Currently, the attacker modifies the application code with any guidance. We expect them to consider mutation operators, but there is no guarantee of that. If we could automatically identify the mutation operator considered by the attacker, we could award students that use a greater set of mutation operators.
Currently, the attacker modifies the application code with any guidance. We expect them to consider mutation operators, but there is no guarantee of that. If we could automatically identify the mutation operator considered by the attacker, we could award students that use a greater set of mutation operators.