Software Testing, Verification and Reliability

Cover image for Vol. 25 Issue 8

Early View (Online Version of Record published before inclusion in an issue)

Edited By: Jeff Offutt and Robert M. Hierons

Impact Factor: 1.348

ISI Journal Citation Reports © Ranking: 2014: 35/104 (Computer Science Software Engineering)

Online ISSN: 1099-1689

Associated Title(s): Journal of Software: Evolution and Process, Software Process: Improvement and Practice, Software: Practice and Experience


  1. 1 - 9
  1. Research Articles

    1. Predicting metamorphic relations for testing scientific software: a machine learning approach using graph kernels

      Upulee Kanewala, James M. Bieman and Asa Ben-Hur

      Article first published online: 16 NOV 2015 | DOI: 10.1002/stvr.1594

      Thumbnail image of graphical abstract

      Challenges in creating suitable oracles limit the ability to perform automated testing in scientific software. Metamorphic testing is a method for automating the testing process for programmes without test oracles. However, finding the metamorphic relations satisfied by a programme remains a labour-intensive task. Here, we propose a machine learning approach for predicting metamorphic relations that uses a graph-based representation of a programme. Our results show that a graph kernel that uses all paths in the graph has the best prediction accuracy.

    2. Behaviour abstraction adequacy criteria for API call protocol testing

      Hernan Czemerinski, Victor Braberman and Sebastian Uchitel

      Article first published online: 16 OCT 2015 | DOI: 10.1002/stvr.1593

      Thumbnail image of graphical abstract

      This paper proposes conformance testing adequacy criteria based on covering an abstraction of the intended behaviour's semantics. The criteria are independent of the specification language and structure used to describe the intended protocol and the language used to implement it. Experimental results show that the criteria are a good predictor for fault detection for protocol conformance and code coverage.

    3. Generating effective test cases based on satisfiability modulo theory solvers for service-oriented workflow applications

      Hongda Wang, Jianchun Xing, Qiliang Yang, Wei Song and Xuewei Zhang

      Article first published online: 29 SEP 2015 | DOI: 10.1002/stvr.1592

      Thumbnail image of graphical abstract

      The paper tackles test case generation problem of Web Service Business Process Execution Language applications based on satisfiability modulo theory solvers. The approach symbolically encodes every test path with several constraints and determines the feasibility of it with the help of satisfiability modulo theory solvers. Furthermore, test cases that correspond to feasible paths are computed to test the path effectively and can avoid instantiating idle instance.

    4. Probabilistic reasoning in diagnosing causes of program failures

      Junjie Xu, Rong Chen and Zhenjun Du

      Article first published online: 19 AUG 2015 | DOI: 10.1002/stvr.1583

      Thumbnail image of graphical abstract

      To accommodate the complexity and uncertainty of fault propagation in real software, this paper presents a novel probabilistic graph model probabilistic cause–effect graph that features bidirectional causality inference from dynamic program dependencies. The experimental results have shown the probabilistic cause–effect graph's outperformance in both single-fault and multiple-fault context, even with similar program runs through loops.

    5. Model-based security testing: a taxonomy and systematic classification

      Michael Felderer, Philipp Zech, Ruth Breu, Matthias Büchler and Alexander Pretschner

      Article first published online: 24 JUL 2015 | DOI: 10.1002/stvr.1580

      Thumbnail image of graphical abstract

      This article provides a taxonomy for model-based security testing approaches that comprises filter and evidence criteria. The taxonomy is based on a comprehensive analysis of existing classification schemes for model-based and security testing. To demonstrate its adequacy, 119 publications on model-based security testing are systematically extracted from relevant digital libraries and classified according to the defined filter and evidence criteria. On the basis of the classified publications, the article provides an overview of the state of the art in model-based security testing and discusses promising research directions.

    6. A lightweight framework for dynamic GUI data verification based on scripts

      Pedro Luis Mateo Navarro, Diego Sevilla Ruiz and Gregorio Martínez Pérez

      Article first published online: 6 MAY 2015 | DOI: 10.1002/stvr.1579

      Thumbnail image of graphical abstract

      Script-basedDAtaVERificationframework(S-DAVER)providesalightweight,easy-to-integrate, dynamic,andautomaticverificationframeworkforGraphicalUserInterfacedata.Allverification processesareencapsulatedinanindependentverificationlayer.Theseprocessesaretransparentto developers.Theverificationrulesarespecifiedinseparatefilesandwrittenusinggeneralpurpose, interpretedlanguages.Rulescanbechanged/reloadedatruntimewithoutrecompilation.Superimposed visualfeedbackisusedtoassistdevelopersduringthetestingstage,aswellastoimproveusers'experience duringexecution.

    7. Automatic fault localization for client-side JavaScript

      Frolin S. Ocariza Jr., Guanpeng Li, Karthik Pattabiraman and Ali Mesbah

      Article first published online: 14 APR 2015 | DOI: 10.1002/stvr.1576

      Thumbnail image of graphical abstract

      This work proposes an approach for automatically localizing Document-Object-Model-related (i.e. DOM-related) JavaScript faults in AJAX-based web applications. The technique has been implemented in a tool called AutoFLox, and it is capable of localizing faults in a wide array of web applications, including minified applications, as well as those using anonymous functions and eval. An evaluation of the proposed approach shows that it is accurate, with a recall of 96% and no false positives, and can localize real bugs from real-world web applications.

  2. Special Issue Papers

    1. Cause reduction: delta debugging, even without bugs

      Alex Groce, Mohammad Amin Alipour, Chaoqiang Zhang, Yang Chen and John Regehr

      Article first published online: 31 MAR 2015 | DOI: 10.1002/stvr.1574

      Thumbnail image of graphical abstract

      This paper presents a generalization of delta debugging (cause reduction) in which test cases are reduced based on an arbitrary property, rather than only with respect to ability to trigger a fault. The graph shows that basing test suites on tests cases that have been reduced with respect to statement coverage can result in much better code coverage for very small regression tests than using unreduced test cases. Cause reduction can also benefit symbolic execution and stress testing.

  3. Research Articles

    1. Anomaly detection in performance regression testing by transaction profile estimation

      Shadi Ghaith, Miao Wang, Philip Perry, Zhen Ming Jiang, Pat O'Sullivan and John Murphy

      Article first published online: 9 MAR 2015 | DOI: 10.1002/stvr.1573

      Thumbnail image of graphical abstract

      We showed how the transaction profile (TP) can be used, via the TP run report, by regression testing teams as an automated way to discover performance regression anomalies. Furthermore, the TP is immune to changes in the load applied to the system, which will save time to repeat runs with the previous release load. Moreover, we proposed a novel way to infer the TP from already available performance data, mainly the resources utilizations and the transaction response times, and the queueing network model of the testing system.


  1. 1 - 9