{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:21:43Z","timestamp":1775874103182,"version":"3.50.1"},"reference-count":85,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T00:00:00Z","timestamp":1680134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Luxembourg National Research Fund (FNR) TestFast Project","award":["12630949"],"award-info":[{"award-number":["12630949"]}]},{"name":"European Research Council (ERC) under the European Union\u2019s Horizon 2020 research and innovation programme","award":["949014"],"award-info":[{"award-number":["949014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2023,4,30]]},"abstract":"<jats:p>\n            Much research on software engineering relies on experimental studies based on fault injection. Fault injection, however, is not often relevant to emulate real-world software faults since it \u201cblindly\u201d injects large numbers of faults. It remains indeed challenging to inject few but realistic faults that target a particular functionality in a program. In this work, we introduce\n            <jats:sc>iBiR<\/jats:sc>\n            , a fault injection tool that addresses this challenge by exploring change patterns associated to user-reported faults. To inject realistic faults, we create mutants by re-targeting a bug-report-driven automated program repair system, i.e., reversing its code transformation templates.\n            <jats:sc>iBiR<\/jats:sc>\n            is further appealing in practice since it requires deep knowledge of neither code nor tests, just of the program\u2019s relevant bug reports. Thus, our approach focuses the fault injection on the feature targeted by the bug report. We assess\n            <jats:sc>iBiR<\/jats:sc>\n            by considering the Defects4J dataset. Experimental results show that our approach outperforms the fault injection performed by traditional mutation testing in terms of semantic similarity with the original bug, when applied at either system or class levels of granularity, and provides better, statistically significant estimations of test effectiveness (fault detection). Additionally, when injecting 100 faults,\n            <jats:sc>iBiR<\/jats:sc>\n            injects faults that couple with the real ones in around 36% of the cases, while mutation testing achieves less than 4%.\n          <\/jats:p>","DOI":"10.1145\/3542946","type":"journal-article","created":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T22:41:29Z","timestamp":1654987289000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["<scp>iBiR<\/scp>\n            : Bug-report-driven Fault Injection"],"prefix":"10.1145","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7471-6050","authenticated-orcid":false,"given":"Ahmed","family":"Khanfir","sequence":"first","affiliation":[{"name":"SnT, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6975-6752","authenticated-orcid":false,"given":"Anil","family":"Koyuncu","sequence":"additional","affiliation":[{"name":"Sabanci University, Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1852-2547","authenticated-orcid":false,"given":"Mike","family":"Papadakis","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8312-1358","authenticated-orcid":false,"given":"Maxime","family":"Cordy","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7270-9869","authenticated-orcid":false,"given":"Tegawende F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4052-475X","authenticated-orcid":false,"given":"Jacques","family":"Klein","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1045-4861","authenticated-orcid":false,"given":"Yves","family":"Le Traon","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2023,3,30]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"Ahmed Khanfir Anil Koyuncu Mike Papadakis Maxime Cordy Tegawende F. Bissyand\u00e9 Jacques Klein and Yves Le Traon. 2022. IBIR. Serval SnT University of Luxembourg. https:\/\/github.com\/serval-uni-lu\/IBIR."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.25"},{"key":"e_1_3_2_4_2","volume-title":"Design of Mutant Operators for the C Programming Language","author":"Agrawal Hiralal","year":"1989","unstructured":"Hiralal Agrawal, Richard A. DeMillo, Bob Hathaway, William Hsu, Wynne Hsu, E. W. Krauser, R. J. Martin, Aditya P. Mathur, and Eugene Spafford. 1989. Design of Mutant Operators for the C Programming Language. Techreport SERC-TR-41-P. Purdue University, West Lafayette, Indiana."},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809163"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.83"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.83"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/12.238482"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106280"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09778-7"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.61"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1996.534615"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.910859"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_3_2_16_2","first-page":"349","volume-title":"Proceedings of the 24th SANER","author":"Durieux Thomas","year":"2017","unstructured":"Thomas Durieux, Benoit Cornu, Lionel Seinturier, and Martin Monperrus. 