EQUIVALENCE PARTITIONING AS A BASIS FOR DYNAMIC CONDITIONAL INVARIANT DETECTION

Size: px
Start display at page:

Download "EQUIVALENCE PARTITIONING AS A BASIS FOR DYNAMIC CONDITIONAL INVARIANT DETECTION"

Transcription

1 EQUIVALENCE PARTITIONING AS A BASIS FOR DYNAMIC CONDITIONAL INVARIANT DETECTION Worakarn Isaratham Supervised by Dr Rosemary Monahan July 2015

2 OUTLINE 1. Motivation 2. Background 3. Solution 4. Evaluation 5. Conclusion Worakarn Isaratham 15 June 2015

3 MOTIVATION Worakarn Isaratham 3 15 June 2015

4 Formal Specification Test Suite Software Worakarn Isaratham 1 15 June 2015

5 Detect formal specification by Formal Specification Test Suite observing dynamic test run Software Worakarn Isaratham 1 15 June 2015

6 HOW CAN EQUIVALENCE PARTITIONING ASSIST DYNAMIC DETECTION OF CONDITIONAL INVARIANTS? Worakarn Isaratham 2 15 June 2015

7 BACKGROUND Worakarn Isaratham 7 15 June 2015

8 EQUIVALENCE PARTITIONING Divide input/output domains into equivalence classes, conditional to how data are processed All members of a class are processed in the same way, but different from other classes Worakarn Isaratham 3 15 June 2015

9 DYNAMIC INVARIANT DETECTION Invariants properties of programs that hold true for all executions Dynamic invariants detection detect invariants by observing dynamic execution of the target program. Worakarn Isaratham 4 15 June 2015

10 DAIKON INVARIANT DETECTOR Worakarn Isaratham 5 15 June 2015

11 DAIKON INVARIANT DETECTOR Worakarn Isaratham 5 15 June 2015

12 DAIKON INVARIANT DETECTOR Worakarn Isaratham 5 15 June 2015

13 CONDITIONAL INVARIANTS Invariants in the implication form p q Infeasible to compute exhaustively under dynamic invariant detection Worakarn Isaratham 6 15 June 2015

14 SPLITTERS Worakarn Isaratham 7 15 June 2015

15 SOLUTION Worakarn Isaratham June 2015

16 YACON Worakarn Isaratham 8 15 June 2015

17 YACON Worakarn Isaratham 9 15 June 2015

18 EXTRACTION PHASE Worakarn Isaratham June 2015

19 EXTRACTION PHASE Boundary value recovery strategy Looking for boundary values in test data Test suite invariants recovery strategy Arguments passed to the same method from the same position should be in the same equivalence class Support user-defined strategies Worakarn Isaratham June 2015

20 BOUNDARY VALUE STRATEGY 1. Run Chicory (Daikon s instrumenter for Java) to collect trace data 2. Analyse the trace data for adjacent values 3. Create interval-based partitions Worakarn Isaratham June 2015

21 BOUNDARY VALUE STRATEGY Worakarn Isaratham June 2015

22 TEST SUITE INVARIANTS STRATEGY 1. Proxify the test suite (rewrite source files by creating new method for each invocation on target classes) Target t = new Target(); int i = t.foo( abc, 0); Target t = new Target(); int i = ẎȧċȯṅProxifier.proxify(t).m foo Target 42( abc, 0) Worakarn Isaratham June 2015

23 TEST SUITE INVARIANTS STRATEGY 2. Compile the proxified code 3. Run Daikon on proxified test suite 4. Transform Daikon s result into predicate-based partitions Worakarn Isaratham June 2015

24 TEST SUITE INVARIANTS STRATEGY Worakarn Isaratham June 2015

25 TRANSLATION PHASE Worakarn Isaratham June 2015

26 TRANSLATION PHASE 1. Read partitioning files 2. Convert partitions into splitting conditions Worakarn Isaratham June 2015

27 EVALUATION Worakarn Isaratham June 2015

28 EVALUATION Partitioning Recovery Effectiveness Invariants Discovery Effectiveness Performance (runtime) Worakarn Isaratham June 2015

29 RECOVERY EFFECTIVENESS Compare generated partitions against expected Measure best-matched distance of each domain d(c 1,C 2 )= n i=1 min δ(s i,s j=1..m j)+ Worakarn Isaratham June 2015 m j=1 min i=1..n δ(s j,s i ) 0, S i = S j δ(s i,s j )= w s, S i S j S j S i 1, 1

30 RECOVERY EFFECTIVENESS Calculate overall effectiveness of the generated partitions =1 2 ( 1 1 Worakarn Isaratham June 2015

31 RECOVERY EFFECTIVENESS Worakarn Isaratham June 2015

32 INVARIANTS DISCOVERY EFFECTIVENESS Measure the effect of using Yacon by comparing generated invariants from (1) Daikon (2) Daikon+Yacon (3) Daikon+Expected Partition Measure quality metrics Worakarn Isaratham June 2015

33 INVARIANTS DISCOVERY EFFECTIVENESS Assess quality of each invariant Correctness is it true for all conceivable inputs? Usefulness can it help programmers in some ways? Relevance is it a characteristic of this program? Worakarn Isaratham June 2015

