Establishing Theoretical Minimal Sets of Mutants, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, pp.21-30, 2014. ,
DOI : 10.1109/ICST.2014.13
Introduction to Software Testing (1 ed.), 2008. ,
An orchestrated survey of methodologies for automated software test case generation, Journal of Systems and Software, vol.86, issue.8, pp.1978-2001, 2013. ,
DOI : 10.1016/j.jss.2013.02.061
Structural coverage of feasible code, Proceedings of the 5th Workshop on Automation of Software Test, AST '10, pp.59-66, 2010. ,
DOI : 10.1145/1808266.1808275
Enhancing structural software coverage by incrementally computing branch executability, Software Quality Journal, vol.2, issue.4, pp.725-751, 2011. ,
DOI : 10.1002/stvr.4370020405
Bidirectional Symbolic Analysis for Effective Branch Testing, IEEE Transactions on Software Engineering, vol.42, issue.5, pp.403-426, 2016. ,
DOI : 10.1109/TSE.2015.2490067
An All-in-One Toolkit for Automated White-Box Testing, 2014. ,
DOI : 10.1007/978-3-319-09099-3_4
URL : https://hal.archives-ouvertes.fr/cea-01834983
Sound and Quasi-Complete Detection of Infeasible Test Requirements, 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST), 2015. ,
DOI : 10.1109/ICST.2015.7102607
URL : https://hal.archives-ouvertes.fr/cea-01836560
EEcient Leveraging of Symbolic Execution to Advanced Coverage Criteria, Software Testing, Veriication and Validation (ICST), 2014 IEEE Seventh International Conference on, pp.173-182, 2014. ,
Weakest-Precondition of Unstructured Programs, ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering (PASTE), pp.82-87, 2005. ,
ACSL: ANSI/ISO C Speciication Language ,
Proofs from Tests, IEEE Transactions on Software Engineering, vol.36, issue.4, pp.495-508, 2010. ,
DOI : 10.1109/TSE.2010.49
Automatic generation of path covers based on the control flow analysis of computer programs, IEEE Transactions on Software Engineering, vol.20, issue.12, pp.12-885, 1994. ,
DOI : 10.1109/32.368137
Generating tests from counterexamples, Proceedings. 26th International Conference on Software Engineering, pp.23-28, 2004. ,
DOI : 10.1109/ICSE.2004.1317455
URL : http://www-cad.eecs.berkeley.edu/~tah/Publications/generating_tests_from_counterexamples.ps
The software model checker Blast, International Journal on Software Tools for Technology Transfer, vol.2, issue.4, pp.5-6, 2007. ,
DOI : 10.1007/978-1-4757-3540-6
An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption, Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, pp.597-608, 2017. ,
Test Data Selection and Quality Estimation Based on the Concept of Esssential Branches for Path Testing, IEEE Trans. Software Eng, vol.13, issue.5, pp.509-517, 1987. ,
Satissability Modulo Theories: Introduction and Applications, Commun. ACM, vol.54, issue.9, pp.69-77, 2011. ,
Infeasible path generalization in dynamic symbolic execution, Information and Software Technology, vol.58, pp.403-418, 2015. ,
DOI : 10.1016/j.infsof.2014.07.012
Constraint-Based Automatic Test Data Generation, IEEE Trans. Software Eng, vol.17, issue.9, pp.900-910, 1991. ,
A Discipline of Programming, 1976. ,
Further Empirical Studies of Test EEectiveness, Proceedings of the 6th ACM SIGSOFT International Symposium on Foundations of Software Engineering (SIGSOFT '98, pp.153-162, 1998. ,
Guidelines for Coverage-Based Comparisons of Non-Adequate Test Suites, ACM Transactions on Software Engineering and Methodology, vol.24, issue.4, pp.1-2233, 2015. ,
DOI : 10.1145/1806799.1806863
Applications of feasible path analysis to program testing, Proceedings of the 1994 international symposium on Software testing and analysis , ISSTA '94, pp.80-94, 1994. ,
DOI : 10.1145/186258.186523
URL : http://agoldberg.org/Publications/ISSTA-final-font.pdf
Mutant reduction based on dominance relation for weak mutation testing, Information and Software Technology, vol.81, pp.82-96, 2017. ,
DOI : 10.1016/j.infsof.2016.05.001
URL : http://dro.dur.ac.uk/20092/1/20092.pdf
The Impact of Equivalent Mutants, Second International Conference on Software Testing Veriication and Validation Workshops Proceedings, pp.192-199, 2009. ,
, GZip, 2018.
