2022 RIVF International Conference on Computing and Communication Technologies (RIVF) 2022
DOI: 10.1109/rivf55975.2022.10013869
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Automated Test Data Generation for Units using Classes of Qt Framework in C++ Projects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…It is also possible to check whether the expected boundary values described by the contracts are observed. In [50], the dynamic symbolic execution is used for the testing of C++ Qt Framework classes. A source code preprocessing phase is used to find constructors of Qt classes parameters.…”
Section: Program Execution Analysis Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is also possible to check whether the expected boundary values described by the contracts are observed. In [50], the dynamic symbolic execution is used for the testing of C++ Qt Framework classes. A source code preprocessing phase is used to find constructors of Qt classes parameters.…”
Section: Program Execution Analysis Methodsmentioning
confidence: 99%
“…For the Java language, there are mostly search-based (6 papers, e.g., [76] or [79]) and then the machine-learning-based (3 papers - [80], [84], and [85]) and program execution analysis (3 papers - [43], [44], and [53]) methods. The program execution methods are prominent for the C/C++ programming languages (8 papers, e.g., [41] or [50]) and the data-description-based methods for the web applications (4 papers, e.g., [55] or [60]). The generally utilizable methods are mostly specification-(8 papers, e.g., [30] or [36]) and search-based (6 papers, e.g.…”
Section: Target Platformmentioning
confidence: 99%
“…After this preprocessing stage, a combination of data extraction techniques and classification methods is applied to detect source code vulnerabilities. Consequently, it can be observed that modern approaches to source code vulnerability detection typically focus on two main issues [6,7]: source code feature extraction methods and methods for predicting and classifying vulnerabilities based on these source code features.…”
Section: Introduction 1problemsmentioning
confidence: 99%