We present a new approach that uses compiler-directed fault-injection for coverage testing of recovery code in Internet services, to evaluate their robustness to operating system and I/O hardware faults. We define a set of program-fault coverage metrics that enable quantification of Java catch blocks exercised during fault-injection experiments. We use compiler analyses to instrument application code in two ways: to direct fault injection to occur at appropriate points during execution, and to measure the resulting coverage. As a proof of concept for these ideas, we have applied our techniques manually to Muffin, a proxy server; we obtained a high degree of coverage of catch blocks, with on average 85% of the expected faults per catch being...
Many programs have latent bugs that cause the program to fail. In order to fix a failing program, is...
This paper presents a failure analysis of the Java Virtual Machine providing useful insights into th...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
This paper presents a new compile-time analysis that enables a testing methodology for white-box cov...
This paper presents a new compile-time analysis that enables a testing methodology for white-box co...
The use of Java to develop highly available network services and the inherent unreliability of commu...
Abstract. The knowledge of real software faults representativeness is important to allow the emulati...
More applications are designed as server programs, many of which are expected to run 24x7. Ensuring ...
Overview of Data Defects4J: A Database of Existing Faults to Enable Controlled Testing Studies for ...
Given a test suite T designed to test a program P, there are at least three attributes of T, which ...
Fault localization is usually the most time-consuming step when debugging software bugs in general a...
Fault Injection is used to validate a system in the presence of faults. Jaca, a software injection t...
Abstract. A common method to localize defects is to compare the coverage of passing and failing prog...
This paper presents the source code analysis of a file reader server socket program (connection-orie...
Abstract In this paper we present a new model of Java programs. We show how a program can be compile...
Many programs have latent bugs that cause the program to fail. In order to fix a failing program, is...
This paper presents a failure analysis of the Java Virtual Machine providing useful insights into th...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
This paper presents a new compile-time analysis that enables a testing methodology for white-box cov...
This paper presents a new compile-time analysis that enables a testing methodology for white-box co...
The use of Java to develop highly available network services and the inherent unreliability of commu...
Abstract. The knowledge of real software faults representativeness is important to allow the emulati...
More applications are designed as server programs, many of which are expected to run 24x7. Ensuring ...
Overview of Data Defects4J: A Database of Existing Faults to Enable Controlled Testing Studies for ...
Given a test suite T designed to test a program P, there are at least three attributes of T, which ...
Fault localization is usually the most time-consuming step when debugging software bugs in general a...
Fault Injection is used to validate a system in the presence of faults. Jaca, a software injection t...
Abstract. A common method to localize defects is to compare the coverage of passing and failing prog...
This paper presents the source code analysis of a file reader server socket program (connection-orie...
Abstract In this paper we present a new model of Java programs. We show how a program can be compile...
Many programs have latent bugs that cause the program to fail. In order to fix a failing program, is...
This paper presents a failure analysis of the Java Virtual Machine providing useful insights into th...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...