BUGSJS: a benchmark and taxonomy of JavaScript bugs

Summary JavaScript is a popular programming language that is also error‐prone due to its asynchronous, dynamic, and loosely typed nature. In recent years, numerous techniques have been proposed for analyzing and testing JavaScript applications. However, our survey of the literature in this area reve...

Full description

Saved in:
Bibliographic Details
Published in:Software testing, verification & reliability Vol. 31; no. 4
Main Authors: Gyimesi, Péter, Vancsics, Béla, Stocco, Andrea, Mazinanian, Davood, Beszédes, Árpád, Ferenc, Rudolf, Mesbah, Ali
Format: Journal Article
Language:English
Published: Chichester Wiley Subscription Services, Inc 01.06.2021
Subjects:
ISSN:0960-0833, 1099-1689
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Summary JavaScript is a popular programming language that is also error‐prone due to its asynchronous, dynamic, and loosely typed nature. In recent years, numerous techniques have been proposed for analyzing and testing JavaScript applications. However, our survey of the literature in this area revealed that the proposed techniques are often evaluated on different datasets of programs and bugs. The lack of a commonly used benchmark limits the ability to perform fair and unbiased comparisons for assessing the efficacy of new techniques. To fill this gap, we propose BugsJS, a benchmark of 453 real, manually validated JavaScript bugs from 10 popular JavaScript server‐side programs, comprising 444k lines of code (LOC) in total. Each bug is accompanied by its bug report, the test cases that expose it, as well as the patch that fixes it. We extended BugsJS with a rich web interface for visualizing and dissecting the bugs' information, as well as a programmable API to access the faulty and fixed versions of the programs and to execute the corresponding test cases, which facilitates conducting highly reproducible empirical studies and comparisons of JavaScript analysis and testing tools. Moreover, following a rigorous procedure, we performed a classification of the bugs according to their nature. Our internal validation shows that our taxonomy is adequate for characterizing the bugs in BugsJS. We discuss several ways in which the resulting taxonomy and the benchmark can help direct researchers interested in automated testing of JavaScript applications. © 2021 The Authors. Software Testing, Verification & Reliability published by John Wiley & Sons, Ltd. In this study, we propose BugsJS, a benchmark of 453 real JavaScript bugs from 10 server‐side programs. We extended BugsJS with a rich web interface for visualizing and dissecting the bugs' information, as well as a programmable API to access the faulty source code and to execute the corresponding test cases, which facilitates conducting highly reproducible empirical studies and comparisons of JavaScript analysis and testing tools. Moreover, we performed a classification of the bugs according to their nature.
AbstractList Summary JavaScript is a popular programming language that is also error‐prone due to its asynchronous, dynamic, and loosely typed nature. In recent years, numerous techniques have been proposed for analyzing and testing JavaScript applications. However, our survey of the literature in this area revealed that the proposed techniques are often evaluated on different datasets of programs and bugs. The lack of a commonly used benchmark limits the ability to perform fair and unbiased comparisons for assessing the efficacy of new techniques. To fill this gap, we propose BugsJS, a benchmark of 453 real, manually validated JavaScript bugs from 10 popular JavaScript server‐side programs, comprising 444k lines of code (LOC) in total. Each bug is accompanied by its bug report, the test cases that expose it, as well as the patch that fixes it. We extended BugsJS with a rich web interface for visualizing and dissecting the bugs' information, as well as a programmable API to access the faulty and fixed versions of the programs and to execute the corresponding test cases, which facilitates conducting highly reproducible empirical studies and comparisons of JavaScript analysis and testing tools. Moreover, following a rigorous procedure, we performed a classification of the bugs according to their nature. Our internal validation shows that our taxonomy is adequate for characterizing the bugs in BugsJS. We discuss several ways in which the resulting taxonomy and the benchmark can help direct researchers interested in automated testing of JavaScript applications. © 2021 The Authors. Software Testing, Verification & Reliability published by John Wiley & Sons, Ltd. In this study, we propose BugsJS, a benchmark of 453 real JavaScript bugs from 10 server‐side programs. We extended BugsJS with a rich web interface for visualizing and dissecting the bugs' information, as well as a programmable API to access the faulty source code and to execute the corresponding test cases, which facilitates conducting highly reproducible empirical studies and comparisons of JavaScript analysis and testing tools. Moreover, we performed a classification of the bugs according to their nature.
