Sort:
Open Access Issue
A Novel Cross-Project Software Defect Prediction Algorithm Based on Transfer Learning
Tsinghua Science and Technology 2022, 27 (1): 41-57
Published: 17 August 2021
Downloads:117

Software Defect Prediction (SDP) technology is an effective tool for improving software system quality that has attracted much attention in recent years. However, the prediction of cross-project data remains a challenge for the traditional SDP method due to the different distributions of the training and testing datasets. Another major difficulty is the class imbalance issue that must be addressed in Cross-Project Defect Prediction (CPDP). In this work, we propose a transfer-leaning algorithm (TSboostDF) that considers both knowledge transfer and class imbalance for CPDP. The experimental results demonstrate that the performance achieved by TSboostDF is better than those of existing CPDP methods.

Open Access Issue
Mutation Testing for Integer Overflow in Ethereum Smart Contracts
Tsinghua Science and Technology 2022, 27 (1): 27-40
Published: 17 August 2021
Downloads:101

Integer overflow is a common vulnerability in Ethereum Smart Contracts (ESCs) and often causes huge economic losses. Smart contracts cannot be changed once it is deployed on the blockchain and thus demand further testing. Mutation testing is a fault-based testing method that can effectively improve the sufficiency of a test for smart contracts. However, existing methods cannot efficiently perform mutation testing specifically for integer overflow in ESCs. Therefore, by analyzing integer overflow in ESCs, we propose five special mutation operators to address such vulnerability in terms of detecting sufficiency in ESC testing. An empirical study on 40 open-source ESCs is conducted to evaluate the effectiveness of the proposed mutation operators. Results show that (1) our proposed mutation operators can reproduce all 179 integer overflow vulnerabilities in 40 smart contracts, and the generated mutants have high compilation pass rate and integer overflow vulnerability generation rate; moreover, (2) the generated mutants can find the shortcomings of existing testing methods for integer overflow vulnerability, thereby providing effective support to improve the sufficiency of the test.

total 2