of commits and the modification amount. We believe that this method covers detecting software testing activities precisely.","PeriodicalId":310230,"journal":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132625486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Generation of Capability Leaks' Exploits for Android Applications","authors":"Mingsong Zhou, Fanping Zeng, Yu Zhang, Chengcheng Lv, Zhao Chen, Guozhu Chen","doi":"10.1109/ICSTW.2019.00068","DOIUrl":"https://doi.org/10.1109/ICSTW.2019.00068","url":null,"abstract":"The capability leak of Android applications is one kind of serious vulnerability. It causes other apps to leverage its functions to achieve their illegal goals. In this paper, we propose a tool which can automatically generate capability leaks' exploits of Android applications with path-sensitive symbolic execution-based static analysis and test. It can aid in reducing false positives of vulnerability analysis and help engineers find bugs. We utilize control flow graph (CFG) reduction and call graph (CG) search optimization to optimize symbolic execution, which make our tool applicable for practical apps. By applying our tool to 439 popular applications of the Wandoujia (a famous app market in China) in 2017, we found 2239 capability leaks of 16 kinds of permissions. And the average analysis time was 4 minutes per app. A demo video can be found at the website https://youtu.be/dXFMNZWxEc0","PeriodicalId":310230,"journal":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131827444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the A-MOST 2019 Chairs","authors":"Shuai Wang","doi":"10.1109/icstw.2019.00006","DOIUrl":"https://doi.org/10.1109/icstw.2019.00006","url":null,"abstract":"will about “ Challenges for testing autonomous driving systems: tackling uncertainty in the open physical world and machine learning with high quality.","PeriodicalId":310230,"journal":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127271773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Measuring Combinatorial Coverage of Manually Created Test Cases for Industrial Software","authors":"Miraldi Fifo, Eduard Paul Enoiu, W. Afzal","doi":"10.1109/ICSTW.2019.00062","DOIUrl":"https://doi.org/10.1109/ICSTW.2019.00062","url":null,"abstract":"Combinatorial coverage has been proposed as a way to measure the quality of test cases by using the input interaction characteristics. This paper describes the results of empirically measuring combinatorial coverage of manually created test cases by experienced industrial engineers working with embedded software development. We found that manual test cases achieve on average 78% 2-way combinatorial coverage, 57% 3-way coverage, 40% 4-way coverage, 20% 5-way combinatorial coverage and 13% for 6-way combinatorial coverage. These manual test cases can be augmented to achieve 100% combinatorial coverage for 2-way and 3-way interactions by adding eight and 66 missing test cases on average, respectively. For 4-way interactions, full combinatorial coverage can achieved by adding 658 missing test cases. For 5-way and 6-way interactions, full combinatorial coverage can be achieved by adding 5163 and 6170 missing test cases on average, respectively. The results of this paper suggest that manual test cases created by industrial engineers do not achieve a high combinatorial coverage and can be improved by adding more test cases to cover t-wise interactions at the expense of more test cases to execute.","PeriodicalId":310230,"journal":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medusa: Mutant Equivalence Detection Using Satisfiability Analysis","authors":"Benjamin Kushigian, Amit Rawat, René Just","doi":"10.1109/ICSTW.2019.00035","DOIUrl":"https://doi.org/10.1109/ICSTW.2019.00035","url":null,"abstract":"This paper introduces Medusa, a framework for reasoning about the equivalence of first-order mutants in Java programs. Since the problem of detecting equivalent mutants is undecidable in general, even when restricted to first-order mutants, Medusa focuses on a subset of Java that can be modeled as SMT solver constraints. This paper describes the key insights behind Medusa and provides details about its concepts and components, in particular constraint forking—a novel approach that leverages structural similarities between mutants to improve its efficiency. This paper further reports on a preliminary evaluation and outlines several optimizations that leverage the first-order mutant property to further improve Medusa's applicability and efficiency.","PeriodicalId":310230,"journal":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122512560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}