JavaScript is a popular programming language that is also error‐prone due to its asynchronous, dynamic, and loosely typed nature. In recent years, numerous techniques have been proposed for analyzing and testing JavaScript applications. However, our survey of the literature in this area revealed that the proposed techniques are often evaluated on different datasets of programs and bugs. The lack of a commonly used benchmark limits the ability to perform fair and unbiased comparisons for assessing the efficacy of new techniques. To fill this gap, we propose BugsJS, a benchmark of 453 real, manually validated JavaScript bugs from 10 popular JavaScript server‐side programs, comprising 444k lines of code (LOC) in total. Each bug is accompanied by its bug report, the test cases that expose it, as well as the patch that fixes it. We extended BugsJS with a rich web interface for visualizing and dissecting the bugs' information, as well as a programmable API to access the faulty and fixed versions of the programs and to execute the corresponding test cases, which facilitates conducting highly reproducible empirical studies and comparisons of JavaScript analysis and testing tools. Moreover, following a rigorous procedure, we performed a classification of the bugs according to their nature. Our internal validation shows that our taxonomy is adequate for characterizing the bugs in BugsJS. We discuss several ways in which the resulting taxonomy and the benchmark can help direct researchers interested in automated testing of JavaScript applications. © 2021 The Authors. Software Testing, Verification & Reliability published by John Wiley & Sons, Ltd.
JavaScript is a popular programming language that is also error‐prone due to its asynchronous, dynamic, and loosely typed nature. In recent years, numerous techniques have been proposed for analyzing and testing JavaScript applications. However, our survey of the literature in this area revealed that the proposed techniques are often evaluated on different datasets of programs and bugs. The lack of a commonly used benchmark limits the ability to perform fair and unbiased comparisons for assessing the efficacy of new techniques. To fill this gap, we propose BugsJS , a benchmark of 453 real, manually validated JavaScript bugs from 10 popular JavaScript server‐side programs, comprising 444k lines of code (LOC) in total. Each bug is accompanied by its bug report, the test cases that expose it, as well as the patch that fixes it. We extended BugsJS with a rich web interface for visualizing and dissecting the bugs' information, as well as a programmable API to access the faulty and fixed versions of the programs and to execute the corresponding test cases, which facilitates conducting highly reproducible empirical studies and comparisons of JavaScript analysis and testing tools. Moreover, following a rigorous procedure, we performed a classification of the bugs according to their nature. Our internal validation shows that our taxonomy is adequate for characterizing the bugs in BugsJS . We discuss several ways in which the resulting taxonomy and the benchmark can help direct researchers interested in automated testing of JavaScript applications. © 2021 The Authors. Software Testing, Verification & Reliability published by John Wiley & Sons, Ltd.
Author Vancsics, Béla
Mesbah, Ali
Stocco, Andrea
Ferenc, Rudolf
Beszédes, Árpád
Gyimesi, Péter