34 INVARIANTS DISCOVERY EFFECTIVENESS Assess quality of partitioning Correctness correct invariants / reported invariants Usefulness useful invariants / reported invariants Precision relevant invariants / reported invariants Recall relevant invariants / expectation Worakarn Isaratham June 2015

35 INVARIANTS DISCOVERY EFFECTIVENESS Precision Worakarn Isaratham June 2015

36 INVARIANTS DISCOVERY EFFECTIVENESS Recall Worakarn Isaratham June 2015

37 INVARIANTS DISCOVERY EFFECTIVENESS Worakarn Isaratham June 2015

38 PERFORMANCE Worakarn Isaratham June 2015

39 THREATS TO VALIDITY Small sample size 7 programs, 11 test suites Small programs textbook programs less than 250 lines of code Selection bias some programs are selected because they have desired characteristics Subjectivity of invariants assessment Test suite construction bias test suites written to fit how Yacon works Worakarn Isaratham June 2015

40 CONCLUSION Worakarn Isaratham June 2015

41 CONCLUSION Information from equivalence partitioning can be effective in uncovering conditional invariants. Our recovery strategies work better together than individually. The recovery strategies are only effective in limited circumstances The solution increases recall metric, at the expense of overall quality of generated invariants Worakarn Isaratham June 2015

42 FUTURE WORK Find more effective partitioning recovery strategies. Automatic invariants assessment to overcome the subjectivity in invariants evaluation and to work at larger scale. Compare Yacon against other ways of generating splitting conditions. Adapt Yacon to other invariant detectors. Worakarn Isaratham June 2015

43 THANK YOU 43

44 44

45 (BACKUP)

46 EQUIVALENCE PARTITIONING [it] is a technique that is intuitively used by virtually every tester we've ever met. Rick D Craig and Stefan P Jaskiel. Systematic software testing. Artech House, 2002

47 INVARIANTS Includes Class invariants Method preconditions Method postconditions NOT INCLUDE LOOP INVARIANTS

48 SPLITTING POLICIES Default Procedure Return Analysis Shipped with Daikon Static Analysis (for IF, FOR, WHILE statements) Cluster Analysis Random Sampling

49 PROGRAM SIZE 49

50 PROGRAM SELECTION All are from textbooks StackAr, QueueAr are stack and queue data structures, often used as benchmark programs for Daikon BinaryHeap, BinarySearchTree Built-in test suites Worakarn Isaratham June 2015

51 PROGRAM SELECTION Earthquake, ComputeTax, Insurance Suitable structure for equivalence partitioning No built-in test suites Worakarn Isaratham June 2015

52 TESTING Worakarn Isaratham June 2015

53 Yacon Daikon Celeriac 53 Chicory

Automatic Generation of Program Specifications

Automatic Generation of Program Specifications Automatic Generation of Program Specifications Jeremy Nimmer MIT Lab for Computer Science http://pag.lcs.mit.edu/ Joint work with Michael Ernst Jeremy Nimmer, page 1 Synopsis Specifications are useful

More information

DySy: Dynamic Symbolic Execution for Invariant Inference

DySy: Dynamic Symbolic Execution for Invariant Inference DySy: Dynamic Symbolic Execution for Invariant Inference C. Csallner N. Tillmann Y. Smaragdakis Marc Egg Invariant Inference Object top() { if(empty) return null; return thearray[topofstack]; Invariant

More information

Mutually Enhancing Test Generation and Specification Inference

Mutually Enhancing Test Generation and Specification Inference Mutually Enhancing Test Generation and Specification Inference Tao Xie David Notkin Department of Computer Science & Engineering University of Washington August 15th, 2003 Foundations of Software Engineering,

More information

a correct statement? You need to know what the statement is supposed to do.

a correct statement? You need to know what the statement is supposed to do. Using assertions for correctness How can we know that software is correct? It is only correct if it does what it is supposed to do. But how do we know what it is supposed to do? We need a specification.

More information

Tool-Assisted Unit Test Selection Based on Operational Violations

Tool-Assisted Unit Test Selection Based on Operational Violations Nominated for the best paper award at ASE 2003. Appears in Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE 2003) An extended version is invited for submission

More information

IDE for medical device software development. Hyun-Do Lee, Field Application Engineer

IDE for medical device software development. Hyun-Do Lee, Field Application Engineer IDE for medical device software development Hyun-Do Lee, Field Application Engineer Agenda SW Validation Functional safety certified tool IAR Embedded Workbench Code Analysis tools SW Validation Certifications

More information

Lab 5 : WordAnalyzer class

Lab 5 : WordAnalyzer class Lab 5 : WordAnalyzer class Introduction READ THE INSTRUCTIONS FIRST! The WordAnalyzer class was written to perform a few different analyses of words: - identify the first repeated (adjacent) character

