吉林大学学报(工学版) ›› 2017, Vol. 47 ›› Issue (4): 1262-1267.doi: 10.13229/j.cnki.jdxbgxb201704035

• Orginal Article • Previous Articles     Next Articles

Compiler testing method based on ECP metamorphic relation

LIU Lei1, 2, LIU Li-juan2, WU Xin-wei1, ZHANG Peng1   

  1. 1.College of Computer Science and Technology, Jilin University, Changchun 130012,China;
    2.College of Software, Jilin University, Changchun 130012,China
  • Received:2017-05-11 Online:2017-07-20 Published:2017-07-20

Abstract: The aim of this paper is to propose a method based ECP Metamorphic Relation (ECPMR) to test compilers. First, we select some correct programs with specific metamorphic relations as inputs of the under-test compiler. Then, we use these selected programs to generate program slices. Finally, we check whether the outputs of these program slices satisfy the ECPMR to find bugs in the compiler. Our proposed method is verified through experimental study on SNL compiler and the results show that this method is effective to detect bugs in SNL compiler.

Key words: computer systems organization, metamorphic relation, metamorphic testing, compiler testing, program slice

CLC Number: 

  • TP393
[1] Kossatchev A S, Posypkin M A. Survey of compiler testing methods[J]. Programming & Computer Software, 2005, 31(1):10-19.
[2] Chen J, Hu W, Hao D, et al. An empirical comparison of compiler testing techniques[C]//Proceedings of the 38th International Conference on Software Engineering, ACM, 2016: 180-190.
[3] Ammann P, Offutt J. Introduction to Software Testing[M]. Oxford City: Cambridge University Press, 2016.
[4] Barr E T, Harman M, McMinn P, et al. The oracle problem in software testing: A survey[J]. IEEE transactions on software engineering, 2015, 41(5): 507-525.
[5] Chen T Y, Cheung S C, Yiu S M. Metamorphic testing: a new approach for generating next test cases[R]. Technical Report HKUST-CS98-01, 1998.
[6] Xie X, Wong W E, Chen T Y, et al. Metamorphic slice: An application in spectrum-based fault localization[J]. Information and Software Technology, 2013, 55(5): 866-879.
[7] 董国伟, 聂长海, 徐宝文. 基于程序路径分析的有效蜕变测试[J]. 计算机学报, 2009, 32(5):1002-1013.
Dong G W, Nie C H, Xu B W. Effectively metamorphic testing based on program path analysis[J]. Chinese Journal of Computer, 2009, 32(5): 1002-1013.
[8] Segura S, Fraser G, Sanchez A B, et al. A survey on metamorphic testing[J]. IEEE Transactions on Software Engineering, 2016, 42(9): 805-824.
[9] 王志文,黄小龙,王海军,等. 基于程序切片的测试用例生成系统研究与实现[J]. 计算机科学,2014,(09):71-74.
Wang Zhi-wen, Huang Xiao-long, Wang Hai-jun, et al. Program slicing-guided test case generation system[J]. Computer Science, 2014.
[10] Păsăreanu C S, Visser W. A survey of new trends in symbolic execution for software testing and analysis[J]. International Journal on Software Tools for Technology Transfer (STTT), 2009, 11(4): 339-353.
[11] Xie T, Tillmann N, de Halleux J, et al. Fitness-guided path exploration in dynamic symbolic execution[C]//2009 IEEE/IFIP International Conference on Dependable Systems & Networks(DSN'09). IEEE, 2009: 359-368.
[12] 刘磊. 编译程序的设计与实现[M]. 北京:高等教育出版社, 2004.
[1] DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604.
[2] DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272.
[3] DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600.
[4] ZHANG Hua, PENG Lai-hu, HU Xu-dong, WANG Xian-mei. Model of enterprise cloud manufacture applying to textile machining industry [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 337-340.
[5] WANG Xin-ying, LIU Gang, GU Fang-ming, XIAO Wei. Heterogeneous feature fusion method based on semantic and shape for 3D model retrieval [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 359-363.
[6] WU Xiao-xuan, NI Zhi-wei, NI Li-ping. Clustering ensembles algorithm based on fractal dimension [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 364-367.
[7] LIU Zhuang, FANG Zhi-yi, ZHANG Chun-fei, CHEN Lin, ZHAO Yang. Energy-efficient amendatory algorithm based on energy-consumption transference and data gravitation in wireless sensor networks [J]. , 2012, 42(05): 1237-1242.
[8] LIU Xian, GUO Rui-feng, DING Wan-fu. Schedulability of rollback recovery fault-tolerant real-time system based on priority mixed strategy [J]. , 2012, 42(05): 1243-1250.
[9] CHAI Zheng-yi, WU Hui-xin, WU-Yong. Optimization algorithm for immune real-value detector generation [J]. , 2012, 42(05): 1251-1256.
[10] LI Min, JIA Chun-fu, LI Jing-wei, LIU Zhe-li, DONG Zong-qing. Format-preserving encryption for variable-length encoding character data [J]. , 2012, 42(05): 1257-1261.
[11] LIU Yan-heng, FU Feng, ZHU Jian-qi, SUN Xin. DoS detection model base on alive entropy [J]. 吉林大学学报(工学版), 2011, 41(4): 1059-1064.
[12] LI Rui-Xue, FANG Zhi-Yi, YI Ting-Ting. Improved DVHop localization algorithm based on regularly moving anchor(RMAN) and received signal strength indicator(RSSI) and its performance analysis [J]. 吉林大学学报(工学版), 2011, 41(02): 435-0441.
[13] QU Liang-Dong, LIU Yan-Hang, WEI Da. System of vertical handoff for heterogeneous wireless network based on VPN on invehicle gateway [J]. 吉林大学学报(工学版), 2010, 40(05): 1292-1297.
[14] SUN Zhi-Xin, ZHANG Yu-Feng. P2P network traffic identification model based on MSVM [J]. 吉林大学学报(工学版), 2010, 40(05): 1298-1302.
[15] HU Liang,CHE Xi-long. Design and implementation of grid resource monitoring and prediction system [J]. 吉林大学学报(工学版), 2010, 40(04): 1044-1047.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!