Mazinanian, Davood
Author_xml – sequence: 1
  givenname: Péter
  orcidid: 0000-0001-8504-9038
  surname: Gyimesi
  fullname: Gyimesi, Péter
  email: pgyimesi@inf.u-szeged.hu
  organization: University of Szeged
– sequence: 2
  givenname: Béla
  surname: Vancsics
  fullname: Vancsics, Béla
  organization: University of Szeged
– sequence: 3
  givenname: Andrea
  orcidid: 0000-0001-8956-3894
  surname: Stocco
  fullname: Stocco, Andrea
  organization: Università della Svizzera italiana
– sequence: 4
  givenname: Davood
  surname: Mazinanian
  fullname: Mazinanian, Davood
  organization: University of British Columbia
– sequence: 5
  givenname: Árpád
  orcidid: 0000-0002-5421-9302
  surname: Beszédes
  fullname: Beszédes, Árpád
  organization: University of Szeged
– sequence: 6
  givenname: Rudolf
  orcidid: 0000-0001-8897-7403
  surname: Ferenc
  fullname: Ferenc, Rudolf
  organization: University of Szeged
– sequence: 7
  givenname: Ali
  surname: Mesbah
  fullname: Mesbah, Ali
  organization: University of British Columbia
BookMark eNp9kE1PAjEURRuDiYAu_AdNXLkY6LdTd0oUNSQmDrht-jHVQZhiO6D8ewdxZaKLl7c557682wOdOtQlAKcYDTBCZJiaTRzgC44PQBcjKTMsctkBXSQFylBO6RHopTRHCAkpZBfQ69m4eCguoYamrO3rUsc3qGsHG_0Z6rDcwuDhg97owsZq1UCzfknH4NDrRSpPfnYfzG5vpqO7bPI4vh9dTTJLKcGZM5IzkRMnHRNGsJxr54grjWcac5xr5oXPMcMWOYa4ydsxniJOGdbEWNoHZ_vcVQzv6zI1ah7WsW5PKsIJEwS3Wkud7ykbQ0qx9GoVq_aNrcJI7TpRu07UrpOWHf5ibdXopgp1E3W1-M_4qBbl9u9oVUyfn76NL2XSc_4
CitedBy_id crossref_primary_10_1109_TSE_2025_3554403
crossref_primary_10_1145_3593802
crossref_primary_10_1145_3715759
crossref_primary_10_1007_s10664_025_10614_4
crossref_primary_10_1016_j_jss_2022_111423
crossref_primary_10_1109_TSE_2020_3032986
crossref_primary_10_1109_TSE_2022_3194188
Cites_doi 10.1145/2884781.2884864
10.1109/32.177364
10.1109/TSE.2016.2586066
10.1145/2884781.2884859
10.1145/3062341.3062364
10.1145/3106739
10.1145/2635868.2635929
10.1007/11531142_19
10.1109/ICSE.2015.51
10.1109/ICSE.2017.34
10.1145/1181309.1181314
10.1145/3196398.3196473
10.1109/ICST.2014.17
10.1109/ICSME.2018.00023
10.1109/32.799955
10.1007/s10664-017-9550-0
10.1007/s10664-013-9258-8
10.1145/2610384.2628055
10.1145/3064176.3064188
10.1145/2601248.2601268
10.1109/ICSE.2015.101
10.1109/TSE.2016.2521368
10.1109/ICPC.2015.15
10.1109/ICSE.2017.62
10.1109/TSE.2011.28
10.1145/3236024.3236063
10.1109/WCRE.2012.30
10.1109/ISSRE.2014.40
10.1145/3183440.3195097
10.1145/3135932.3135941
10.7551/mitpress/3828.001.0001
10.1109/ICST.2015.7102595
10.1109/ASE.2017.8115663
10.1145/1985441.1985456
10.1007/978-3-540-31987-0_28
10.1145/2568225.2568257
10.1007/978-3-319-56856-0_11
10.1145/3196398.3196454
10.1016/j.cola.2019.03.006
10.1109/ICSE.2017.66
10.1109/ICST.2013.23
10.1145/1985793.1985871
10.1145/2931037.2931053
10.1109/ASE.2015.26
10.1109/ICTKE.2013.6756268
10.1109/ICSE.2019.00045
10.1145/2884781.2884846
10.1109/ICST.2019.00019
10.1145/3213846.3213866
10.1109/ICST.2018.00022
10.1109/TSE.2010.62
10.1007/s10664-005-3861-2
10.1016/j.jss.2019.03.002
10.1109/ICSME.2016.29
10.1109/ICSE.2015.52
10.1109/SANER.2018.8330203
10.1109/ICSE-C.2017.6
10.1109/ICSE.2017.75
10.1109/ICST.2017.28
10.1007/978-3-642-31753-8_18
10.1007/s10664-008-9077-5
10.1109/TSE.2014.2371458
10.1109/ICSE.2012.6227195
10.1109/TSE.2015.2454513
10.1109/ESEM.2017.55
10.1109/ICSE.2019.00048
10.1145/2950290.2950308
10.1109/ASE.2017.8115667
10.1145/2950290.2950294
10.1109/ICST.2017.9
10.1109/ICST.2016.32
ContentType Journal Article