More information

17. Assertions. Outline. Built-in tests. Built-in tests 3/29/11. Jelle Slowack, Bart Smets, Glenn Van Loon, Tom Verheyen

17. Assertions. Outline. Built-in tests. Built-in tests 3/29/11. Jelle Slowack, Bart Smets, Glenn Van Loon, Tom Verheyen 17. Assertions Jelle Slowack, Bart Smets, Glenn Van Loon, Tom Verheyen Outline Introduction (BIT, assertion, executable assertion, why?) Implementation-based vs responsability-based assertions Implementation

More information

17. Assertions. Jelle Slowack, Bart Smets, Glenn Van Loon, Tom Verheyen

17. Assertions. Jelle Slowack, Bart Smets, Glenn Van Loon, Tom Verheyen 17. Assertions Jelle Slowack, Bart Smets, Glenn Van Loon, Tom Verheyen Outline Introduction (BIT, assertion, executable assertion, why?) Implementation-based vs responsability-based assertions Implementation

More information

Automatic Recovery from Runtime Failures. presenter name(s) removed for FERPA considerations

Automatic Recovery from Runtime Failures. presenter name(s) removed for FERPA considerations Automatic Recovery from Runtime Failures presenter name(s) removed for FERPA considerations Key Idea Use automatic recovery tools to generate alternative ways to achieve the same functionality of code

More information

Program Verification using Templates over Predicate Abstraction. Saurabh Srivastava and Sumit Gulwani

Program Verification using Templates over Predicate Abstraction. Saurabh Srivastava and Sumit Gulwani Program Verification using Templates over Predicate Abstraction Saurabh Srivastava and Sumit Gulwani ArrayInit(Array A, int n) i := 0; while (i < n) A[i] := 0; i := i + 1; Assert( j: 0 j

More information

Readability [Skrien 4.0] Programs must be written for people to read, and only incidentally for machines to execute.

Readability [Skrien 4.0] Programs must be written for people to read, and only incidentally for machines to execute. Readability [Skrien 4.0] Programs must be written for people to read, and only incidentally for machines to execute. Abelson & Sussman Use a good set of coding conventions, such as the ones given in the

More information

An Empirical Comparison of Automated Generation and Classification Techniques for Object-Oriented Unit Testing

An Empirical Comparison of Automated Generation and Classification Techniques for Object-Oriented Unit Testing An Empirical Comparison of Automated Generation and Classification Techniques for Object-Oriented Unit Testing Marcelo d Amorim (UIUC) Carlos Pacheco (MIT) Tao Xie (NCSU) Darko Marinov (UIUC) Michael D.

More information

Runtime Checking for Program Verification Systems

Runtime Checking for Program Verification Systems Runtime Checking for Program Verification Systems Karen Zee, Viktor Kuncak, and Martin Rinard MIT CSAIL Tuesday, March 13, 2007 Workshop on Runtime Verification 1 Background Jahob program verification

More information

Contract Inserter Developer Manual

Contract Inserter Developer Manual 1 Contract Inserter Developer Manual Table of Contents Source Control... 2 Debugging and Running Locally... 2 System Architecture... 2 Overview... 2 Visual Studio Add-ins... 3 Contract Generation... 3

More information

CSC Advanced Object Oriented Programming, Spring Specification

CSC Advanced Object Oriented Programming, Spring Specification CSC 520 - Advanced Object Oriented Programming, Spring 2018 Specification Specification A specification is an unambiguous description of the way the components of the software system should be used and

More information

Interprocedural Dataflow Analysis. Galeotti/Gorla/Rau Saarland University

Interprocedural Dataflow Analysis. Galeotti/Gorla/Rau Saarland University Interprocedural Dataflow Analysis Galeotti/Gorla/Rau Saarland University int divbyx(int x) { [result := 10/x] 1 ; void caller1() { [x := 5] 1 ; [y := divbyx(x)] 2 ; [y := divbyx(5)] 3 ; [y := divbyx(1)]

More information

Guiding Semi-Supervision with Constraint-Driven Learning

Guiding Semi-Supervision with Constraint-Driven Learning Guiding Semi-Supervision with Constraint-Driven Learning Ming-Wei Chang 1 Lev Ratinov 2 Dan Roth 3 1 Department of Computer Science University of Illinois at Urbana-Champaign Paper presentation by: Drew

More information

Selecting, Refining, and Evaluating Predicates for Program Analysis

Selecting, Refining, and Evaluating Predicates for Program Analysis Selecting, Refining, and Evaluating Predicates for Analysis Nii Dodoo Lee Lin Michael D. Ernst Technical Report MIT-LCS-TR-914 July 21, 2003 MIT Lab for Computer Science 200 Technology Square Cambridge,

More information

Outline. Computer Science 331. Three Classical Algorithms. The Sorting Problem. Classical Sorting Algorithms. Mike Jacobson. Description Analysis

Outline. Computer Science 331. Three Classical Algorithms. The Sorting Problem. Classical Sorting Algorithms. Mike Jacobson. Description Analysis Outline Computer Science 331 Classical Sorting Algorithms Mike Jacobson Department of Computer Science University of Calgary Lecture #22 1 Introduction 2 3 4 5 Comparisons Mike Jacobson (University of

More information

Outline. software testing: search bugs black-box and white-box testing static and dynamic testing

