Code coverage differences of Java bytecode and source code instrumentation tools

被引:1
|
作者
Ferenc Horváth
Tamás Gergely
Árpád Beszédes
Dávid Tengeri
Gergő Balogh
Tibor Gyimóthy
机构
[1] University of Szeged,Department of Software Engineering
[2] University of Szeged,MTA
来源
Software Quality Journal | 2019年 / 27卷
关键词
Code coverage; White-box testing; Java bytecode instrumentation; Source code instrumentation; Coverage tools; Empirical study;
D O I
暂无
中图分类号
学科分类号
摘要
Many software testing fields, like white-box testing, test case generation, test prioritization, and fault localization, depend on code coverage measurement. If used as an overall completeness measure, the minor inaccuracies of coverage data reported by a tool do not matter that much; however, in certain situations, they can lead to serious confusion. For example, a code element that is falsely reported as covered can introduce false confidence in the test. This work investigates code coverage measurement issues for the Java programming language. For Java, the prevalent approach to code coverage measurement is using bytecode instrumentation due to its various benefits over source code instrumentation. As we have experienced, bytecode instrumentation-based code coverage tools produce different results than source code instrumentation-based ones in terms of the reported items as covered. We report on an empirical study to compare the code coverage results provided by tools using the different instrumentation types for Java coverage measurement on the method level. In particular, we want to find out how much a bytecode instrumentation approach is inaccurate compared to a source code instrumentation method. The differences are systematically investigated both in quantitative (how much the outputs differ) and in qualitative terms (what the causes for the differences are). In addition, the impact on test prioritization and test suite reduction—a possible application of coverage measurement—is investigated in more detail as well.
引用
收藏
页码:79 / 123
页数:44
相关论文
共 50 条
  • [1] Code coverage differences of Java']Java bytecode and source code instrumentation tools
    Horvath, Ferenc
    Gergely, Tamas
    Beszedes, Arpad
    Tengeri, David
    Balogh, Gergo
    Gyimothy, Tibor
    [J]. SOFTWARE QUALITY JOURNAL, 2019, 27 (01) : 79 - 123
  • [2] Negative Effects of Bytecode Instrumentation on Java']Java Source Code Coverage
    Tengeri, David
    Horvath, Ferenc
    Beszedes, Arpad
    Gergely, Tamas
    Gyimothy, Tibor
    [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 225 - 235
  • [3] Mobile code security by Java']Java bytecode instrumentation
    Chander, A
    Mitchell, JC
    Shin, I
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 27 - 40
  • [4] Is Bytecode Instrumentation as Good as Source Code Instrumentation: An Empirical Study with Industrial Tools
    Li, Nan
    Meng, Xin
    Offutt, Jeff
    Deng, Lin
    [J]. 2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2013, : 380 - 389
  • [5] STUBBER: Compiling Source Code into Bytecode without Dependencies for Java']Java Code Clone Detection
    Schafer, Andre
    Amme, Wolfram
    Heinze, Thomas S.
    [J]. 2021 IEEE 15TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES, IWSC 2021, 2021, : 29 - 35
  • [6] Finding Source Code Clones in Intermediate Representations of Java']Java Bytecode
    Schaefer, Andre
    Heinze, Thomas S.
    Amme, Wolfram
    [J]. 2023 IEEE 17TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES, IWSC 2023, 2023, : 37 - 43
  • [7] Target code generation using the code expansion technique for Java']Java Bytecode
    Ko, KM
    Kim, SG
    [J]. PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 752 - 755
  • [8] Mobile code security by Java']Java bytecode dependence analysis
    Bian, G
    Nakayama, K
    Kobayashi, Y
    Maekawa, M
    [J]. IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
  • [9] Checking secure information flow in Java']Java bytecode by code transformation and standard bytecode verification
    Bernardeschi, C
    De Francesco, N
    Lettieri, G
    Martini, L
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2004, 34 (13): : 1225 - 1255
  • [10] A declarative approach for Java']Java code instrumentation
    Zhang, Tian
    Zheng, Xiaomei
    Zhang, Yan
    Zhao, Jianhua
    Li, Xuandong
    [J]. SOFTWARE QUALITY JOURNAL, 2015, 23 (01) : 143 - 170