Publication | Closed Access
Testing of java web services for robustness
62
Citations
34
References
2004
Year
Unknown Venue
Software MaintenanceWeb Service SpecificationEngineeringVerificationRobustness TestingSoftware EngineeringSoftware AnalysisFormal VerificationSoftware Performance TestingStatic CheckingCompilersRuntime VerificationWeb Service EnhancementJava Web ServicesComputer ScienceStatic Program AnalysisProgram AnalysisSoftware TestingRuntime Test HarnessFormal MethodsFault InjectionSystem Software
This paper presents a new compile-time analysis that enables a testing methodology for white-box coverage testing of error recovery code (i.e., exception handlers) in Java web services using compiler-directed fault injection. The analysis allows compiler-generated instrumentation to guide the fault injection and to record the recovery code exercised. (An injected fault is experienced as a Java exception.) The analysis (i) identifies the exception-flow 'def-uses' to be tested in this manner, (ii) determines the kind of fault to be requested at a program point, and (iii) finds appropriate locations for code instrumentation. The analysis incorporates refinements that establish sufficient context sensitivity to ensure relatively precise def-use links and to eliminate some spurious def-uses due to demonstrably infeasible control flow. A runtime test harness calculates test coverage of these links using an exception def-catch metric. Experiments with the methodology demonstrate the utility of the increased precision in obtaining good test coverage on a set of moderately-sized Java web services benchmarks.
| Year | Citations | |
|---|---|---|
Page 1
Page 1