Outline. software testing: search bugs black-box and white-box testing static and dynamic testing Outline 1 Verification Techniques software testing: search bugs black-box and white-box testing static and dynamic testing 2 Programming by Contract assert statements in Python using preconditions and

More information

Protection Levels and Constructors The 'const' Keyword

Protection Levels and Constructors The 'const' Keyword Protection Levels and Constructors The 'const' Keyword Review: const Keyword Generally, the keyword const is applied to an identifier (variable) by a programmer to express an intent that the identifier

More information

Verification and Validation

Verification and Validation Chapter 5 Verification and Validation Chapter Revision History Revision 0 Revision 1 Revision 2 Revision 3 Revision 4 original 94/03/23 by Fred Popowich modified 94/11/09 by Fred Popowich reorganization

More information

Higher-order Testing. Stuart Anderson. Stuart Anderson Higher-order Testing c 2011

Higher-order Testing. Stuart Anderson. Stuart Anderson Higher-order Testing c 2011 Higher-order Testing Stuart Anderson Defining Higher Order Tests 1 The V-Model V-Model Stages Meyers version of the V-model has a number of stages that relate to distinct testing phases all of which are

More information

Certified Software Tester (CSTE) 123

Certified Software Tester (CSTE) 123 Certified Software Tester (CSTE) 123 SECTOR / INFORMATION TECHNOLOGY TECHNICAL & CERTIFIED TRAINING COURSE In this course, students will describe the various testing principles and concepts with a special

More information

Assertions, pre/postconditions

Assertions, pre/postconditions Programming as a contract Assertions, pre/postconditions Assertions: Section 4.2 in Savitch (p. 239) Specifying what each method does q Specify it in a comment before method's header Precondition q What

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Data Mining by I. H. Witten and E. Frank 7 Engineering the input and output Attribute selection Scheme-independent, scheme-specific Attribute discretization Unsupervised, supervised, error-

More information

Christoph Csallner, University of Texas at Arlington (UTA)

Christoph Csallner, University of Texas at Arlington (UTA) Christoph Csallner, University of Texas at Arlington (UTA) Joint work with: Nikolai Tillmann (MSR), Yannis Smaragdakis (UMass), Ishtiaque Hussain (UTA), Chengkai Li (UTA) Dynamic symbolic execution Pioneered

More information

Part I: Preliminaries 24

Part I: Preliminaries 24 Contents Preface......................................... 15 Acknowledgements................................... 22 Part I: Preliminaries 24 1. Basics of Software Testing 25 1.1. Humans, errors, and testing.............................

More information

Compiler Design Spring 2017

Compiler Design Spring 2017 Compiler Design Spring 2017 7.5 Method invocation Dr. Zoltán Majó Compiler Group Java HotSpot Virtual Machine Oracle Corporation 1 Admin issues There will be a recitation session today In CAB G 11 @ 15:15

More information

Black Box Testing. EEC 521: Software Engineering. Specification-Based Testing. No Source Code. Software Testing

Black Box Testing. EEC 521: Software Engineering. Specification-Based Testing. No Source Code. Software Testing Black Box Testing EEC 521: Software Engineering Software Testing Black-Box Testing Test-Driven Development Also known as specification-based testing Tester has access only to running code and the specification

More information

Input Space Partitioning

Input Space Partitioning CMPT 473 Software Quality Assurance Input Space Partitioning Nick Sumner Recall Testing involves running software and comparing observed behavior against expected behavior Select an input, look at the

More information

CYSE 411/AIT 681 Secure Software Engineering Topic #14. Program Analysis

CYSE 411/AIT 681 Secure Software Engineering Topic #14. Program Analysis CYSE 411/AIT 681 Secure Software Engineering Topic #14. Program Analysis Instructor: Dr. Kun Sun Program Analysis The process of automatically analyzing the behavior of computer programs regarding a property

More information

Self-checking software insert specifications about the intent of a system

Self-checking software insert specifications about the intent of a system Assertions Reading assignment A. J. Offutt, A Practical System for Mutation Testing: Help for the Common Programmer, Proceedings of the 12th International Conference on Testing Computer Software, Washington,

More information

Course Wrap-Up. Software Testing and Verification. Stephen M. Thebaut, Ph.D. Prepared by. University of Florida

Course Wrap-Up. Software Testing and Verification. Stephen M. Thebaut, Ph.D. Prepared by. University of Florida Course Wrap-Up Software Testing and Verification Prepared by Stephen M. Thebaut, Ph.D. University of Florida A few loose ends Final Exam + solution notes will be posted (under Practice Exams ) ASAP probably

More information

ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS

ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS ABSTRACT Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may

More information

Reproducing Crashes. Shifting Role of Testing. Shifting Role of Testing. Waterfall Model, V-Model

Reproducing Crashes. Shifting Role of Testing. Shifting Role of Testing. Waterfall Model, V-Model Reproducing Crashes Andreas Leitner Universität des Saarlandes 11.12.2008 1 Shifting Role of ing ing often ne towards release-time Modern development processes move testing to the center of development

More information

SIR C R REDDY COLLEGE OF ENGINEERING

SIR C R REDDY COLLEGE OF ENGINEERING SIR C R REDDY COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY Course Outcomes II YEAR 1 st SEMESTER Subject: Data Structures (CSE 2.1.1) 1. Describe how arrays, records, linked structures,

