2012 IEEE 23rd International Symposium on Software Reliability Engineering 2012
DOI: 10.1109/issre.2012.9
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Analysis of Upgrades in C/C++ Software

Abstract: Abstract-Regression testing techniques are commonly used to validate the correctness of upgrades. When a regression test fails, testers must understand the erroneous behaviors that caused the failure and identify the fault that originated these erroneous behaviors. In many cases, identifying the causes of a failure is difficult and time consuming. The analysis of regression problems provides interesting opportunities to validation and verification techniques. In fact, by comparing the execution of the base ver… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 18 publications
(24 citation statements)
references
References 23 publications
0
24
0
Order By: Relevance
“…The selection strategy implemented in VART keeps the cost of monitoring, inference and model checking under control, avoiding scalability issues in practice [48].…”
Section: Detecting Dynamic Propertiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The selection strategy implemented in VART keeps the cost of monitoring, inference and model checking under control, avoiding scalability issues in practice [48].…”
Section: Detecting Dynamic Propertiesmentioning
confidence: 99%
“…Jadet statically identifies patterns of method invocations and discovers anomalous sequence of method calls [61]. Radar dynamically generates and checks program properties and control-flow models that capture the behavior of software units, such as program functions [48].…”
Section: Related Workmentioning
confidence: 99%
“…The FSA could be part of the program specification or could be automatically inferred by monitoring test case execution, as it usually happens in anomaly detection techniques that compare passing and failing executions [3], [7].…”
Section: Ava: Automata Violations Analyzermentioning
confidence: 99%
“…For instance, BCT [3] and RADAR [7] use both models on data values and operation sequences. Probabilistic Program Dependency Graph combines bayesian probabilities with structural information to capture anomalies in the flow of the data [21].…”
Section: B Model Based Approachesmentioning
confidence: 99%
“…These models are used to assess the impact and the correctness of upgrades [19]. Validation has taken place both on Linux and internal ABB code.…”
Section: B Dynamic Analysis Of Software Upgradesmentioning
confidence: 99%