Copyright 2020 The Authors. Software Testing, Verification & Reliability published by John Wiley & Sons Ltd
2020. This article is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2020 The Authors. Software Testing, Verification & Reliability published by John Wiley & Sons Ltd
– notice: 2020. This article is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 24P
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/stvr.1751
DatabaseName Wiley Online Library Open Access
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
CrossRef
Database_xml – sequence: 1
  dbid: 24P
  name: Wiley Online Library Open Access
  url: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1099-1689
EndPage n/a
ExternalDocumentID 10_1002_stvr_1751
STVR1751
Genre article
GrantInformation_xml – fundername: Hungarian National Research, Development and Innovation Office
  funderid: 2018‐1.2.1‐NKP‐2018‐00004
– fundername: Natural Sciences and Engineering Research Council of Canada
  funderid: Discovery Accelerator Supplements
– fundername: European Social Fund
  funderid: EFOP‐3.6.3‐VEKOP‐16‐2017‐0002
– fundername: European Commission
  funderid: GINOP‐2.3.2‐15‐2016‐00037
– fundername: Ministry for Innovation and Technology, Hungary
  funderid: TUDFO/47138‐1/2019‐ITM
GroupedDBID .3N
.4S
.DC
.GA
.Y3
05W
0R~
123
1L6
1OB
1OC
24P
31~
33P
3SF
3WU
4.4
50Y
50Z
52M
52O
52T
52U
52W
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANHP
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAYOK
AAZKR
ABCUV
ABIJN
ABPVW
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACGFS
ACIWK
ACPOU
ACRPL
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADNMO
ADOZA
ADXAS
ADZMN
AEEZP
AEIGN
AEIMD
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AFZJQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ARCSS
ASPBG
ATUGU
AUFTA
AVWKF
AZBYB
AZFZN
AZVAB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BROTX
BRXPI
CS3
CWDTD
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
EDO
EJD
F00
F01
F04
F21
FEDTE
G-S
G.N
GNP
GODZA
H.T
H.X
HF~
HGLYW
HHY
HVGLF
HZ~
I-F
IX1
JPC
KQQ
LATKE
LAW
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LW6
LYRES
M61
MEWTI
MK4
MK~
ML~
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
NF~
NNB
O66
O9-
OIG
P2P
P2W
P2X
P4D
PALCI
PQQKQ
Q.N
QB0
QRW
R.K
RIWAO
RJQFR
ROL
RWI
RX1
SAMSI
SUPJJ
TUS
UB1
V2E
W8V
W99
WBKPD
WIB
WIH
WIK
WOHZO
WWW
WXSBR
WYISQ
WZISG
XPP
XV2
ZZTAW
~IA
~WT
AAYXX
ADMLS
AEYWJ
AGHNM
AGQPQ
AGYGG
AIQQE
CITATION
O8X
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c3321-db954682d9d46b6485add2debf4a1518a4f6f8141c0d405b805bbf305341a2bc3
IEDL.DBID 24P
ISICitedReferencesCount 15
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000578852600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0960-0833
IngestDate Thu Jul 03 20:24:24 EDT 2025
Tue Nov 18 22:15:27 EST 2025
Sat Nov 29 05:28:55 EST 2025
Wed Jan 22 16:29:27 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License Attribution
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3321-db954682d9d46b6485add2debf4a1518a4f6f8141c0d405b805bbf305341a2bc3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8504-9038
0000-0002-5421-9302
0000-0001-8956-3894
0000-0001-8897-7403
OpenAccessLink https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fstvr.1751
PQID 2524621405
PQPubID 1046350
PageCount 38
ParticipantIDs proquest_journals_2524621405
crossref_primary_10_1002_stvr_1751
crossref_citationtrail_10_1002_stvr_1751