More information

Searching for Program Invariants using Genetic Programming and Mutation Testing

Searching for Program Invariants using Genetic Programming and Mutation Testing Searching for Program Invariants using Genetic Programming and Mutation Testing Sam Ratcliff, David R. White and John A. Clark. The 13th CREST Open Workshop Thursday 12 May 2011 Outline Invariants Using

More information

An Eclipse Plug-in for Model Checking

An Eclipse Plug-in for Model Checking An Eclipse Plug-in for Model Checking Dirk Beyer, Thomas A. Henzinger, Ranjit Jhala Electrical Engineering and Computer Sciences University of California, Berkeley, USA Rupak Majumdar Computer Science

More information

An Approach to Behavioral Subtyping Based on Static Analysis

An Approach to Behavioral Subtyping Based on Static Analysis TACoS 04 Preliminary Version An Approach to Behavioral Subtyping Based on Static Analysis Francesco Logozzo 1 STIX - École Polytechnique F-91128 Palaiseau, France Abstract In mainstream object oriented

More information

Chapter 3 (part 3) Describing Syntax and Semantics

Chapter 3 (part 3) Describing Syntax and Semantics Chapter 3 (part 3) Describing Syntax and Semantics Chapter 3 Topics Introduction The General Problem of Describing Syntax Formal Methods of Describing Syntax Attribute Grammars Describing the Meanings

More information

Finding and Fixing Bugs in Liquid Haskell. Anish Tondwalkar

Finding and Fixing Bugs in Liquid Haskell. Anish Tondwalkar Finding and Fixing Bugs in Liquid Haskell Anish Tondwalkar Overview Motivation Liquid Haskell Fault Localization Fault Localization Evaluation Predicate Discovery Predicate Discovery Evaluation Conclusion

More information

Part 5. Verification and Validation

Part 5. Verification and Validation Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this

More information

Static program checking and verification

Static program checking and verification Chair of Software Engineering Software Engineering Prof. Dr. Bertrand Meyer March 2007 June 2007 Slides: Based on KSE06 With kind permission of Peter Müller Static program checking and verification Correctness

More information

Software Development. Modular Design and Algorithm Analysis

Software Development. Modular Design and Algorithm Analysis Software Development Modular Design and Algorithm Analysis Precondition and Postcondition To create a good algorithm, a programmer must be able to analyse a precondition (starting state) and a postcondition

More information

Automated Documentation Inference to Explain Failed Tests

Automated Documentation Inference to Explain Failed Tests Automated Documentation Inference to Explain Failed Tests Sai Zhang University of Washington Joint work with: Cheng Zhang, Michael D. Ernst A failed test reveals a potential bug Before bug-fixing, programmers

More information

An Object Oriented Runtime Complexity Metric based on Iterative Decision Points

An Object Oriented Runtime Complexity Metric based on Iterative Decision Points An Object Oriented Runtime Complexity Metric based on Iterative Amr F. Desouky 1, Letha H. Etzkorn 2 1 Computer Science Department, University of Alabama in Huntsville, Huntsville, AL, USA 2 Computer Science

More information

Context Free Grammars, Parsing, and Amibuity. CS154 Chris Pollett Feb 28, 2007.

Context Free Grammars, Parsing, and Amibuity. CS154 Chris Pollett Feb 28, 2007. Context Free Grammars, Parsing, and Amibuity CS154 Chris Pollett Feb 28, 2007. Outline JFLAP Intuitions about Compiler Ambiguity Left and Rightmost Derivations Brute Force Parsing JFLAP and the Pumping

More information

Automated Debugging of Programs with Contracts

Automated Debugging of Programs with Contracts Automated Debugging of Programs with Contracts Yi Wei Yu Pei Carlo A. Furia Lucas S. Silva Stefan Buchholz Bertrand Meyer Andreas Zeller Chair of Software Engineering, ETH Zürich Zürich, Switzerland {yi.wei,

More information

2/3/2018 CS313D: ADVANCED PROGRAMMING LANGUAGE. Lecture 3: C# language basics II. Lecture Contents. C# basics. Methods Arrays. Dr. Amal Khalifa, Spr17

2/3/2018 CS313D: ADVANCED PROGRAMMING LANGUAGE. Lecture 3: C# language basics II. Lecture Contents. C# basics. Methods Arrays. Dr. Amal Khalifa, Spr17 CS313D: ADVANCED PROGRAMMING LANGUAGE Lecture 3: C# language basics II Lecture Contents 2 C# basics Methods Arrays 1 Methods : Method Declaration: Header 3 A method declaration begins with a method header

More information

MACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS

MACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS MACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS N. Kannadhasan and B. Uma Maheswari Department of Master of Computer Applications St. Joseph s College of Engineering, Chennai,

More information

Seminar in Software Engineering. DySy. Dynamic Symbolic Execution for Invariant Inference. April 28th Lukas Schwab