An axiomatic basis for computer programming, Communications of the ACM, vol.12, issue.10, pp.576-580, 1969. ,
DOI : 10.1145/363235.363259
Experiments of the EEectiveness of Dataaow-and Controllow-based Test Adequacy Criteria, Proceedings of the 16th International Conference on Software Engineering (ICSE '94, pp.191-200, 1994. ,
Experiments of the EEectiveness of Dataaow-and Controllow-Based Test Adequacy Criteria, Proceedings of the 16th International Conference on Software Engineering, pp.191-200, 1994. ,
Detecting Trivial Mutant Equivalences via Compiler Optimisations, IEEE Transactions on Software Engineering, vol.44, issue.4, pp.99-100, 2017. ,
DOI : 10.1109/TSE.2017.2684805
Evaluating Mutation Testing Alternatives: A Collateral Experiment, 2010 Asia Pacific Software Engineering Conference, pp.300-309, 2010. ,
DOI : 10.1109/APSEC.2010.42
Employing secondorder mutation for isolating rst-order equivalent mutants, Softw. Test., Verif. Reliab, vol.25, pp.5-7, 2015. ,
Virgile Prevosto, Julien Signoles, and Boris Yakobowski. 2015. Frama-C: A Program Analysis Perspective, Formal Aspects of Computing Journal, 2015. ,
All-Paths Test Generation for Programs with Internal Aliases, 2008 19th International Symposium on Software Reliability Engineering (ISSRE), pp.11-14, 2008. ,
DOI : 10.1109/ISSRE.2008.25
Static analysis of mutant subsumption, 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp.1-10, 2015. ,
DOI : 10.1109/ICSTW.2015.7107454
Analyzing the validity of selective mutation with dominator mutants, Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2016, pp.571-582, 2016. ,
DOI : 10.1145/1806799.1806863
Are We There Yet? How Redundant and Equivalent Mutants AAect Determination of Test Completeness, Ninth IEEE International Conference on Software Testing, Veriication and Validation Workshops, pp.142-151, 2016. ,
DOI : 10.1109/icstw.2016.41
Automatic unit test data generation using mixed-integer linear programming and execution trees, Proceedings IEEE International Conference on Software Maintenance, 1999 (ICSM'99). 'Software Maintenance for Business Change' (Cat. No.99CB36360), pp.189-198, 1999. ,
DOI : 10.1109/ICSM.1999.792607
URL : http://serg.ing.unisannio.it/~antoniol/papers/icsm99test.ps.gz
Taming Coverage Criteria Heterogeneity with LTest, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), pp.500-507, 2017. ,
DOI : 10.1109/ICST.2017.57
URL : https://hal.archives-ouvertes.fr/cea-01808788
Generic and EEective Speciication of Structural Test Objectives, 2017 IEEE International Conference on Software Testing, Veriication and Validation, pp.436-441, 2017. ,
Foundations of Software Testing, 2008. ,
The Art of Software Testing, 2004. ,
The Art of Software Testing, 2011. ,
Heuristics-based infeasible path detection for dynamic test data generation, Information and Software Technology, vol.50, issue.7-8, pp.7-8, 2008. ,
DOI : 10.1016/j.infsof.2007.06.006
An Experimental Determination of Suucient Mutant Operators, ACM Trans. Softw. Eng. Methodol, vol.5, issue.2, pp.99-118, 1996. ,
An Empirical Evaluation of Weak Mutation, IEEE Trans. Software Eng, vol.20, p.5, 1994. ,
Automatically Detecting Equivalent Mutants and Infeasible Paths, Softw. Test., Verif. Reliab, vol.7, issue.3, pp.165-192, 1997. ,
, openssl.org, 2018.
Guided test generation for coverage criteria, 2010 IEEE International Conference on Software Maintenance, 2010. ,
DOI : 10.1109/ICSM.2010.5609565
, ICSE '18, 2018.
Mitigating the eeects of equivalent mutants with mutant classiication strategies, Sci. Comput. Program, pp.95-298, 2014. ,
Threats to the validity of mutation-based test assessment, Proceedings of the 25th International Symposium on Software Testing and Analysis, ISSTA 2016, 2016. ,
DOI : 10.1145/267580.267590
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, pp.936-946, 2015. ,
DOI : 10.1109/ICSE.2015.103
Mutation based test case generation via a path selection strategy, Information and Software Technology, vol.54, issue.9, pp.915-932, 2012. ,
DOI : 10.1016/j.infsof.2012.02.004
, Radio Technical Commission for Aeronautics RTCA DO178-B Software Considerations in Airborne Systems and Equipment Certiication, 1992.
The Software Testing Standard ? How you can use it, 3 r d European Conference on Software Testing, 1995. ,
EEcient mutation testing by checking invariant violations, Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, pp.69-80, 2009. ,
Covering and Uncovering Equivalent Mutants, Software Testing, Verification and Reliability, vol.27, issue.10, pp.353-374, 2013. ,
DOI : 10.1109/ICSE.2004.1317471
, SJeng (SPEC) 2018. https://www.spec.org/cpu2006/Docs/458, sjeng.html, 2018.
, sqlite.org, 2018.
Combining Symbolic Execution and Model Checking for Data Flow Testing, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, pp.654-665, 2015. ,
DOI : 10.1109/ICSE.2015.81
More experience with data flow testing, IEEE Transactions on Software Engineering, vol.19, issue.9, pp.912-919, 1993. ,
DOI : 10.1109/32.241773
Experience with Path Analysis and Testing of Programs, IEEE Transactions on Software Engineering, vol.6, issue.3, pp.278-286, 1980. ,
DOI : 10.1109/TSE.1980.230473
Experience with Path Analysis and Testing of Programs, IEEE Transactions on Software Engineering, vol.6, issue.3, pp.3-278, 1980. ,
DOI : 10.1109/TSE.1980.230473
Reducing the EEects of Infeasible Paths in Branch Testing, Proceedings of the ACM SIGSOFT '89 Third Symposium on Software Testing, Analysis, and Veriication (TAV3), pp.48-54, 1989. ,
Software unit test coverage and adequacy, ACM Computing Surveys, vol.29, issue.4, p.4, 1997. ,
DOI : 10.1145/267580.267590