2017. Dynamic patch generation for null pointer exceptions using metaprogramming. In Proceedings of the 24th SANER. IEEE, 349\u2013358."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7287.001.0001"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235403"},{"key":"e_1_3_2_19_2","volume-title":"Information Retrieval: Data Structures and Algorithms (st1 ed.)","author":"Frakes William B.","year":"1992","unstructured":"William B. Frakes and Ricardo Baeza-Yates. 1992. Information Retrieval: Data Structures and Algorithms (st1 ed.). Prentice Hall."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(96)00154-9"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.14"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.05.001"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3318162"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180245"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"e_1_3_2_27_2","first-page":"802","volume-title":"Proceedings of the 35th ICSE","author":"Kim Dongsun","year":"2013","unstructured":"Dongsun Kim, Jaechang Nam, Jaewoo Song, and Sunghun Kim. 2013. Automatic patch generation learned from human-written patches. In Proceedings of the 35th ICSE. IEEE, 802\u2013811."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210704"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9582-5"},{"key":"e_1_3_2_30_2","article-title":"D&C: A divide-and-conquer approach to IR-based bug localization","author":"Koyuncu Anil","year":"2019","unstructured":"Anil Koyuncu, Tegawend\u00e9 F. Bissyand\u00e9, Dongsun Kim, Kui Liu, Jacques Klein, Martin Monperrus, and Yves Le Traon. 2019. D&C: A divide-and-conquer approach to IR-based bug localization. arXiv preprint arXiv:1902.02703 (2019).","journal-title":"arXiv preprint arXiv:1902.02703"},{"key":"e_1_3_2_31_2","volume-title":"Proceedings of the 13th Joint Meeting on Foundations of Software Engineering (FSE\u201919)","author":"Koyuncu Anil","year":"2019","unstructured":"Anil Koyuncu, Kui Liu, Tegawend\u00e9 F. Bissyand\u00e9, Dongsun Kim, Martin Monperrus, Jacques Klein, and Yves Le Traon. 2019. iFixR: Bug report driven program repair. In Proceedings of the 13th Joint Meeting on Foundations of Software Engineering (FSE\u201919)."},{"key":"e_1_3_2_32_2","article-title":"FixMiner: Mining relevant fix patterns for automated program repair","author":"Koyuncu Anil","year":"2020","unstructured":"Anil Koyuncu, Kui Liu, Tegawend\u00e9 F. Bissyand\u00e9, Dongsun Kim, Jacques Klein, Martin Monperrus, and Yves Le Traon. 2020. FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering 25, 3 (2020), 1980\u20132024.","journal-title":"Empirical Software Engineering"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950322"},{"key":"e_1_3_2_34_2","series-title":"LNI","first-page":"118","volume-title":"Software Engineering & Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI) (FA WI-MAW\u201915)","author":"Lanzaro Anna","year":"2015","unstructured":"Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo, and Neeraj Suri. 2015. Error models for the representative injection of software defects. In Software Engineering & Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI) (FA WI-MAW\u201915)(LNI, Vol. P-239). GI, 118\u2013119."},{"key":"e_1_3_2_35_2","first-page":"430","volume-title":"2017 IEEE International Conference on Software Testing, Verification and Validation (ICST\u201917)","author":"Laurent Thomas","year":"2017","unstructured":"Thomas Laurent, Mike Papadakis, Marinos Kintis, Christopher Henard, Yves Le Traon, and Anthony Ventresque. 2017. Assessing and improving the mutation testing practice of PIT. In 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST\u201917). IEEE, 430\u2013435."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.47"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.30"},{"key":"e_1_3_2_38_2","first-page":"15","volume-title":"Proceedings of the 26th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI\u201905)","author":"Liblit Ben","year":"2005","unstructured":"Ben Liblit, Mayur Naik, Alice X. Zheng, Alex Aiken, and Michael I. Jordan. 2005. Scalable statistical bug isolation. In Proceedings of the 26th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI\u201905). 15\u201326."},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2884955"},{"key":"e_1_3_2_40_2","first-page":"1","volume-title":"Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER\u201919)","author":"Liu Kui","year":"2019","unstructured":"Kui Liu, Anil Koyuncu, Dongsun Kim, and Tegawend\u00e9 F. Bissyand\u00e9. 2019. Avatar: Fixing semantic bugs with fix patterns of static analysis violations. In Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER\u201919). 1\u201312."},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330577"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397351"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.04.002"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.308"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.5555\/311445"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180191"},{"key":"e_1_3_2_47_2","first-page":"65","volume-title":"Proceedings of the 10th SSBSE","author":"Martinez Matias","year":"2018","unstructured":"Matias Martinez and Martin Monperrus. 