Seminar in Software Engineering. DySy. Dynamic Symbolic Execution for Invariant Inference. April 28th Lukas Schwab Seminar in Software Engineering DySy Dynamic Symbolic Execution for Invariant Inference April 28th 2009 Lukas Schwab lschwab@student.ethz.ch The authors Christoph Csallner - College of Computing, Georgia

More information

Testing of Java Web Services for Robustness. Chen Fu, Ana Milanova, David Wonnacott, Barbara Ryder

Testing of Java Web Services for Robustness. Chen Fu, Ana Milanova, David Wonnacott, Barbara Ryder Testing of Java Web Services for Robustness Chen Fu, Ana Milanova, David Wonnacott, Barbara Ryder Availability of Internet Services Internet Service: New Kid in 24x7 domain v Public Telephone System: 99.999%

More information

Automatic Generation of Program Specifications

Automatic Generation of Program Specifications Automatic Generation of Program Specifications Jeremy W. Nimmer and Michael D. Ernst MIT Lab for Computer Science 200 Technology Square Cambridge, MA 02139 USA {jwnimmer,mernst}@lcs.mit.edu Abstract Producing

More information

CSE 227 Computer Security Spring 2010 S f o t ftware D f e enses I Ste St f e an f Sa v Sa a v g a e g

CSE 227 Computer Security Spring 2010 S f o t ftware D f e enses I Ste St f e an f Sa v Sa a v g a e g CSE 227 Computer Security Spring 2010 Software Df Defenses I Stefan Savage Kinds of defenses Eliminate violation of runtime model Better languages, code analysis Don t allow bad input Input validation

More information

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification and Validation 1 Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V & V To

More information

Chapter 4 Defining Classes I

Chapter 4 Defining Classes I Chapter 4 Defining Classes I This chapter introduces the idea that students can create their own classes and therefore their own objects. Introduced is the idea of methods and instance variables as the

More information

CS 6V Program Analysis I: Dynamic Detection of Likely Invariants and Robust Signatures for Kernel Data Structure.

CS 6V Program Analysis I: Dynamic Detection of Likely Invariants and Robust Signatures for Kernel Data Structure. CS 6V81-05 Program Analysis I: Dynamic Detection of Likely Invariants and Robust Signatures for Kernel Data Structure Junyuan Zeng Department of Computer Science The University of Texas at Dallas November

More information

Program Verification (6EC version only)

Program Verification (6EC version only) Program Verification (6EC version only) Erik Poll Digital Security Radboud University Nijmegen Overview Program Verification using Verification Condition Generators JML a formal specification language

More information

Locating Faults Through Automated Predicate Switching

Locating Faults Through Automated Predicate Switching Locating Faults Through Automated Predicate Switching Authored by Xiangyu Zhang, Neelam Gupta, Rajiv Gupta The University of Arizona ICSE 2006 Presented by Jing Pu Authors 1 Neelam Gupta The University

More information

CSE 15L Midterm Summer 2011

CSE 15L Midterm Summer 2011 Signature cs15u Name Student ID CSE 15L Midterm Summer 2011 Page 1 (17 points) Page 2 (6 points) Page 3 (11 points) Page 4 (8 points) Page 5 (15 points) Page 6 (12 points) Total (69 points = 65 base points

More information

Software Testing. Overview

Software Testing. Overview Software Testing Overview Software is NOT simply programming! Complex development process required Domain of Software Engineering Top Down software development popular The WaterFall model... November 28,

More information

CS 451 Software Engineering Winter 2009

CS 451 Software Engineering Winter 2009 CS 451 Software Engineering Winter 2009 Yuanfang Cai Room 104, University Crossings 215.895.0298 yfcai@cs.drexel.edu 1 Software Testing Techniques FUNDAMENTALS The goal of testing is to find errors. A

More information

Improving Test Suites via Operational Abstraction

Improving Test Suites via Operational Abstraction Improving Test Suites via Operational Abstraction Michael Ernst MIT Lab for Computer Science http://pag.lcs.mit.edu/~mernst/ Joint work with Michael Harder, Jeff Mellen, and Benjamin Morse Michael Ernst,

More information

CSSE463: Image Recognition Day 21

CSSE463: Image Recognition Day 21 CSSE463: Image Recognition Day 21 Sunset detector due. Foundations of Image Recognition completed This wee: K-means: a method of Image segmentation Questions? An image to segment Segmentation The process

More information

LINEAR INSERTION SORT

LINEAR INSERTION SORT LINEAR INSERTION SORT Textbook (pages 95 03) The term insertion sort refers to an entire category of sorting algorithms which work by successively taking each item in the array and finding its proper position.

