{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T22:27:45Z","timestamp":1726439265909},"reference-count":34,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03","funder":[{"name":"the China Defense Industrial Technology Development Program","award":["JCKY2016206B001","JCKY2014206C002"],"award-info":[{"award-number":["JCKY2016206B001","JCKY2014206C002"]}]},{"name":"the Science and Technology Planning Project of Jiangsu Province","award":["BY2016003-02"],"award-info":[{"award-number":["BY2016003-02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2020,3]]},"abstract":"<jats:p> Generating faulty data is a key issue in fault injection. The faulty data include not only the ones of extreme values or bad formats, but also the ones which are logically unreasonable. Constraint-based fault injection which negates interface constraints to solve faulty data is effective for logically unreasonable data generation. However, the existing constraint-based approaches just solve brand new data for testing. Such brand new data may easily violate some hidden environment constraints on the test inputs and hence be nonrealistic. Besides, there can be different strategies to negate a constraint in order to derive the constraint-unsatisfied faulty data. What are the possible negation strategies and which strategies are better for high coverage fault injection are still unclear. To these ends, this paper presents a new constraint-based fault injection approach. The approach introduces 10 different strategies for constraint negation and relaxes constraint variables to generate faulty data instead of solving brand new data for fault injection. It can produce faulty data which are closer to the original non-faulty ones and hence likely to be more realistic. We experimentally investigated the effectiveness and cost of the introduced constraint negation strategies. The results provide insights for the application of these strategies in fault injection. <\/jats:p>","DOI":"10.1142\/s0218194020500187","type":"journal-article","created":{"date-parts":[[2020,4,29]],"date-time":"2020-04-29T09:53:38Z","timestamp":1588154018000},"page":"451-479","source":"Crossref","is-referenced-by-count":1,"title":["Towards Generating Realistic and High Coverage Test Data for Constraint-Based Fault Injection"],"prefix":"10.1142","volume":"30","author":[{"given":"Ju","family":"Qian","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, P.\u00a0R.\u00a0China"},{"name":"Collaborative Innovation Center of Novel, Software Technology and Industrialization, Nanjing 210023, P.\u00a0R.\u00a0China"}]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, P.\u00a0R.\u00a0China"},{"name":"Collaborative Innovation Center of Novel, Software Technology and Industrialization, Nanjing 210023, P.\u00a0R.\u00a0China"}]},{"given":"Fusheng","family":"Lin","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, P.\u00a0R.\u00a0China"},{"name":"Collaborative Innovation Center of Novel, Software Technology and Industrialization, Nanjing 210023, P.\u00a0R.\u00a0China"}]},{"given":"Changjian","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, P.\u00a0R.\u00a0China"},{"name":"Collaborative Innovation Center of Novel, Software Technology and Industrialization, Nanjing 210023, P.\u00a0R.\u00a0China"}]},{"given":"Zhiyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, P.\u00a0R.\u00a0China"},{"name":"Collaborative Innovation Center of Novel, Software Technology and Industrialization, Nanjing 210023, P.\u00a0R.\u00a0China"}]},{"given":"Xuefeng","family":"Yan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, P.\u00a0R.\u00a0China"},{"name":"Collaborative Innovation Center of Novel, Software Technology and Industrialization, Nanjing 210023, P.\u00a0R.\u00a0China"}]}],"member":"219","published-online":{"date-parts":[[2020,4,28]]},"reference":[{"key":"S0218194020500187BIB002","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.17"},{"key":"S0218194020500187BIB003","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"S0218194020500187BIB004","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001452"},{"key":"S0218194020500187BIB005","doi-asserted-by":"publisher","DOI":"10.1109\/12.54853"},{"key":"S0218194020500187BIB006","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2015.0154"},{"volume-title":"Workshop on Self-Healing, Adaptive and Self-Managed Systems","year":"2002","author":"Broadwell P.","key":"S0218194020500187BIB007"},{"key":"S0218194020500187BIB008","first-page":"209","volume-title":"Unix User\u2019s Group Symp. Operating Systems Design and Implementation","author":"Cadar C.","year":"2008"},{"key":"S0218194020500187BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"S0218194020500187BIB010","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"S0218194020500187BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730886"},{"key":"S0218194020500187BIB012","first-page":"50","volume-title":"32nd IEEE\/ACM Int. Conf. Automated Software Engineering","author":"Godefroid P.","year":"2007"},{"key":"S0218194020500187BIB013","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"S0218194020500187BIB014","first-page":"151","volume-title":"Proc. Network and Distributed System Security Symp.","author":"Godefroid P.","year":"2008"},{"key":"S0218194020500187BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08789-4_3"},{"key":"S0218194020500187BIB016","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2015.05.002"},{"key":"S0218194020500187BIB017","first-page":"238","volume-title":"Proc. Unix User\u2019s Group Symp. Networked Systems Design and Implementation","author":"Gunawi H. S.","year":"2011"},{"key":"S0218194020500187BIB018","first-page":"204","volume-title":"Proc. International Computer Performance and Dependability Symp.","author":"Han S.","year":"1995"},{"key":"S0218194020500187BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.10"},{"key":"S0218194020500187BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.36"},{"key":"S0218194020500187BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.71"},{"key":"S0218194020500187BIB022","doi-asserted-by":"publisher","DOI":"10.1145\/2076021.2048082"},{"key":"S0218194020500187BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/32.877845"},{"key":"S0218194020500187BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.09.052"},{"key":"S0218194020500187BIB025","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610418"},{"key":"S0218194020500187BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.124"},{"key":"S0218194020500187BIB027","doi-asserted-by":"publisher","DOI":"10.1145\/2841425"},{"key":"S0218194020500187BIB028","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.219"},{"issue":"2","key":"S0218194020500187BIB029","first-page":"503","volume":"28","author":"Pham C.","year":"2017","journal-title":"IEEE Trans. Parallel Distributed Syst."},{"key":"S0218194020500187BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10272"},{"key":"S0218194020500187BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.161"},{"key":"S0218194020500187BIB032","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.017"},{"key":"S0218194020500187BIB033","first-page":"144","volume-title":"46th Annual IEEE\/IFIP Int. Conf. Dependable Systems and Networks","author":"van der Kouwe E.","year":"2016"},{"key":"S0218194020500187BIB034","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985801"},{"key":"S0218194020500187BIB035","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575310"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194020500187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,29]],"date-time":"2020-04-29T09:53:56Z","timestamp":1588154036000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194020500187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":34,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["10.1142\/S0218194020500187"],"URL":"https:\/\/doi.org\/10.1142\/s0218194020500187","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"type":"print","value":"0218-1940"},{"type":"electronic","value":"1793-6403"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}