You are here

Extended program invariants: applications in testing and fault localization

TitleExtended program invariants: applications in testing and fault localization
Publication TypeConference Paper
Year of Publication2012
AuthorsAlipour, M A., and A. Groce
Conference NameInternational Workshop on Dynamic Analysis
Date Published07/2012
PublisherACM Press
Conference LocationMinneapolis, MN
ISBN Number9781450314558

Invariants are powerful tools for program analysis and reasoning.Several tools and techniques have been developed to infer invariants of a program. Given a test suite for a program, an invariant detection tool (IDT) extracts (potential) invariants from the program execution on test cases of the test suite. The resultant invariants contain relations only over variables and constants that are visible to the IDT. IDTs are usually unable to extract invariants about execution features like taken branches, since programs usually do not have state variables for such features. Thus, the IDT has no information about such features in order to infer relations between them. We speculate that invariants about execution features are useful for understanding test suites; we call these invariants, extended invariants.

In this paper, we discuss potential applications of extended invariants in understanding of test suites, and fault localization. We illustrate the usefulness of extended invariants with some small examples that use basic block count as the execution feature in extended invariants. We believe extended invariants provide useful information about execution of programs that can be utilized in program analysis and testing.