wiley_primary_10_1002_stvr_1751_STVR1751
PublicationCentury 2000
PublicationDate June 2021
2021-06-00
20210601
PublicationDateYYYYMMDD 2021-06-01
PublicationDate_xml – month: 06
  year: 2021
  text: June 2021
PublicationDecade 2020
PublicationPlace Chichester
PublicationPlace_xml – name: Chichester
PublicationTitle Software testing, verification & reliability
PublicationYear 2021
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2012
2019; 53
2011
2017; 43
1999; 25
2009
1992; 18
2006
2005
1994
2011; 37
2018; 23
2017; 50
2009; 14
2000
2015; 41
2019
2016; 42
2018
2017
2005; 10
2016
2015
2014; 19
2014
2013
2019; 152
2016; 26
e_1_2_10_23_1
e_1_2_10_46_1
e_1_2_10_69_1
e_1_2_10_21_1
e_1_2_10_44_1
e_1_2_10_42_1
e_1_2_10_40_1
e_1_2_10_70_1
e_1_2_10_2_1
e_1_2_10_72_1
e_1_2_10_4_1
e_1_2_10_18_1
e_1_2_10_74_1
e_1_2_10_53_1
e_1_2_10_6_1
e_1_2_10_16_1
e_1_2_10_39_1
e_1_2_10_76_1
e_1_2_10_55_1
e_1_2_10_8_1
e_1_2_10_14_1
e_1_2_10_37_1
e_1_2_10_57_1
e_1_2_10_78_1
e_1_2_10_58_1
e_1_2_10_13_1
e_1_2_10_34_1
e_1_2_10_11_1
e_1_2_10_32_1
e_1_2_10_30_1
e_1_2_10_51_1
e_1_2_10_80_1
e_1_2_10_82_1
e_1_2_10_61_1
e_1_2_10_63_1
e_1_2_10_27_1
e_1_2_10_65_1
e_1_2_10_25_1
e_1_2_10_48_1
e_1_2_10_67_1
e_1_2_10_24_1
e_1_2_10_45_1
e_1_2_10_22_1
e_1_2_10_43_1
e_1_2_10_20_1
e_1_2_10_41_1
Ocariza FS (e_1_2_10_29_1) 2016; 26
e_1_2_10_71_1
e_1_2_10_73_1
e_1_2_10_52_1
e_1_2_10_3_1
e_1_2_10_19_1
e_1_2_10_75_1
e_1_2_10_54_1
e_1_2_10_5_1
e_1_2_10_17_1
e_1_2_10_38_1
e_1_2_10_77_1
e_1_2_10_56_1
e_1_2_10_79_1
e_1_2_10_7_1
e_1_2_10_15_1
e_1_2_10_36_1
e_1_2_10_12_1
e_1_2_10_35_1
e_1_2_10_9_1
e_1_2_10_59_1
e_1_2_10_10_1
e_1_2_10_33_1
e_1_2_10_31_1
e_1_2_10_50_1
e_1_2_10_60_1
e_1_2_10_81_1
e_1_2_10_62_1
e_1_2_10_64_1
e_1_2_10_28_1
e_1_2_10_49_1
e_1_2_10_66_1
e_1_2_10_26_1
e_1_2_10_47_1
e_1_2_10_68_1
References_xml – year: 2011
– year: 2009
– volume: 41
  start-page: 1236
  issue: 12
  year: 2015
  end-page: 1256
  article-title: The ManyBugs and IntroClass benchmarks for automated repair of C programs
  publication-title: IEEE Transactions on Software Engineering (TSE)
– year: 2012
  article-title: Invariant‐based automatic testing of modern web applications
  publication-title: IEEE Transactions on Software Engineering
– year: 2005
– volume: 23
  start-page: 2901
  issue: 5
  year: 2018
  end-page: 2947
  article-title: Do automated program repair techniques repair hard and important bugs
  publication-title: Empirical Software Engineering
– volume: 152
  start-page: 165
  year: 2019
  end-page: 181
  article-title: Not all bugs are the same: understanding, characterizing, and classifying bug types
  publication-title: Journal of System Software
– volume: 41
  start-page: 429
  issue: 5
  year: 2015
  end-page: 444
  article-title: Guided mutation testing for JavaScript web applications
  publication-title: IEEE Transactions on Software Engineering
– start-page: 205
  year: 2012
  end-page: 214
– start-page: 83
  year: 2011
  end-page: 92
– start-page: 238
  year: 2012
  end-page: 252
– year: 2000
– volume: 26
  issue: 1
  year: 2016
  article-title: Automatic fault localization for client‐side JavaScript
  publication-title: Software Testing Verified Reliability
– volume: 10
  start-page: 405
  issue: 4
  year: 2005
  end-page: 435
  article-title: Supporting controlled experimentation with resting techniques: an infrastructure and its potential impact
  publication-title: Empirical Software Engineering
– year: 2016
