Wang et al., 2025 - Google Patents
An empirical study of test case prioritization on the Linux KernelWang et al., 2025
- Document ID
- 4360369491614373760
- Author
- Wang H
- Yu R
- Wang D
- Du Y
- Zhao Y
- Chen J
- Wang Z
- Publication year
- Publication venue
- Automated Software Engineering
External Links
Snippet
The Linux kernel is a complex and constantly evolving system, where each code change can impact different components of the system. Regression testing ensures that new changes do not affect existing functionality or introduce new defects. However, due to the …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3688—Test management for test execution, e.g. scheduling of test suites
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3676—Test management for coverage analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zheng et al. | Dappscan: building large-scale datasets for smart contract weaknesses in dapp projects | |
| Zheng et al. | Turn the rudder: A beacon of reentrancy detection for smart contracts on ethereum | |
| Zhang et al. | Which configuration option should I change? | |
| Tan et al. | Syzdirect: Directed greybox fuzzing for linux kernel | |
| Davies et al. | Comparing text‐based and dependence‐based approaches for determining the origins of bugs | |
| Nguyen et al. | Cross-language program slicing for dynamic web applications | |
| Dong et al. | Bash in the wild: Language usage, code smells, and bugs | |
| Danglot et al. | An approach and benchmark to detect behavioral changes of commits in continuous integration | |
| Corradini et al. | Automated black-box testing of mass assignment vulnerabilities in restful apis | |
| Hu et al. | Assessing and advancing benchmarks for evaluating large language models in software engineering tasks | |
| Muske et al. | Survey of approaches for postprocessing of static analysis alarms | |
| Yang et al. | Mining Python fix patterns via analyzing fine-grained source code changes | |
| Yu et al. | {PATCHAGENT}: A Practical Program Repair Agent Mimicking Human Expertise | |
| Sun et al. | Adversarial generation method for smart contract fuzz testing seeds guided by chain-based LLM | |
| Chen et al. | Tips: towards automating patch suggestion for vulnerable smart contracts | |
| Liu et al. | Reliable fix patterns inferred from static checkers for automated program repair | |
| Paaßen et al. | My fuzzer beats them all! developing a framework for fair evaluation and comparison of fuzzers | |
| Prado Lima et al. | Cost-effective learning-based strategies for test case prioritization in continuous integration of highly-configurable software | |
| Hassan et al. | UniLoc: Unified fault localization of continuous integration failures | |
| Zhang et al. | Fixing security vulnerabilities with AI in OSS-Fuzz | |
| Wang et al. | An empirical study of test case prioritization on the Linux Kernel | |
| Li et al. | Automated static vulnerability detection via a holistic neuro-symbolic approach | |
| Ksontini et al. | Refactoring for dockerfile quality: A dive into developer practices and automation potential | |
| Tan et al. | Similar but patched code considered harmful: The impact of similar but patched code on recurring vulnerability detection and how to remove them | |
| Zhang et al. | Fixing outside the box: Uncovering tactics for open-source security issue management |