More information

3/18/18. Program Analysis. CYSE 411/AIT 681 Secure Software Engineering. Learning Goal. Program Analysis on Security. Why Program Representations

3/18/18. Program Analysis. CYSE 411/AIT 681 Secure Software Engineering. Learning Goal. Program Analysis on Security. Why Program Representations Program Analysis CYSE 411/AIT 681 Secure Software Engineering Topic #14. Program Analysis Instructor: Dr. Kun Sun The process of automatically analyzing the behavior of computer programs regarding a property

More information

Selecting Predicates for Implications in Program Analysis

Selecting Predicates for Implications in Program Analysis Selecting Predicates for Implications in Program Analysis Nii Dodoo Alan Donovan Lee Lin Michael D. Ernst MIT Lab for Computer Science 200 Technology Square Cambridge, MA 02139 USA {dodoo,adonovan,leelin,mernst}@lcs.mit.edu

More information

A Scalable Mixed-Level Approach to Dynamic Analysis of C and C++ Programs

A Scalable Mixed-Level Approach to Dynamic Analysis of C and C++ Programs A Scalable Mixed-Level Approach to Dynamic Analysis of C and C++ Programs Master of Engineering Thesis Proposal Philip J. Guo May 16, 2005 Abstract Source-level and binary-level dynamic program analyses

More information

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems Robert Grimm University of Washington Extensions Added to running system Interact through low-latency interfaces Form

More information

G Programming Languages - Fall 2012

G Programming Languages - Fall 2012 G22.2110-003 Programming Languages - Fall 2012 Lecture 4 Thomas Wies New York University Review Last week Control Structures Selection Loops Adding Invariants Outline Subprograms Calling Sequences Parameter

More information

CS111: PROGRAMMING LANGUAGE II

CS111: PROGRAMMING LANGUAGE II CS111: PROGRAMMING LANGUAGE II Computer Science Department Lecture 1(c): Java Basics (II) Lecture Contents Java basics (part II) Conditions Loops Methods Conditions & Branching Conditional Statements A

More information

CS553 Lecture Dynamic Optimizations 2

CS553 Lecture Dynamic Optimizations 2 Dynamic Optimizations Last time Predication and speculation Today Dynamic compilation CS553 Lecture Dynamic Optimizations 2 Motivation Limitations of static analysis Programs can have values and invariants

More information

Semantic Interconnection Models & Inscape. Unit Interconnection Model. Example Uses of Unit IM

Semantic Interconnection Models & Inscape. Unit Interconnection Model. Example Uses of Unit IM Architecture and Design Intent Semantic Interconnection Models & Inscape Dewayne E Perry ENS 623A Office Hours: T/Th 11:00-12:00 perry @ ece.utexas.edu www.ece.utexas.edu/~perry/education/382v-s06/ Lecture

More information

Refinement Types for TypeScript

Refinement Types for TypeScript Refinement Types for TypeScript Panagiotis Vekris Benjamin Cosman Ranjit Jhala University of California, San Diego PLDI 16 Thursday, June 16 Extensible static analyses for modern scripting languages 2

More information

Semantic Analysis. CSE 307 Principles of Programming Languages Stony Brook University

Semantic Analysis. CSE 307 Principles of Programming Languages Stony Brook University Semantic Analysis CSE 307 Principles of Programming Languages Stony Brook University http://www.cs.stonybrook.edu/~cse307 1 Role of Semantic Analysis Syntax vs. Semantics: syntax concerns the form of a

More information

4B Summary of some Key SW Testing Concepts 1

4B Summary of some Key SW Testing Concepts 1 4B Summary of some Key SW Testing Concepts 1 Note: Section 4A presented a particular, specific method for developing (system or requirements level) tests cases from UML use cases. Section 4B provides a

More information

A Class-Level Unit Testing Tool for Java

A Class-Level Unit Testing Tool for Java A Class-Level Unit Testing Tool for Java Tz-Fan Hu and Nai-Wei Lin Department of Computer Science and Information Engineering National Chung Cheng University Chiayi 621, Taiwan, R.O.C. Email: {htf97m,naiwei}@cs.ccu.edu.tw

More information

Method-Level Phase Behavior in Java Workloads

Method-Level Phase Behavior in Java Workloads Method-Level Phase Behavior in Java Workloads Andy Georges, Dries Buytaert, Lieven Eeckhout and Koen De Bosschere Ghent University Presented by Bruno Dufour dufour@cs.rutgers.edu Rutgers University DCS

More information

COMP 110/401 DOCUMENTATION: ASSERTIONS. Instructor: Prasun Dewan

COMP 110/401 DOCUMENTATION: ASSERTIONS. Instructor: Prasun Dewan COMP 110/401 DOCUMENTATION: ASSERTIONS Instructor: Prasun Dewan PREREQUISITE Documentation Annotations 2 INVALID BMI public double getbmi() { return weight/(height*height); getbmi() should really not have

More information

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification and Validation Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification vs validation Verification: "Are we building the product right?. The software should

More information

1) What is the primary purpose of template functions? 2) Suppose bag is a template class, what is the syntax for declaring a bag b of integers?

