Mutation Testing and Its Analysis on Web Applications for Defect Prevention and Performance Improvement

Mutation Testing and Its Analysis on Web Applications for Defect Prevention and Performance Improvement

Suguna Mallika S., Rajya Lakshmi D.
Copyright: © 2021 |Pages: 18
DOI: 10.4018/IJeC.2021010105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The society's increasing reliance on web applications with the growing online market and digitization of almost every service, there is an increasing demand for better reliability, security, and interoperability of web applications. Testing becomes an integral part of improving this reliability on web applications. Despite the innumerable number of tools, techniques, methods for testing web applications, there is still scope for expansion in the code coverage of web applications. Mutation testing with its expansive potential to expose vulnerabilities of web applications took a backseat owing to its exhaustive testing cycles. Some mutation operators related to security, performance, and other non-functional attributes of web applications are presented in the current work. In the current work, a thorough analysis of various mutations operators proposed by authors towards the non-existent operators thus far is presented. An augment of 47% of operators occurred in the present work. A concise discussion on the scope of work future direction of work is presented.
Article Preview
Top

1. Introduction

Mutation testing is an established white box fault based testing method often overlooked for its laborious and exhaustive execution of test suites. Seeding of faults at known points, to trying to kill mutants by constantly increasing the input size, to analyzing the dead mutants versus the live mutants tests the typical tester’s time constraints (Woodward 1993). If a mutant is alive, the test is re-executed with an increase in the sample input size. If a mutant is alive despite increasing the input size, then the tester needs to enhance his test suite with a new test case incorporating the live mutant as the new mutation operator. Mutation testing not just helps thorough testing of the software in test but also helps in enhancement of test suite to cater to the future needs like regression testing and health testing of the software in test, be it a web application or any application. However, a thorough effort went into understanding the needs of a web application in testing in the current work and a consolidated effort concluded that web application testing becomes critical given its immense heterogeneity in terms of interactions, implementations, languages, etc (Lakshmi & Millika 2017).

Some of the popular case studies which emphasized on the importance of proper testing of web applications and implications of a poorly tested application are as below.

Pricing error on Amazon’s UK site lists iPaq H1910 Pocket PC for under $12 instead of regular retail price of $449 resulting in abnormally high sales in March 2003 (News.com n.d).

PayPal suffered from service outages for five days in October 2004 after upgrading site. They reason quoted to be as glitches in the software update and waived customer fees for a day http://www.eweek.com/article2/0,1759,1684427,00.asp (eWeek.com n.d.).

A bank in Denmark experiences outage due to errors in database recovery routines following replacement of defective disk in April 2003 (eWeek.com n.d.).

Comair airlines had to cancel more than 1,000 flights on Christmas Day 2004 when its computer systems for reservations crashed after a rough weather caused a damage to the physical computer systems of the organization (Internetnews.com n.d.).

Earlier researchers have done some extensive work in terms of proposing mutation operators for testing web applications (Kumar 2019; Kumar & Ramamoorthy 2018; Offutt et al., 2006; Praphamontripong & Offutt 2010; Kumar & Ramamoorthy 2017; Schuler & Zeller 2009; Schuler et al., 2009). However, there is a dearth for security related mutation operators which can further reveal security vulnerabilities of web applications (Lakshmi & Mallika 2017).

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 7 Issues (2023)
Volume 18: 6 Issues (2022): 3 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing