[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/154183.154270acmconferencesArticle/Chapter ViewAbstractPublication PagesisstaConference Proceedingsconference-collections
Article
Free access

An information flow model of fault detection

Published: 01 July 1993 Publication History

Abstract

RELAY is a model of how a fault causes a failure on execution of some test datum. This process begins with introduction of an original state potential failure at a fault location and continues as the potential failure(s) transfers to output. Here we describe the second stage of this process, transfer of an incorrect intermediate state from a faulty statement to output.
Transfer occurs along information flow chains, where each link in the chain involves data dependence transfer and/or control dependence transfer. RELAY models concurrent transfer along multiple information flow chains with transfer sets, which identify possible interaction between potential failures, and with transfer routes, which identify actual interactions. Transfer sets, transfer routes, and control dependence transfer are unique to the RELAY model.
The model demonstrates that the process of potential failure transfer is extremely complex and full analysis of real programs may not be practical. Nonetheless, RELAY provides insight into testing and fault detection and suggests an approach to fault-based testing and analysis that may be warranted for critical systems software.

References

[1]
A.T. Acree, T. A. Budd, R.A. DeMillo, R.J. Lipton, and F.G. Sayward. Mutation analysis. Technical Report TR GiT-iCS-79/08, Georgia Institute of Technology, September 1979.]]
[2]
T.A. Budd, R.A. DeMillo, R.J. Lipton, and F.G. Sayward. The design of a prototype mutation system for program testing, in Proceedings NCC, 1978.]]
[3]
The Procurement of Safety-Critical Software in De.fence Equipment. British Ministry of Defence, Interim Defence Standard 00-55, Issue 1, April 1991.]]
[4]
Hazard Analysis and Safety Classification of the Computer and Programmable Electronic System elements of Defence Equipment. British Ministry of Defence, interim Defence Standard 00-56, Issue 1, April 1991.]]
[5]
Timothy A. Budd. The portable mutation testing suite. Technical Report TR 83-8, University of Arizona, March 1983.]]
[6]
L.A. Clarke, A. Podgursky, D.J. Richardson, and S.J. Zeil. An investigation of data flow path selection criteria, in Proceedings of the A CM SIGSOFT/IEEE Workshop on Software Testing, pages 23-32, Banff, Canada, July 1986.]]
[7]
R.A. DeMillo, R.J. Lipton, and F.G. Sayward. Program mutation: A new approach to program testing. In InfoTech State of the Art Report: Software Testing, Vol. 2, pages 107-128, 1979.]]
[8]
Kenneth A. Foster. Error sensitive test case analysis (ESTCA). IEEE Transactions on Software Engineering, SE-6(3):258-264, May 1980.]]
[9]
J. Ferrante, K.J. Ottenstein, and J.D. Warren. The program dependence graph and its use in optimization. A CM Transactions on Programming Languages and Systems, 9(5):319-349, July 1987.]]
[10]
William E. I-Iowden. Weak mutation testing and completeness of test sets. IEEE Transactions on Software Engineering, SE-8(2):371-379, July 1982.]]
[11]
Nancy G. Leveson and Peter R. Harvey. Analyzing software safety. IEEE Transactions on Software Engineering, 9(5):569-579, September 1983.]]
[12]
Janusz W. Laski and Bogdan Korel. A data flow oriented program testing strategy. IEEE Transactions on Software Engineering, SE-9(3):347- 354, May 1983.]]
[13]
Larry J. Morel}. A Theory of Error-Based Testing. PhD thesis, University of Maryland, April 1984.]]
[14]
Simeon C. Ntafos. On testing with required elements. In Proceedings of COMPSAC '81, pages 132-139, November 1981.]]
[15]
Simeon C. Ntafos. On required element testing. Tedmical Report 123, Computer Science Program, University of Texas at Dallas, November 1982.]]
[16]
Simeon C. Ntafos. On required element testhag. IEEE Transactions on Software Engineering, SE-10(6):795-803, November 1984.]]
[17]
A. Jefferson Offutt. Automatic Test Data Generation. PhD thesis, Georgia Institute of Technology, August 1988.]]
[18]
I-I. Andy Podgurski and Lori A. Clarke. A formal model of program dependences and its implications for software testing, debugging, and maintenance. IEEE Transactions on Software Engineering, 16(9):965-979, September 1990.]]
[19]
Debra J. Richardson and Margaret C. Thompson. The relay model of error detection and its application, in Proceedings of the Second Workshop on Software Testing, Verification, and Analysis, July 1988.]]
[20]
Debra J. Richardson and Margaret C. Thompson. An analysis of test data selection criteria using the relay model of faults and faiIures, to appear iEEE Transactions on Software Engineering, May 1993.]]
[21]
Sandra Rapps and Elaine J. Weyuker. Selecting software test data using data flow information. IEEE Transactions on Software Engineering, SE-11(4):367-375, April 1985.]]
[22]
Margaret C. Thompson. An Investigation of Fault-Based Testing Using the RELAY Model. PhD thesis, University of Massachusetts at Amherst, May 1991.]]
[23]
Margaret C. Thompson. Single iteration chain loop analysis and identification of transfer sets and transfer routes for the RELAY model. Technical Report 91-22, Computer and information Science, University of Massachusetts, Amherst, May 1991.]]
[24]
Margaret C. Thompson, Debra J. Richardson, and Lori A. Clarke. Information flow transfer in the RELAY model. Tedmical Report 92-62, Computer Science, University of Massachusetts, Amherst, August 1992.]]
[25]
Mark Weiser. Program slidng. IEEE Transactions on Software Engineering, SE-10(4), July 1984.]]
[26]
M.R. Woodward and K. Ylalewood. From weak to strong, dead or alive? an analysis of some mutation testing issues. In Proceedings of the Second Workshop on Software Testing, Verification, and Analysis, July 1988.]]
[27]
Steven J. Zeil. Testing for perturbations of program statements. IEEE Transactions on Software Engineering~ SF_~9(3):335-346, May 1983.]]

