- Afzal, W., Torkar, R. and Feldt, R. A systematic review of search-based testing for non-functional system properties. Info. Softw. Tech. 51, (2009), 957--976. Google ScholarDigital Library
- Ali, S., Briand, L.C., Hemmati, H. and Panesar-Walawege, R.K. A systematic review of the application and empirical investigation of search-based test-case generation. IEEE Trans. Softw. Eng. (2010, to appear). Google ScholarDigital Library
- Arcuri, A. and Yao, X. A novel co-evolutionary approach to automatic software bug fixing. In Proceedings of the IEEE Congress on Evolutionary Computation (Hong Kong, June 1--6, 2008), 162--168.Google ScholarCross Ref
- Harman, M. The current state and future of search based software engineering. The Future of Software Engineering. L. Briand and A. Wolf, Eds. IEEE CS Press, Alamitos, CA, 342--357. Google ScholarDigital Library
- McMinn, P. Search-based software test data generation: A survey. Softw. Testing, Verification and Reliability 14, 2 (June 2004), 105--156. Google ScholarDigital Library
- National Institute of Standards and Technology. The Economic Impacts of Inadequate Infrastructure for Software Testing. Planning Report 02-3, May 2002.Google Scholar
- Räihä, O. A survey on search based software design. Tech. Report Technical Report D-2009-1, Dept. of Computer Sciences, University of Tampere, 2009.Google Scholar
Index Terms
- Automated patching techniques: the fix is in: technical perspective
Recommendations
Automated patching for unreproducible builds
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringSoftware reproducibility plays an essential role in establishing trust between source code and the built artifacts, by comparing compilation outputs acquired from independent users. Although the testing for unreproducible builds could be automated, ...
Automated Security Checking and Patching Using TestTalk
ASE '00: Proceedings of the 15th IEEE international conference on Automated software engineeringIn many computer system security incidents, attackers successfully intruded computer systems by exploiting known weaknesses. Those computer systems remained vulnerable even after the vulnerabilities were known because it requires constant attention to ...
Do automated program repair techniques repair hard and important bugs?
Existing evaluations of automated repair techniques focus on the fraction of the defects for which the technique can produce a patch, the time needed to produce patches, and how well patches generalize to the intended specification. However, these ...
Comments