2018. Ultra-large repair search space with automatically mined templates: The Cardumen mode of Astor. In Proceedings of the 10th SSBSE. Springer, 65\u201386."},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/1-4020-3467-9_7","volume-title":"Charting a New Course: Natural Language Processing and Information Retrieval","author":"Maybury Mark T.","year":"2005","unstructured":"Mark T. Maybury. 2005. Karen Sp\u00e4rck Jones and summarization. In Charting a New Course: Natural Language Processing and Information Retrieval. Springer, 99\u2013103."},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2371458"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.14"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.124"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/125489.125473"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227610"},{"key":"e_1_3_2_55_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1138929.1138945","volume-title":"Proceedings of the International Workshop on Automation of Software Test (AST\u201906)","author":"Offutt A. Jefferson","year":"2006","unstructured":"A. Jefferson Offutt, Yu-Seung Ma, and Yong-Rae Kwon. 2006. The class-level mutants of mujava. In Proceedings of the International Workshop on Automation of Software Test (AST\u201906). 78\u201384."},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.5555\/257572.257597"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950401"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2018.00025"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.05.012"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931040"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.015"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180183"},{"key":"e_1_3_2_64_2","first-page":"199","volume-title":"Proceedings of the 20th ISSTA","author":"Parnin Chris","year":"2011","unstructured":"Chris Parnin and Alessandro Orso. 2011. Are automated debugging techniques actually helping programmers? In Proceedings of the 20th ISSTA. ACM, 199\u2013209."},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/967900.968151"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155643"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.5555\/576628"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.02.006"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.27"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00046"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.3102\/10769986025002101"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/52.595959"},{"key":"e_1_3_2_74_2","volume-title":"Software Fault Injection: Inoculating Programs against Errors","author":"Voas Jeffrey M.","year":"1997","unstructured":"Jeffrey M. Voas and Gary McGraw. 1997. Software Fault Injection: Inoculating Programs against Errors. John Wiley & Sons, Inc.."},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771797"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597148"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180233"},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970359"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.40"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.09.037"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_82_2","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/APSEC.2015.23","volume-title":"Proceedings of the 2015 Asia-Pacific Software Engineering Conference (ICSE\u201915)","author":"Youm Klaus Changsun","year":"2015","unstructured":"Klaus Changsun Youm, June Ahn, Jeongho Kim, and Eunseok Lee. 2015. Bug localization based on code change histories and bug reports. In Proceedings of the 2015 Asia-Pacific Software Engineering Conference (ICSE\u201915). 190\u2013197."},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2809496"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693070"},{"key":"e_1_3_2_85_2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/ICSE.2012.6227210","volume-title":"Proceedings of the 2012 International Conference on Software Engineering (ICSE\u201912)","author":"Zhou Jian","year":"2012","unstructured":"Jian Zhou, Hongyu Zhang, and David Lo. 2012. Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports. In Proceedings of the 2012 International Conference on Software Engineering (ICSE\u201912). 14\u201324."},{"key":"e_1_3_2_86_2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/ICSE.2012.6227210","volume-title":"2012 34th International Conference on Software Engineering (ICSE\u201912)","author":"Zhou Jian","year":"2012","unstructured":"Jian Zhou, Hongyu Zhang, and David Lo. 2012. Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports. In 2012 34th International Conference on Software Engineering (ICSE\u201912). IEEE, 14\u201324."}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3542946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:31Z","timestamp":1750182571000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,30]]},"references-count":85,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4,30]]}},"alternative-id":["10.1145\/3542946"],"URL":"https:\/\/doi.org\/10.1145\/3542946","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,30]]},"assertion":[{"value":"2021-04-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}