1) What is the primary purpose of template functions? 2) Suppose bag is a template class, what is the syntax for declaring a bag b of integers? Review for Final (Chapter 6 13, 15) 6. Template functions & classes 1) What is the primary purpose of template functions? A. To allow a single function to be used with varying types of arguments B. To

More information

CIRM - Dynamic Error Detection

CIRM - Dynamic Error Detection CIRM - Dynamic Error Detection Peter Pirkelbauer Center for Applied Scientific Computing (CASC) Lawrence Livermore National Laboratory This work was funded by the Department of Defense and used elements

More information

Input Space Partitioning

Input Space Partitioning CMPT 473 Software Quality Assurance Input Space Partitioning Nick Sumner - Fall 2014 With material from Patrick Lam, Jeff Offutt Recall Testing involves running software and comparing observed behavior

More information

DEPARTMENT OF COMPUTER SCIENCE

DEPARTMENT OF COMPUTER SCIENCE Department of Computer Science 1 DEPARTMENT OF COMPUTER SCIENCE Office in Computer Science Building, Room 279 (970) 491-5792 cs.colostate.edu (http://www.cs.colostate.edu) Professor L. Darrell Whitley,

More information

Spark verification features

Spark verification features Spark verification features Paul Jackson School of Informatics University of Edinburgh Formal Verification Spring 2018 Adding specification information to programs Verification concerns checking whether

More information

Runtime Checking and Test Case Generation for Python

Runtime Checking and Test Case Generation for Python Runtime Checking and Test Case Generation for Python Anna Durrer Master Thesis Chair of Programming Methodology D-INFK ETH Supervisor: Marco Eilers, Prof. Peter Müller 24. Mai 2017 1 Introduction This

More information

Darshan Institute of Engineering & Technology Unit : 9

Darshan Institute of Engineering & Technology Unit : 9 1) Explain software testing strategy for conventional software architecture. Draw the spiral diagram showing testing strategies with phases of software development. Software Testing: Once source code has

More information

When Brunel s ship the SS Great Britain was launched into the River Thames, it made such a splash that several spectators on the opposite bank were

When Brunel s ship the SS Great Britain was launched into the River Thames, it made such a splash that several spectators on the opposite bank were C. A. R. Hoare Emeritus Professor of Computing at the University of Oxford and is now a senior researcher at Microsoft Research in Cambridge, England. He received the 1980 ACM Turing Award for his fundamental

More information

Lecture 10 Design by Contract

Lecture 10 Design by Contract CS 5959 Writing Solid Code Fall 2015 Nov-23 Lecture 10 Design by Contract Zvonimir Rakamarić University of Utah Design by Contract Also called assume-guarantee reasoning Developers annotate software components

More information

Exploiting Synergy Between Testing and Inferred Partial Specifications

Exploiting Synergy Between Testing and Inferred Partial Specifications Exploiting Synergy Between Testing and Inferred Partial Specifications Tao Xie David Notkin Department of Computer Science & Engineering, University of Washington {taoxie, notkin}@cs.washington.edu Technical

More information

Code Contracts in C#

Code Contracts in C# Code Contracts in C# Hans-Wolfgang Loidl School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh Semester 1 2018/19 H-W. Loidl (Heriot-Watt Univ) F20SC/F21SC

More information

Application Profiling using Solaris DTrace

Application Profiling using Solaris DTrace Application Profiling using Solaris DTrace Alexey A. Romanenko Sun Campus Ambassador Solaris 10 Dynamic Tracing (DTrace) Solaris Containers Predictive Self-Healing Secure Execution 188 Open Source Apps

More information

ENG 8801/ Special Topics in Computer Engineering: Pattern Recognition. Memorial University of Newfoundland Pattern Recognition

ENG 8801/ Special Topics in Computer Engineering: Pattern Recognition. Memorial University of Newfoundland Pattern Recognition Memorial University of Newfoundland Pattern Recognition Lecture 15, June 29, 2006 http://www.engr.mun.ca/~charlesr Office Hours: Tuesdays & Thursdays 8:30-9:30 PM EN-3026 July 2006 Sunday Monday Tuesday

More information

Lecture 5: Methods CS2301

Lecture 5: Methods CS2301 Lecture 5: Methods NADA ALZAHRANI CS2301 1 Opening Problem Find the sum of integers from 1 to 10, from 20 to 30, and from 35 to 45, respectively. 2 Solution public static int sum(int i1, int i2) { int

More information

The JML Tool. Faculty of Engineering Pontificia Universidad Javeriana. The JML Tool p.1/23

The JML Tool. Faculty of Engineering Pontificia Universidad Javeriana. The JML Tool p.1/23 The JML Tool Néstor Cataño ncatano@puj.edu.co Faculty of Engineering Pontificia Universidad Javeriana The JML Tool p.1/23 Tools for JML 1. Parsing and type-checking 2. Checking assertions at runtime 3.

More information

Machine Learning Feature Creation and Selection

Machine Learning Feature Creation and Selection Machine Learning Feature Creation and Selection Jeff Howbert Introduction to Machine Learning Winter 2012 1 Feature creation Well-conceived new features can sometimes capture the important information

More information

Chapter 9. Software Testing

Chapter 9. Software Testing Chapter 9. Software Testing Table of Contents Objectives... 1 Introduction to software testing... 1 The testers... 2 The developers... 2 An independent testing team... 2 The customer... 2 Principles of

More information

No Source Code. EEC 521: Software Engineering. Specification-Based Testing. Advantages

No Source Code. EEC 521: Software Engineering. Specification-Based Testing. Advantages No Source Code : Software Testing Black-Box Testing Test-Driven Development No access to source code So test cases don t worry about structure Emphasis is only on ensuring that the contract is met Specification-Based

More information