– year: 2018
– start-page: 428
  year: 2005
  end-page: 452
– year: 2014
– year: 1994
– volume: 14
  start-page: 286
  issue: 3
  year: 2009
  end-page: 315
  article-title: Toward an understanding of bug fix patterns
  publication-title: Empirical Software Engineering
– year: 2012
– volume: 53
  start-page: 38
  year: 2019
  end-page: 52
  article-title: Code4Bench: a multidimensional benchmark of Codeforces data for different program analysis techniques
  publication-title: Journal of Computer Language
– volume: 37
  issue: 5
  year: 2011
  article-title: An analysis and survey of the development of mutation testing
  publication-title: Transactions on Software Engineering
– volume: 42
  issue: 8
  year: 2016
  article-title: A survey on software fault localization
  publication-title: IEEE Transactions on Software Engineering
– start-page: 129
  year: 2018
  end-page: 140
– start-page: 408
  year: 2005
  end-page: 422
– start-page: 127
  year: 2018
  end-page: 137
– volume: 50
  start-page: 66:1
  issue: 5
  year: 2017
  end-page: 66:36
  article-title: A survey of dynamic analysis and test generation for JavaScript
  publication-title: ACM Computing Surveys
– start-page: 25
  year: 2006
  end-page: 33
– volume: 25
  start-page: 557
  issue: 4
  year: 1999
  end-page: 572
  article-title: Qualitative methods in empirical studies of software engineering
  publication-title: IEEE Transactions on Software Engineering
– start-page: 180
  year: 2017
  end-page: 182
– volume: 19
  start-page: 1665
  issue: 6
  year: 2014
  end-page: 1705
  article-title: Bug characteristics in open source software
  publication-title: Empirical Software Engineering
– volume: 18
  start-page: 943
  issue: 11
  year: 1992
  end-page: 956
  article-title: Orthogonal defect classification—a concept for in‐process measurements
  publication-title: IEEE Transactions on Software Engineering
– start-page: 314
  year: 2015
  end-page: 324
– start-page: 1
  year: 2013
  end-page: 5
– start-page: 60
  year: 2015
  end-page: 70
– year: 2017
– start-page: 913
  year: 2015
  end-page: 923
– volume: 43
  start-page: 128
  issue: 2
  year: 2017
  end-page: 144
  article-title: A study of causes and consequences of client‐side JavaScript bugs
  publication-title: IEEE Transactions on Software Engineering
– year: 2019
– start-page: 12 pages
  year: 2019
– start-page: 1
  year: 2014
  end-page: 10
– start-page: 304
  year: 2019
  end-page: 315
– year: 2015
– year: 2013
– ident: e_1_2_10_2_1
  doi: 10.1145/2884781.2884864
– ident: e_1_2_10_5_1
– ident: e_1_2_10_75_1
  doi: 10.1109/32.177364
– ident: e_1_2_10_10_1
  doi: 10.1109/TSE.2016.2586066
– ident: e_1_2_10_44_1
  doi: 10.1145/2884781.2884859
– ident: e_1_2_10_9_1
  doi: 10.1145/3062341.3062364
– ident: e_1_2_10_42_1
  doi: 10.1145/3106739
– ident: e_1_2_10_13_1
  doi: 10.1145/2635868.2635929
– ident: e_1_2_10_57_1
  doi: 10.1007/11531142_19
– ident: e_1_2_10_58_1
  doi: 10.1109/ICSE.2015.51
– ident: e_1_2_10_7_1
  doi: 10.1109/ICSE.2017.34
– ident: e_1_2_10_74_1
– ident: e_1_2_10_66_1
– ident: e_1_2_10_77_1
  doi: 10.1145/1181309.1181314
– ident: e_1_2_10_70_1
  doi: 10.1145/3196398.3196473
– ident: e_1_2_10_43_1
  doi: 10.1109/ICST.2014.17
– ident: e_1_2_10_65_1
  doi: 10.1109/ICSME.2018.00023
– ident: e_1_2_10_47_1
  doi: 10.1109/32.799955
– ident: e_1_2_10_73_1
  doi: 10.1007/s10664-017-9550-0
– ident: e_1_2_10_78_1
  doi: 10.1007/s10664-013-9258-8
