APPLICABILITY OF BET TO ELUSIVE BUGS IN DIVERSE APPLICATION AREAS

M. Chaudhary, B. Chen, P. Desai, R. Hemmatti, F. Lionetti, T. Hachisuka, W. Howden

Abstract

The basic principles of Bounded Exhaustive Testing (BET) are reviewed, as well as the concept of an Elusive Bug (EB). Initial work on the application of BET to EB's previously indicated that it provides a new and promising approach to this problem. A four-part BET/EB oriented test framework involving: fault model development, BET test generation design, failure model identification and automated oracle design is introduced. The framework provides a systematic approach to BET/EB. It was applied to three very different areas of application. The research indicated the general applicability of BET and the BET/EB framework. It resulted in increased insight into BET/EB including the development of new techniques, such as the BET/EB "inverse oracle". The research illustrated how fault models can be used to put BET application bounding on a systematic basis. It also illustrated how failure models can be used to facilitate the development of automated oracles, and how they can be used, along with fault models, to systematically define the effectiveness scope of a BET testing strategy.

References

  1. Artho, C., Leungwattanakit, W., Hagiya, M., Tanabe, Y., Tools and Techniques for Model Checking Networked Programs. SNPD, 2008.
  2. Bioeng. Dept., http://www.continuity.ucsd.edu, UCSD, 2008.
  3. Boy, N., Casper, J., Pacheco, C., Williams, A., "Automated Testing of Distributed Systems, Final project report, MIT 6.824, May 2004.
  4. Guillarmo A. A., and Cristian, F., Simulation-based Testing of Computer Protocols for Dependable Embedded Systems, The Journal of SuperComputing, 16(1-2), 2000.
  5. Howden, W.E. and Rhyne, C., Test Frameworks for Elusive Bug Testing, ICSOFT, Barcelona, Spain, 2007.
  6. Howden, W.E., Elusive Bugs, Exhaustive Testing and Incomplete Oracles, ICSOFT, Porto, Portugal, 2008.
  7. Kensler, A.; Shirley, P. “Optimizing Ray-Triangle Intersection via Automated Search”. IEEE Symposium on Interactive Ray Tracing 2006, Sept., 2006.
  8. Miller, B. P., Cooksey, G, and Moore, F. “An Empirical Study of the Robustness of MacOS Applications Using Random Testing,” Proceedings of the 1st International workshop on Random testing, 2006.
  9. Sullivan, K, J., Yang, J., Coppit, D., Khurshid, S., Jackson, D., Software Assurance by Bounded Exhaustive Testing, Proc. ISSTA, 2004.
  10. Woo, A., Pearce, A., and Ouellette, M. “It's really not a rendering bug, you see...” IEEE Computer Graphics & Applications, 16(5), September 1996.
Download


Paper Citation


in Harvard Style

Chaudhary M., Chen B., Desai P., Hemmatti R., Lionetti F., Hachisuka T. and Howden W. (2009). APPLICABILITY OF BET TO ELUSIVE BUGS IN DIVERSE APPLICATION AREAS . In Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT, ISBN 978-989-674-009-2, pages 277-282. DOI: 10.5220/0002213602770282


in Bibtex Style

@conference{icsoft09,
author={M. Chaudhary and B. Chen and P. Desai and R. Hemmatti and F. Lionetti and T. Hachisuka and W. Howden},
title={APPLICABILITY OF BET TO ELUSIVE BUGS IN DIVERSE APPLICATION AREAS},
booktitle={Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT,},
year={2009},
pages={277-282},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002213602770282},
isbn={978-989-674-009-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT,
TI - APPLICABILITY OF BET TO ELUSIVE BUGS IN DIVERSE APPLICATION AREAS
SN - 978-989-674-009-2
AU - Chaudhary M.
AU - Chen B.
AU - Desai P.
AU - Hemmatti R.
AU - Lionetti F.
AU - Hachisuka T.
AU - Howden W.
PY - 2009
SP - 277
EP - 282
DO - 10.5220/0002213602770282