Article (Scientific journals)
Fuzzing-based mutation testing of C/C++ software in cyber-physical systems
Lee, Jaekwon; PASTORE, Fabrizio; Briand, Lionel
2025In Empirical Software Engineering, 31 (1)
Peer Reviewed verified by ORBi Dataset
 

Files


Full Text
MOTIF.pdf
Embargo Until 15/Nov/2026 - Author postprint (1.86 MB)
Request a copy

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Fuzzing; Mutation testing; Test data generation; Cybe-physical systems; Cyber-physical systems; Fuzz Testing; Percentage points; Recommended practice; State of the art; Symbolic execution; Software
Abstract :
[en] Mutation testing can help minimize the delivery of faulty software. Therefore, it is a recommended practice for developing embedded software in safety-critical cyber-physical systems (CPS). However, state-of-the-art mutation testing techniques for C and C++ software, which are common languages for CPS, depend on symbolic execution. Unfortunately, symbolic execution’s limitations hinder its applicability (e.g., systems with black-box components). We propose relying on fuzz testing, which has demonstrated its effectiveness for C and C++ software. Fuzz testing tools automatically create test inputs that explore program branches in various ways, exercising statements in different program states, And thus enabling the detection of mutants, which is our objective. We empirically evaluated our approach using software components from operational satellite systems. Our assessment shows that our approach can detect between 40% And 90% of the mutants not detected by developers’ test suites. Further, we empirically determined that the best results are obtained by integrating the Clang compiler, a memory address sanitizer, And relying on laf-intel instrumentation to collect coverage And guide fuzzing. Our approach detects a significantly higher percentage of live mutants compared to symbolic execution, with an increase of up to 50 percentage points; further, we observed that although the combination of fuzzing and symbolic execution leads to additional mutants being killed, the benefits are minimal (a gain of less than one percentage point).
Disciplines :
Computer science
Author, co-author :
Lee, Jaekwon ;  Kangwon National University, Chun-cheon, South Korea
PASTORE, Fabrizio  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SVV
Briand, Lionel ;  Lero, University of Limerick, Limerick, Ireland ; University of Ottawa, Ottawa, Canada
External co-authors :
yes
Language :
English
Title :
Fuzzing-based mutation testing of C/C++ software in cyber-physical systems
Publication date :
November 2025
Journal title :
Empirical Software Engineering
ISSN :
1382-3256
eISSN :
1573-7616
Publisher :
Springer
Volume :
31
Issue :
1
Peer reviewed :
Peer Reviewed verified by ORBi
Name of the research project :
U-AGR-8154 - FAQAS II - PASTORE Fabrizio
Funders :
European Space Agency
NSERC Discovery and Canada Research Chair programs
Kangwon National University
Funding number :
RFQ/3-17554/21/NL/AS/kkIMPROVE
Funding text :
This research was supported by ESA via a GSTP element contract (RFQ/3-17554/21/NL/AS/kkIMPROVE), by the NSERC Discovery and Canada Research Chair programs, and by 2025 Research Grant from Kangwon National University. The experiments presented in this paper were carried out using the HPC facilities of the University of Luxembourg (see http://hpc.uni.lu).
Available on ORBilu :
since 19 December 2025

Statistics


Number of views
35 (0 by Unilu)
Number of downloads
0 (0 by Unilu)

Scopus citations®
 
0
Scopus citations®
without self-citations
0
OpenCitations
 
0
OpenAlex citations
 
0
WoS citations
 
0

Bibliography


Similar publications



Contact ORBilu