Searched for: subject%3A%22Search%255C-based%255C+software%255C+engineering%22
(1 - 19 of 19)
document
Veldkamp, L.S. (author), Olsthoorn, Mitchell (author), Panichella, A. (author)
Web Application Programming Interfaces (APIs) allow systems to be addressed programmatically and form the backbone of the internet. RESTful and RPC APIs are among the most common API architectures used. In the last decades, researchers have proposed various techniques for automated testing of RESTful APIs, however, to the best of the authors'...
conference paper 2023
document
Applis, L.H. (author), Panichella, A. (author), Marang, R.J. (author)
More machine learning (ML) models are introduced to the field of Software Engineering (SE) and reached a stage of maturity to be considered for real-world use; But the real world is complex, and testing these models lacks often in explainability, feasibility and computational capacities. Existing research introduced meta-morphic testing to...
conference paper 2023
document
Birchler, Christian (author), Khatiri, Sajad (author), Derakhshanfar, P. (author), Panichella, Sebastiano (author), Panichella, A. (author)
Testing with simulation environments helps to identify critical failing scenarios for self-driving cars (SDCs). Simulation-based tests are safer than in-field operational tests and allow detecting software defects before deployment. However, these tests are very expensive and are too many to be run frequently within limited time constraints...
journal article 2023
document
Derakhshanfar, P. (author), Devroey, Xavier (author), Panichella, A. (author), Zaidman, A.E. (author), van Deursen, A. (author)
Search-based approaches have been used in the literature to automate the process of creating unit test cases. However, related work has shown that generated tests with high code coverage could be ineffective, i.e., they may not detect all faults or kill all injected mutants. In this paper, we propose Cling, an integration-level test case...
journal article 2023
document
Stallenberg, Dimitri (author)
Traditional software testing is a labor-intensive and expensive manual process. To mitigate the high cost of manual test case generation, researchers have developed various techniques for automated test case generation over the last few decades. These techniques make use of static type information to determine which data types should be used in...
master thesis 2022
document
Olsthoorn, Mitchell (author), van Deursen, A. (author), Panichella, A. (author)
Transaction-reverting statements are key constructs within Solidity that are extensively used for authority and validity checks. Current state-of-the-art search-based testing and fuzzing approaches do not explicitly handle these statements and therefore can not effectively detect security vulnerabilities. In this paper, we argue that it is...
conference paper 2022
document
Gissurarson, Matthías Páll (author), Applis, L.H. (author), Panichella, A. (author), van Deursen, A. (author), Sands, David (author)
Automatic program repair (APR) regularly faces the challenge of overfitting patches — patches that pass the test suite, but do not actually address the problems when evaluated manually. Currently, overfit detection requires manual inspection or an oracle making quality control of APR an expensive task. With this work, we want to introduce...
conference paper 2022
document
Stallenberg, D.M. (author), Olsthoorn, Mitchell (author), Panichella, A. (author)
With the ever-increasing use of web APIs in modern-day applications, it is becoming more important to test the system as a whole. In the last decade, tools and approaches have been proposed to automate the creation of system-level test cases for these APIs using evolutionary algorithms (EAs). One of the limiting factors of EAs is that the...
conference paper 2021
document
Schröder, C.J. (author), van der Feltz, Adriaan (author), Panichella, A. (author), Aniche, Maurício (author)
Deciding what constitutes a single module, what classes belong to which module or the right set of modules for a specific software system has always been a challenging task. The problem is even harder in large-scale software systems composed of thousands of classes and hundreds of modules. Over the years, researchers have been proposing...
conference paper 2021
document
Panichella, A. (author)
Context: Latent Dirichlet Allocation (LDA) has been successfully used in the literature to extract topics from software documents and support developers in various software engineering tasks. While LDA has been mostly used with default settings, previous studies showed that default hyperparameter values generate sub-optimal topics from software...
journal article 2021
document
Olsthoorn, Mitchell (author), Panichella, A. (author)
Test Case Selection (TCS) aims to select a subset of the test suite to run for regression testing. The selection is typically based on past coverage and execution cost data. Researchers have successfully used multi-objective evolutionary algorithms (MOEAs), such as NSGA-II and its variants, to solve this problem. These MOEAs use traditional...
conference paper 2021
document
Popping, Sven (author)
Debugging application crashes is an expensive and time-taking process, relying on the developer’s expertise, and requiring knowledge about the system. Over the years, the research community has developed several automated approaches to ease debugging. Among those approaches, search-based crash reproduction, which tries to generate a test case...
master thesis 2020
document
Stallenberg, Dimitri (author)
Randomized variational operators can be very disruptive to the search process, especially when there exist dependencies between the variables under search. Within test-cases, these dependencies exist as well. This makes it interesting to evaluate the benefits of preserving these dependencies during test-case generation.<br/><br/>In this paper,...
bachelor thesis 2020
document
Stallenberg, D.M. (author), Panichella, A. (author)
Input sanitization and validation of user inputs are well-established protection mechanisms for microservice architectures against XML injection attacks (XMLi). The effectiveness of the protection mechanisms strongly depends on the quality of the sanitization and validation rule sets (e.g., regular expressions) and, therefore, security...
conference paper 2019
document
Jan, Sadeeq (author), Panichella, A. (author), Arcuri, Andrea (author), Briand, Lionel (author)
Modern web applications often interact with internal web services, which are not directly accessible to users. However, malicious user inputs can be used to exploit security vulnerabilities in web services through the application front-ends. Therefore, testing techniques have been proposed to reveal security flaws in the interactions with...
journal article 2019
document
Panichella, A. (author)
Latent Dirichlet Allocation (LDA) has been used to support many software engineering tasks. Previous studies showed that default settings lead to sub-optimal topic modeling with a dramatic impact on the performance of such approaches in terms of precision and recall. For this reason, researchers used search algorithms (e.g., genetic...
conference paper 2019
document
Abdessalem, Raja Ben (author), Panichella, A. (author), Nejati, Shiva (author), Briand, Lionel C. (author), Stifter, Thomas (author)
Complex systems such as autonomous cars are typically built as a composition of features that are independent units of functionality. Features tend to interact and impact one another’s behavior in unknown ways. A challenge is to detect and manage feature interactions, in particular, those that violate system requirements, hence leading to...
conference paper 2018
document
Castelein, J. (author), Aniche, Maurício (author), Soltani, M. (author), Panichella, A. (author), van Deursen, A. (author)
Database-centric systems strongly rely on SQL queries to manage and manipulate their data. These SQL commands can range from very simple selections to queries that involve several tables, subqueries, and grouping operations. And, as with any important piece of code, developers should properly test SQL queries. In order to completely test a SQL...
conference paper 2018
document
Romano, D. (author), Raemaekers, S. (author), Pinzger, M. (author)
Recent studies have shown that the violation of the Interface Segregation Principle (ISP) is critical for maintaining and evolving software systems. Fat interfaces (i.e., interfaces violating the ISP) change more frequently and degrade the quality of the components coupled to them. According to the ISP the interfaces’ design should force no...
report 2014
Searched for: subject%3A%22Search%255C-based%255C+software%255C+engineering%22
(1 - 19 of 19)