{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:21:04Z","timestamp":1743081664589,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030108007"},{"type":"electronic","value":"9783030108014"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-10801-4_33","type":"book-chapter","created":{"date-parts":[[2019,1,10]],"date-time":"2019-01-10T09:38:37Z","timestamp":1547113117000},"page":"419-434","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Do Null-Type Mutation Operators Help Prevent Null-Type Faults?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8525-8198","authenticated-orcid":false,"given":"Ali","family":"Parsai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4463-2945","authenticated-orcid":false,"given":"Serge","family":"Demeyer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,11]]},"reference":[{"issue":"1","key":"33_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/ms.2003.1159030","volume":"20","author":"I Alexander","year":"2003","unstructured":"Alexander, I.: Misuse cases: use cases with hostile intent. IEEE Softw. 20(1), 58\u201366 (2003). https:\/\/doi.org\/10.1109\/ms.2003.1159030","journal-title":"IEEE Softw."},{"key":"33_CR2","doi-asserted-by":"publisher","unstructured":"Ammann, P., Delamaro, M.E., Offutt, J.: Establishing theoretical minimal sets of mutants. In: 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, pp. 21\u201330. IEEE, March 2014. https:\/\/doi.org\/10.1109\/icst.2014.13","DOI":"10.1109\/icst.2014.13"},{"key":"33_CR3","doi-asserted-by":"publisher","unstructured":"Bradbury, J.S., Cordy, J.R., Dingel, J.: Mutation operators for concurrent Java (J2SE 5.0). In: MUTATION 2006, Proceedings of the Second Workshop on Mutation Analysis (Mutation 2006 - ISSRE Workshops 2006), School of Computing, Queen\u2019s University, Kingston, p. 11. IEEE, Washington, DC, November 2006. https:\/\/doi.org\/10.1109\/mutation.2006.10","DOI":"10.1109\/mutation.2006.10"},{"key":"33_CR4","doi-asserted-by":"publisher","unstructured":"Coles, H., Laurent, T., Henard, C., Papadakis, M., Ventresque, A.: PIT: a practical mutation testing tool for Java (Demo). In: Proceedings of the 25th International Symposium on Software Testing and Analysis - ISSTA 2016, pp. 449\u2013452. ACM Press, New York (2016). https:\/\/doi.org\/10.1145\/2931037.2948707","DOI":"10.1145\/2931037.2948707"},{"issue":"4","key":"33_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/c-m.1978.218136","volume":"11","author":"RA DeMillo","year":"1978","unstructured":"DeMillo, R.A., Lipton, R.J., Sayward, F.G.: Hints on test data selection: help for the practicing programmer. Computer 11(4), 34\u201341 (1978). https:\/\/doi.org\/10.1109\/c-m.1978.218136","journal-title":"Computer"},{"key":"33_CR6","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.infsof.2016.04.012","volume":"81","author":"L Deng","year":"2017","unstructured":"Deng, L., Offutt, J., Ammann, P., Mirzaei, N.: Mutation operators for testing Android apps. Inf. Softw. Technol. 81, 154\u2013168 (2017). https:\/\/doi.org\/10.1016\/j.infsof.2016.04.012","journal-title":"Inf. Softw. Technol."},{"key":"33_CR7","doi-asserted-by":"publisher","unstructured":"Ferrari, F.C., Maldonado, J., Rashid, A.: Mutation testing for aspect-oriented programs. In: 2008 International Conference on Software Testing, Verification, and Validation. ICST 2008, Department of Computer System, Sao Paulo University, Sao Carlos, pp. 52\u201361. IEEE, Washington, DC, April 2008. https:\/\/doi.org\/10.1109\/icst.2008.37","DOI":"10.1109\/icst.2008.37"},{"key":"33_CR8","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M Fowler","year":"1999","unstructured":"Fowler, M.: Refactoring: Improving the Design of Existing Code. Addison-Wesley, Boston (1999)"},{"issue":"2","key":"33_CR9","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/tse.2011.93","volume":"38","author":"G Fraser","year":"2012","unstructured":"Fraser, G., Zeller, A.: Mutation-driven generation of unit tests and oracles. IEEE Trans. Softw. Eng. 38(2), 278\u2013292 (2012). https:\/\/doi.org\/10.1109\/tse.2011.93","journal-title":"IEEE Trans. Softw. Eng."