2014 Eighth International Conference on Software Security and Reliability 2014
DOI: 10.1109/sere.2014.29
|View full text |Cite
|
Sign up to set email alerts
|

Effective Regression Testing Using Requirements and Risks

Abstract: The use of system requirements and their risks enables software testers to identify more important test cases that can reveal faults associated with risky components. Having identified those test cases, software testers can manage the testing schedule more effectively by running such test cases earlier so that they can fix faults sooner. Some work in this area has been done, but the previous approaches and studies have some limitations, such as an improper use of requirements risks in prioritization and an ina… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…In order to perform risk assessment for the requirements, we identify four risk indicators that have been used by previous requirements and risk-based regression testing research [6,21,25,41]: requirements complexity (RC), requirements size (RS), requirements modification status (RMS), and potential security threats (PST). These previous studies indicate that these risk indicators can be effective in finding defects in software systems, thus we focus on these four risk indicators in this study, but we consider to use other risk indicators, such as usage rate [16], as we evaluate our approach in the future.…”
Section: Estimate Risks By Correlating With the Requirementsmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to perform risk assessment for the requirements, we identify four risk indicators that have been used by previous requirements and risk-based regression testing research [6,21,25,41]: requirements complexity (RC), requirements size (RS), requirements modification status (RMS), and potential security threats (PST). These previous studies indicate that these risk indicators can be effective in finding defects in software systems, thus we focus on these four risk indicators in this study, but we consider to use other risk indicators, such as usage rate [16], as we evaluate our approach in the future.…”
Section: Estimate Risks By Correlating With the Requirementsmentioning
confidence: 99%
“…We improved this process by introducing weights for the risk items (RiIM). The weight values for the risk items were obtained from our previous requirements riskbased research [21], and for this research, we further calibrated the weight values by using the risk exposure values for risk items in Yoon [48]. The risk items denoted potential defect types for a software system.…”
Section: Calculate the Risk Exposure Of Risk Itemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Yoon et al [24] identify more important test cases that are likely to detected effects associated with the system's risks by using requirements risks. Hettiarachchi et al [25], [26] propose a new requirements risk-based test case prioritization approach by considering the direct relationship between requirements risks and the test case.…”
Section: Related Workmentioning
confidence: 99%
“…Arafeen and Do [57] proposed an approach that clusters requirements based on similarities obtained through a text-mining technique and that prioritizes test cases using the requirements-tests relationship. In addition to requirements and design information, some other researchers have used software risk information to prioritize test cases in order to exercise test cases on the code areas with potential risks as early as possible [58,59].…”
Section: Data Sources and Techniquesmentioning
confidence: 99%