Mutation Testing Operators

URL

Change Log

When What
October 28th, 2016 Donated by P. Arun Babu

Reference

Studies who have been using the data (in any form) are required to include the following reference:

@article{Babu:2012:IAD:2347696.2347701,
 author = {Babu, P. Arun and Kumar, C. Senthil and Murali, N. and Jayakumar, T.},
 title = {An Intuitive Approach to Determine Test Adequacy in Safety-critical Software},
 journal = {SIGSOFT Softw. Eng. Notes},
 issue_date = {September 2012},
 volume = {37},
 number = {5},
 month = sep,
 year = {2012},
 issn = {0163-5948},
 pages = {1--10},
 numpages = {10},
 url = {http://doi.acm.org/10.1145/2347696.2347701},
 doi = {10.1145/2347696.2347701},
 acmid = {2347701},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {equivalent mutant, higher order mutation, mutation testing, safety critical software, test adequacy},
}

About the Data

Overview of Data

This dataset lists the mutation operators for C-programming language

Paper Abstract

Safety-critical software must adhere to stringent quality standards and is expected to be thoroughly tested. However, exhaustive testing of software is usually impractical. The two main challenges faced by a software testing team are generation of effective test cases and demonstration of testing adequacy.

This paper proposes an intuitive and conservative approach to determine the test adequacy in safety-critical software. The approach is demonstrated through a case study: the core temperature monitoring system of a nuclear reactor. We combine conservative test coverage of unique execution path test cases, and the results from mutation testing to determine the test adequacy.

Although mutation testing is a powerful technique, the difficulty in identifying equivalent mutants has limited its practical utility. To gain confidence on the computed test adequacy: (i) faults during mutation testing must be induced at all possible execution paths of the code, (ii) properties of unkilled mutants must be studied, and (iii) all equivalent mutants must be detected. In this regard; results of static, dynamic and coverage analysis of the mutants is presented, and a technique to identify the likely equivalent mutants is proposed.