Sciweavers

17 search results - page 1 / 4
» Efficient mutation testing by checking invariant violations
Sort
View
ISSTA
2009
ACM
13 years 11 months ago
Efficient mutation testing by checking invariant violations
David Schuler, Valentin Dallmeier, Andreas Zeller
TOOLS
2000
IEEE
13 years 9 months ago
Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification
This paper presents a method and a tool for building trustable OO components. The methodology is based on an integrated design and test approach for OO software components. It is ...
Benoit Baudry, Vu Le Hanh, Yves Le Traon
12
Voted
IEEEARES
2010
IEEE
13 years 9 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
UML
2004
Springer
13 years 10 months ago
Determining the Structural Events That May Violate an Integrity Constraint
Any implementation of an information system must ensure that an operation is only applied if its execution does not lead to a violation of any of the integrity constraints defined ...
Jordi Cabot, Ernest Teniente
ISSTA
2010
ACM
13 years 6 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...