Sciweavers

Share
ICSE
2010
IEEE-ACM

From behaviour preservation to behaviour modification: constraint-based mutant generation

9 years 3 hour ago
From behaviour preservation to behaviour modification: constraint-based mutant generation
The efficacy of mutation analysis depends heavily on its capability to mutate programs in such a way that they remain executable and exhibit deviating behaviour. Whereas the former requires knowledge about the syntax and static semantics of the programming language, the latter requires some least understanding of its dynamic semantics, i.e., how expressions are evaluated. We present an approach that is knowledgeable enough to generate only mutants that are both syntactically and semantically correct and likely exhibit non-equivalent behaviour. Our approach builds on our own prior work on constraint-based refactoring tools, and works by negating behaviour-preserving constraints. As a proof of concept we present an enhanced implementation of the Access Modifier Change operator for Java programs whose naive implementations create huge numbers of mutants that do not compile or leave behaviour unaltered. While we cannot guarantee that our generated mutants are non-equivalent, we can demons...
Friedrich Steimann, Andreas Thies
Added 19 Jul 2010
Updated 19 Jul 2010
Type Conference
Year 2010
Where ICSE
Authors Friedrich Steimann, Andreas Thies
Comments (0)
books