},{"key":"33_CR10","doi-asserted-by":"publisher","unstructured":"Gligoric, M., Groce, A., Zhang, C., Sharma, R., Alipour, M.A., Marinov, D.: Comparing non-adequate test suites using coverage criteria. In: Proceedings of the 2013 International Symposium on Software Testing and Analysis - ISSTA 2013, pp. 302\u2013313. ACM Press, New York (2013). https:\/\/doi.org\/10.1145\/2483760.2483769","DOI":"10.1145\/2483760.2483769"},{"key":"33_CR11","volume-title":"The Java Language Specification (Java SE). Oracle","author":"J Gosling","year":"2014","unstructured":"Gosling, J., Joy, B., Steele, G., Bracha, G., Buckley, A.: The Java Language Specification (Java SE). Oracle, 8th edn. Addison-Wesley, Boston (2014)","edition":"8"},{"key":"33_CR12","doi-asserted-by":"publisher","unstructured":"Inozemtseva, L., Holmes, R.: Coverage is not strongly correlated with test suite effectiveness. In: Proceedings of the 36th International Conference on Software Engineering - ICSE 2014, pp. 435\u2013445. ACM Press, New York (2014). https:\/\/doi.org\/10.1145\/2568225.2568271","DOI":"10.1145\/2568225.2568271"},{"issue":"5","key":"33_CR13","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/tse.2010.62","volume":"37","author":"Y Jia","year":"2011","unstructured":"Jia, Y., Harman, M.: An analysis and survey of the development of mutation testing. IEEE Trans. Softw. Eng. 37(5), 649\u2013678 (2011). https:\/\/doi.org\/10.1109\/tse.2010.62","journal-title":"IEEE Trans. Softw. Eng."},{"key":"33_CR14","doi-asserted-by":"publisher","unstructured":"Just, R., Jalali, D., Inozemtseva, L., Ernst, M.D., Holmes, R., Fraser, G.: Are mutants a valid substitute for real faults in software testing? In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2014, pp. 654\u2013665. ACM Press, New York (2014). https:\/\/doi.org\/10.1145\/2635868.2635929","DOI":"10.1145\/2635868.2635929"},{"key":"33_CR15","doi-asserted-by":"publisher","unstructured":"Kimura, S., Hotta, K., Higo, Y., Igaki, H., Kusumoto, S.: Does return null matter? In: 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), pp. 244\u2013253. IEEE, February 2014. https:\/\/doi.org\/10.1109\/csmr-wcre.2014.6747176","DOI":"10.1109\/csmr-wcre.2014.6747176"},{"issue":"7","key":"33_CR16","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1002\/spe.4380210704","volume":"21","author":"KN King","year":"1991","unstructured":"King, K.N., Offutt, A.J.: A fortran language system for mutation-based software testing. Softw.: Pract. Exp. 21(7), 685\u2013718 (1991). https:\/\/doi.org\/10.1002\/spe.4380210704","journal-title":"Softw.: Pract. Exp."},{"issue":"4","key":"33_CR17","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1145\/322993.322996","volume":"8","author":"DR Kuhn","year":"1999","unstructured":"Kuhn, D.R.: Fault classes and error detection capability of specification-based testing. ACM Trans. Softw. Eng. Methodol. 8(4), 411\u2013424 (1999). https:\/\/doi.org\/10.1145\/322993.322996","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"33_CR18","doi-asserted-by":"publisher","unstructured":"Kurtz, B., Ammann, P., Offutt, J.: Static analysis of mutant subsumption. In: 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 1\u201310. IEEE, April 2015. https:\/\/doi.org\/10.1109\/icstw.2015.7107454","DOI":"10.1109\/icstw.2015.7107454"},{"key":"33_CR19","doi-asserted-by":"publisher","unstructured":"Ma, Y.S., Kwon, Y.R., Offutt, J.: Inter-class mutation operators for Java. In: 13th International Symposium on Software Reliability