Cited By

View all
  • (2007)An Empirical Study of Test Case Filtering Techniques Based on Exercising Information FlowsIEEE Transactions on Software Engineering10.1109/TSE.2007.102033:7(454-477)Online publication date: 1-Jul-2007
  • (2005)An empirical evaluation of test case filtering techniques based on exercising complex information flowsProceedings of the 27th international conference on Software engineering10.1145/1062455.1062531(412-421)Online publication date: 15-May-2005
  • (2005)Checking Inside the Black BoxIEEE Transactions on Software Engineering10.1109/TSE.2005.10731:10(869-883)Online publication date: 1-Oct-2005
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ISSTA '93: Proceedings of the 1993 ACM SIGSOFT international symposium on Software testing and analysis
August 1993
193 pages
ISBN:0897916085
DOI:10.1145/154183
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1993

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

ISSTA93
Sponsor:
ISSTA93: International Symposium on Software Testing and Analysis
June 28 - 30, 1993
Massachusetts, Cambridge, USA

Acceptance Rates

Overall Acceptance Rate 58 of 213 submissions, 27%

Upcoming Conference

ISSTA '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)74
  • Downloads (Last 6 weeks)14
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2007)An Empirical Study of Test Case Filtering Techniques Based on Exercising Information FlowsIEEE Transactions on Software Engineering10.1109/TSE.2007.102033:7(454-477)Online publication date: 1-Jul-2007
  • (2005)An empirical evaluation of test case filtering techniques based on exercising complex information flowsProceedings of the 27th international conference on Software engineering10.1145/1062455.1062531(412-421)Online publication date: 15-May-2005
  • (2005)Checking Inside the Black BoxIEEE Transactions on Software Engineering10.1109/TSE.2005.10731:10(869-883)Online publication date: 1-Oct-2005
  • (2005)An empirical evaluation of test case filtering techniques based on exercising complex information flowsProceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.10.1109/ICSE.2005.1553584(412-421)Online publication date: 2005
  • (2004)Elided conditionalsProceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering10.1145/996821.996839(52-57)Online publication date: 7-Jun-2004
  • (2004)Validation of a Methodology for Assessing Software ReliabilityProceedings of the 15th International Symposium on Software Reliability Engineering10.1109/ISSRE.2004.47(66-76)Online publication date: 2-Nov-2004
  • (2004)Checking inside the black box: regression testing based on value spectra differences20th IEEE International Conference on Software Maintenance, 2004. Proceedings.10.1109/ICSM.2004.1357787(28-37)Online publication date: 2004
  • (2002)Test Case PrioritizationIEEE Transactions on Software Engineering10.1109/32.98849728:2(159-182)Online publication date: 1-Feb-2002
  • (2001)Prioritizing Test Cases For Regression TestingIEEE Transactions on Software Engineering10.1109/32.96256227:10(929-948)Online publication date: 1-Oct-2001
  • (2000)Prioritizing test cases for regression testingACM SIGSOFT Software Engineering Notes10.1145/347636.34891025:5(102-112)Online publication date: 1-Aug-2000
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media