– ident: e_1_2_10_16_1
  doi: 10.1145/2610384.2628055
– ident: e_1_2_10_31_1
  doi: 10.1145/3064176.3064188
– ident: e_1_2_10_24_1
  doi: 10.1145/2601248.2601268
– ident: e_1_2_10_51_1
  doi: 10.1109/ICSE.2015.101
– ident: e_1_2_10_64_1
  doi: 10.1109/TSE.2016.2521368
– ident: e_1_2_10_80_1
  doi: 10.1109/ICPC.2015.15
– ident: e_1_2_10_62_1
  doi: 10.1109/ICSE.2017.62
– ident: e_1_2_10_12_1
– ident: e_1_2_10_41_1
  doi: 10.1109/TSE.2011.28
– ident: e_1_2_10_60_1
  doi: 10.1145/3236024.3236063
– ident: e_1_2_10_81_1
  doi: 10.1109/WCRE.2012.30
– ident: e_1_2_10_14_1
  doi: 10.1109/ISSRE.2014.40
– ident: e_1_2_10_67_1
  doi: 10.1145/3183440.3195097
– ident: e_1_2_10_19_1
  doi: 10.1145/3135932.3135941
– ident: e_1_2_10_23_1
  doi: 10.7551/mitpress/3828.001.0001
– ident: e_1_2_10_37_1
  doi: 10.1109/ICST.2015.7102595
– ident: e_1_2_10_4_1
  doi: 10.1109/ASE.2017.8115663
– ident: e_1_2_10_49_1
  doi: 10.1145/1985441.1985456
– ident: e_1_2_10_55_1
  doi: 10.1007/978-3-540-31987-0_28
– ident: e_1_2_10_30_1
  doi: 10.1145/2568225.2568257
– volume: 26
  issue: 1
  year: 2016
  ident: e_1_2_10_29_1
  article-title: Automatic fault localization for client‐side JavaScript
  publication-title: Software Testing Verified Reliability
– ident: e_1_2_10_48_1
– ident: e_1_2_10_54_1
  doi: 10.1007/978-3-319-56856-0_11
– ident: e_1_2_10_21_1
  doi: 10.1145/3196398.3196454
– ident: e_1_2_10_72_1
  doi: 10.1016/j.cola.2019.03.006
– ident: e_1_2_10_63_1
  doi: 10.1109/ICSE.2017.66
– ident: e_1_2_10_34_1
  doi: 10.1109/ICST.2013.23
– ident: e_1_2_10_40_1
  doi: 10.1145/1985793.1985871
– ident: e_1_2_10_8_1
  doi: 10.1145/2931037.2931053
– ident: e_1_2_10_39_1
  doi: 10.1109/ASE.2015.26
– ident: e_1_2_10_82_1
  doi: 10.1109/ICTKE.2013.6756268
– ident: e_1_2_10_56_1
  doi: 10.1109/ICSE.2019.00045
– ident: e_1_2_10_71_1
– ident: e_1_2_10_6_1
  doi: 10.1145/2884781.2884846
– ident: e_1_2_10_38_1
– ident: e_1_2_10_22_1
  doi: 10.1109/ICST.2019.00019
– ident: e_1_2_10_79_1
  doi: 10.1145/3213846.3213866
– ident: e_1_2_10_69_1
– ident: e_1_2_10_3_1
  doi: 10.1109/ICST.2018.00022
– ident: e_1_2_10_11_1
  doi: 10.1109/TSE.2010.62
– ident: e_1_2_10_15_1
  doi: 10.1007/s10664-005-3861-2
– ident: e_1_2_10_76_1
  doi: 10.1016/j.jss.2019.03.002
– ident: e_1_2_10_52_1
  doi: 10.1109/ICSME.2016.29
– ident: e_1_2_10_28_1
  doi: 10.1109/ICSE.2015.52
– ident: e_1_2_10_45_1
  doi: 10.1109/SANER.2018.8330203
– ident: e_1_2_10_53_1
  doi: 10.1109/ICSE-C.2017.6
– ident: e_1_2_10_68_1
– ident: e_1_2_10_25_1
  doi: 10.1109/ICSE.2017.75
– ident: e_1_2_10_32_1
  doi: 10.1109/ICST.2017.28
– ident: e_1_2_10_33_1
  doi: 10.1007/978-3-642-31753-8_18
– ident: e_1_2_10_46_1
  doi: 10.1007/s10664-008-9077-5
– ident: e_1_2_10_35_1
  doi: 10.1109/TSE.2014.2371458
– ident: e_1_2_10_20_1
  doi: 10.1109/ICSE.2012.6227195
– ident: e_1_2_10_17_1
  doi: 10.1109/TSE.2015.2454513
– ident: e_1_2_10_50_1
  doi: 10.1109/ESEM.2017.55
– ident: e_1_2_10_18_1
  doi: 10.1109/ICSE.2019.00048
– ident: e_1_2_10_26_1
  doi: 10.1145/2950290.2950308
– ident: e_1_2_10_27_1
  doi: 10.1109/ASE.2017.8115667
– ident: e_1_2_10_59_1
  doi: 10.1145/2950290.2950294
– ident: e_1_2_10_61_1
  doi: 10.1109/ICST.2017.9
– ident: e_1_2_10_36_1
  doi: 10.1109/ICST.2016.32
SSID ssj0006969
Score 2.3323536
Snippet Summary JavaScript is a popular programming language that is also error‐prone due to its asynchronous, dynamic, and loosely typed nature. In recent years,...