Engineering, 2002. Proceedings, pp. 352\u2013363. IEEE Computer Society (2002). https:\/\/doi.org\/10.1109\/issre.2002.1173287","DOI":"10.1109\/issre.2002.1173287"},{"key":"33_CR20","doi-asserted-by":"publisher","unstructured":"Nanavati, J., Wu, F., Harman, M., Jia, Y., Krinke, J.: Mutation testing of memory-related operators. In: 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 1\u201310. IEEE, April 2015. https:\/\/doi.org\/10.1109\/icstw.2015.7107449","DOI":"10.1109\/icstw.2015.7107449"},{"issue":"2","key":"33_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/227607.227610","volume":"5","author":"AJ Offutt","year":"1996","unstructured":"Offutt, A.J., Lee, A., Rothermel, G., Untch, R.H., Zapf, C.: An experimental determination of sufficient mutant operators. ACM Trans. Softw. Eng. Methodol. 5(2), 99\u2013118 (1996). https:\/\/doi.org\/10.1145\/227607.227610","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"3","key":"33_CR22","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U","volume":"7","author":"A. Jefferson Offutt","year":"1997","unstructured":"Offutt, A.J., Pan, J.: Automatically detecting equivalent mutants and infeasible paths. Softw. Test. Verif. Reliab. 7(3), 165\u2013192 (1997). https:\/\/doi.org\/10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U","journal-title":"Software Testing, Verification and Reliability"},{"key":"33_CR23","doi-asserted-by":"publisher","unstructured":"Oliveira, R.A., Alegroth, E., Gao, Z., Memon, A.: Definition and evaluation of mutation operators for GUI-level mutation analysis. In: 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 1\u201310. IEEE, April 2015. https:\/\/doi.org\/10.1109\/icstw.2015.7107457","DOI":"10.1109\/icstw.2015.7107457"},{"key":"33_CR24","doi-asserted-by":"publisher","unstructured":"Osman, H., Leuenberger, M., Lungu, M., Nierstrasz, O.: Tracking null checks in open-source java systems. In: 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vol. 1, pp. 304\u2013313. IEEE, March 2016. https:\/\/doi.org\/10.1109\/saner.2016.57","DOI":"10.1109\/saner.2016.57"},{"key":"33_CR25","doi-asserted-by":"publisher","unstructured":"Osman, H., Lungu, M., Nierstrasz, O.: Mining frequent bug-fix code changes. In: 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), pp. 343\u2013347. IEEE, February 2014. https:\/\/doi.org\/10.1109\/csmr-wcre.2014.6747191","DOI":"10.1109\/csmr-wcre.2014.6747191"},{"key":"33_CR26","doi-asserted-by":"publisher","unstructured":"Papadakis, M., Henard, C., Harman, M., Jia, Y., Traon, Y.L.: Threats to the validity of mutation-based test assessment. In: Proceedings of the 25th International Symposium on Software Testing and Analysis - ISSTA 2016, pp. 354\u2013365. ACM Press, New York (2016). https:\/\/doi.org\/10.1145\/2931037.2931040","DOI":"10.1145\/2931037.2931040"},{"key":"33_CR27","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/bs.adcom.2018.03.015","volume-title":"Advances in Computers","author":"Mike Papadakis","year":"2019","unstructured":"Papadakis, M., Kintis, M., Zhang, J., Jia, Y., Traon, Y.L., Harman, M.: Mutation testing advances: an analysis and survey. In: Advances in Computers (2018). https:\/\/doi.org\/10.1016\/bs.adcom.2018.03.015"},{"key":"33_CR28","unstructured":"Parsai, A.: Replication package. http:\/\/parsai.net\/files\/research\/SofSemReplicationPackage.7z"},{"key":"33_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-99927-2_9","volume-title":"Testing Software and Systems","author":"A Parsai","year":"2018","unstructured":"Parsai, A., Demeyer, S., De Busser, S.: C++11\/14 mutation operators based on common fault patterns. In: Medina-Bulo, I., Merayo, M.G., Hierons, R. (eds.) ICTSS 2018. LNCS, vol. 11146, pp. 102\u2013118. