Fuzzing for CPS Mutation Testing

被引:0
|
作者
Lee, Jaekwon [1 ,2 ]
Vigano, Enrico [1 ]
Cornejo, Oscar [1 ]
Pastore, Fabrizio [1 ]
Briand, Lionel [1 ,2 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
[2] Univ Ottawa, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Mutation testing; Fuzzing; Test data generation; GENERATION;
D O I
10.1109/ASE56229.2023.00079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mutation testing can help reduce the risks of releasing faulty software. For such reason, it is a desired practice for the development of embedded software running in safety-critical cyber-physical systems (CPS). Unfortunately, state-of-the-art test data generation techniques for mutation testing of C and C++ software, two typical languages for CPS software, rely on symbolic execution, whose limitations often prevent its application (e.g., it cannot test black-box components). We propose a mutation testing approach that leverages fuzz testing, which has proved effective with C and C++ software. Fuzz testing automatically generates diverse test inputs that exercise program branches in a varied number of ways and, therefore, exercise statements in different program states, thus maximizing the likelihood of killing mutants, our objective. We performed an empirical assessment of our approach with software components used in satellite systems currently in orbit. Our empirical evaluation shows that mutation testing based on fuzz testing kills a significantly higher proportion of live mutants than symbolic execution (i.e., up to an additional 47 percentage points). Further, when symbolic execution cannot be applied, fuzz testing provides significant benefits (i.e., up to 41% mutants killed). Our study is the first one comparing fuzz testing and symbolic execution for mutation testing; our results provide guidance towards the development of fuzz testing tools dedicated to mutation testing.
引用
收藏
页码:1377 / 1389
页数:13
相关论文
共 50 条
  • [1] Guiding Greybox Fuzzing with Mutation Testing
    Carnegie Mellon University, Pittsburgh
    PA, United States
    不详
    PA, United States
    不详
    MN, United States
    不详
    NY, United States
    ISSTA - Proc. ACM SIGSOFT Int. Symp. Softw. Test. Anal., 1600, (929-941):
  • [2] Guiding Greybox Fuzzing with Mutation Testing
    Vikram, Vasudev
    Laybourn, Isabella
    Li, Ao
    Nair, Nicole
    OBrien, Kelton
    Sanna, Rafaello
    Padhye, Rohan
    PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 929 - 941
  • [3] MOTIF: A tool for Mutation Testing with Fuzzing
    Lee, Jaekwon
    Vigano, Enrico
    Pastore, Fabrizio
    Briand, Lionel
    2024 IEEE CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION, ICST 2024, 2024, : 451 - 453
  • [4] Investigating Coverage Guided Fuzzing with Mutation Testing
    Qian, Ruixiang
    Zhang, Quanjun
    Fang, Chunrong
    Guo, Lihua
    13TH ASIA-PACIFIC SYMPOSIUM ON INTERNETWARE, INTERNETWARE 2022, 2022, : 272 - 281
  • [5] AMSFuzz: An adaptive mutation schedule for fuzzing
    Zhao, Xiaoqi
    Qu, Haipeng
    Xu, Jianliang
    Li, Shuo
    Wang, Gai-Ge
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 208
  • [6] Random Testing and Evolutionary Testing for Fuzzing GraphQL APIs
    Belhadi, Asma
    Zhang, Man
    Arcuri, Andrea
    ACM TRANSACTIONS ON THE WEB, 2024, 18 (01)
  • [7] A Fuzzing Method for Security Testing of Sensors
    Zhu, Xiaogang
    Liu, Shigang
    Jolfaei, Alireza
    IEEE SENSORS JOURNAL, 2024, 24 (05) : 5522 - 5529
  • [8] Mutation Optimization of Directional Fuzzing for Cumulative Defects
    Yang K.
    He Y.-P.
    Ma H.-T.
    Dong K.
    Xie Y.
    Cai C.-F.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (05): : 2286 - 2299
  • [9] Mutation Scheme for Fuzzing Based on Thompson Sampling
    Ma R.
    He J.-Y.
    Wang X.-F.
    Wang X.-J.
    Li B.-B.
    Hu C.-Z.
    Ma, Rui (mary@bit.edu.cn), 1600, Beijing Institute of Technology (40): : 1307 - 1313
  • [10] Static Instrumentation Techniques in Fuzzing Testing
    Wang M.
    Jiang Y.
    Sun J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (02): : 262 - 273