JavaScript is a popular programming language that is also error‐prone due to its asynchronous, dynamic, and loosely typed nature. In recent years, numerous...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
SubjectTerms Applications programs
benchmark
Benchmarks
bug database
bug taxonomy
BugsJS
Empirical analysis
Java
JavaScript
Reproducibility
Software reliability
Software testing
Taxonomy
Title BUGSJS: a benchmark and taxonomy of JavaScript bugs
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fstvr.1751
https://www.proquest.com/docview/2524621405
Volume 31
WOSCitedRecordID wos000578852600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Full Collection 2020
  customDbUrl:
  eissn: 1099-1689
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0006969
  issn: 0960-0833
  databaseCode: DRFUL
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFA6y-eCL84rTOYL44Etdm6Zdqk_epowxxm7sreRWFbWTthv-fJPepqAg-FAo5TQJJ-cacr4DwClnhJKAmganFjewsB2DCosYbSQCTLGQMq3in_ba_T6ZzbzBGrgsamEyfIjywE1rRmqvtYJTFrdWoKFxsozOlfNTqU_Vsuy2FmmEB6UZdj03A9pz9YUt2y5ghUzUKn_97oxWEebXODV1NJ3av5a4BTbz-BJeZQKxDdZkuANqRe8GmKvyLrCvJ_ej7ugCUsjUl6c3Gr1AGgqY0I-0zgHOA9ilSzpKzQpki8d4D0w6d-ObByNvoGBw20aWIZjnYJcg4QnsMhcTR1kzJCRT26A8PaE4cANiYYubQgVujKiHBcoCKNdGEeP2PqiE81AeAIhl4BDhKDJT6pSMSmwJj2CJhOm1Ja-Ds4KTPs_RxXWTi1c_w0VGvmaGr5lRBycl6XsGqfETUaPYDj_XqthHDsIuUimho6ZLGf_7AP5oPB3ql8O_kx6BDaSvrKSHLA1QSaKFPAbrfJk8x1EzFa8mqN4OO5PeJym-1Rc
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JS8NAFH5IFfRiXbGug3jwEk0mk3QiXtyq1lrEtOItzBYVtUrTFn--M9mqoCB4CITwkgxv3s687wHsCE4ZjZltCeYIi0jXs5h0qFXHMiaMSKXSLv67Vr3dpvf3wc0EHBa9MBk-RFlwM5qR2muj4KYgvT9GDU0Go_6e9n4695kkWoy8Ckye3ja6rdIS-4GfYe355syW6xbIQjbeL1_-7o_GQebXUDX1NY3q_1Y5B7N5jImOMqGYhwnVW4BqMb8B5eq8CO5x9zxshgeIIa6fPL6y_jNiPYkG7CPtdUBvMWqyEQtT04L48CFZgm7jrHNyYeVDFCzhutixJA884lMsA0l87hPqaYuGpeJ6K7S3p4zEfkwd4ghb6uCNU33xWFsB7d4Y5sJdhkrvradWABEVe1R6msxWJi1jijgyoERhaQd1JWqwW7AyEjnCuBl08RJl2Mg4MsyIDDNqsF2SvmewGj8RrRf7EeWalUTYw8THOi309O9Szv_-gSjs3N2am9W_k27B9EXnuhW1LttXazCDzRGWtOiyDpVBf6g2YEqMBk9JfzOXtk8Tk9j0
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEF6KinixPrFadREPXmKTzSbdiBdfVWspxT7oLewrKmpakrT4893No1VQEDwEQpgky-zONzPLzjcAHHNGKAmoaXBqcQML2zGosIhRRyLAFAsp0yr-QavebpPh0OuUwHlRC5PxQ8w23LRlpHitDVyORVCbs4bGyTQ6Vd5P5T6L2FEYq3mdcWeGw67nZkx7rj6xZdsFr5CJarNXv3ujeYj5NVBNPU2j_L8xroHVPMKEF9mSWAclGW6ActG9AebGvAnsy_5tt9k9gxQy9eT5nUavkIYCJvQjrXSAowA26ZR2U2CBbPIUb4F-46Z3dWfkLRQMbtvIMgTzHOwSJDyBXeZi4ig8Q0IyNRHK1xOKAzcgFra4KVToxoi6WKAwQDk3ihi3t8FCOArlDoBYBg4RjhIzpU7KqMSW8AiWSJheXfIKOClU6fOcX1y3uXjzM2Zk5Gtl-FoZFXA0Ex1npBo_CVWL-fBzu4p95CDsIpUUOup3qeZ__4Df7Q0e9c3u30UPwXLnuuG37tsPe2AF6fMr6Y5LFSwk0UTugyU-TV7i6CBdap_4Z9bd
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=BUGSJS%3A+a+benchmark+and+taxonomy+of+JavaScript+bugs&rft.jtitle=Software+testing%2C+verification+%26+reliability&rft.au=Gyimesi%2C+P%C3%A9ter&rft.au=Vancsics%2C+B%C3%A9la&rft.au=Stocco%2C+Andrea&rft.au=Mazinanian%2C+Davood&rft.date=2021-06-01&rft.issn=0960-0833&rft.eissn=1099-1689&rft.volume=31&rft.issue=4&rft_id=info:doi/10.1002%2Fstvr.1751&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_stvr_1751
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0960-0833&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0960-0833&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0960-0833&client=summon