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99927-2_9"},{"key":"33_CR30","doi-asserted-by":"publisher","unstructured":"Parsai, A., Murgia, A., Demeyer, S.: Evaluating random mutant selection at class-level in projects with non-adequate test suites. In: Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering - EASE 2016, pp. 11:1\u201311:10. ACM Press, New York (2016). https:\/\/doi.org\/10.1145\/2915970.2915992","DOI":"10.1145\/2915970.2915992"},{"key":"33_CR31","doi-asserted-by":"publisher","unstructured":"Parsai, A., Murgia, A., Demeyer, S.: A model to estimate first-order mutation coverage from higher-order mutation coverage. In: 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS), pp. 365\u2013373. IEEE, August 2016. https:\/\/doi.org\/10.1109\/qrs.2016.48","DOI":"10.1109\/qrs.2016.48"},{"key":"33_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-319-68972-2_10","volume-title":"Fundamentals of Software Engineering","author":"A Parsai","year":"2017","unstructured":"Parsai, A., Murgia, A., Demeyer, S.: LittleDarwin: a feature-rich and extensible mutation testing framework for large and complex Java systems. In: Dastani, M., Sirjani, M. (eds.) FSEN 2017. LNCS, vol. 10522, pp. 148\u2013163. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68972-2_10"},{"key":"33_CR33","doi-asserted-by":"publisher","unstructured":"Parsai, A., Murgia, A., Soetens, Q.D., Demeyer, S.: Mutation testing as a safety net for test code refactoring. In: Scientific Workshop Proceedings of the XP2015 on - XP 2015 workshops, pp. 8:1\u20138:7. ACM Press, New York (2015). https:\/\/doi.org\/10.1145\/2764979.2764987","DOI":"10.1145\/2764979.2764987"},{"key":"33_CR34","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-319-14358-3_14","volume-title":"Agile Methods. Large-Scale Development, Refactoring, Testing, and Estimation","author":"A Parsai","year":"2014","unstructured":"Parsai, A., Soetens, Q.D., Murgia, A., Demeyer, S.: Considering polymorphism in change-based test suite reduction. In: Dings\u00f8yr, T., Moe, N.B., Tonelli, R., Counsell, S., Gencel, C., Petersen, K. (eds.) XP 2014. LNBIP, vol. 199, pp. 166\u2013181. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-14358-3_14"},{"key":"33_CR35","doi-asserted-by":"publisher","unstructured":"Schuler, D., Zeller, A.: Javalanche: efficient mutation testing for Java. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering on European Software Engineering Conference and Foundations of Software Engineering Symposium - ESEC\/FSE 2009, pp. 297\u2013298. ACM Press, New York (2009). https:\/\/doi.org\/10.1145\/1595696.1595750","DOI":"10.1145\/1595696.1595750"},{"key":"33_CR36","volume-title":"Case Study Research: Design and Methods. Applied Social Research Methods","author":"RK Yin","year":"2003","unstructured":"Yin, R.K.: Case Study Research: Design and Methods. Applied Social Research Methods. SAGE Publications, Thousand Oaks (2003)"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2019: Theory and Practice of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10801-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:17:58Z","timestamp":1709810278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-10801-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030108007","9783030108014"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10801-4_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SOFSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Current Trends in Theory and Practice of Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nov\u00fd Smokovec","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 January 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"45","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sofsem2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/beda.dcs.fmph.uniba.sk\/sofsem2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}