THREATS TO VALIDITY 
There are several threats to validity in our review. 
There is a possibility that some papers could not be 
found because of the design of the search query and 
time constraints. Moreover, only one researcher was 
involved in analyzing, filtering and classifying the 
literature. Consequently, the risk of bias and 
inaccuracy of data extraction cannot be ignored. 
Although our selected data sources are well-known 
sources with the availability of the highest amount of 
papers in our search domain, there are possibilities of 
missing papers related to GUI risk-based testing.  
  CONCLUSIONS 
In this literature, we identified and studied 22 
scientific papers that concentrated on risk-based 
testing. We recognized different techniques, methods, 
and algorithms that can be used for RBT. This review 
has attempted to understand how far RBT has been 
practiced for GUI testing, how much GUI risk-based 
testing is advance and what techniques can be applied 
to it. We confronted with the inadequate collection of 
the publication in the domain of GUI risk-based 
testing. Indeed, the number of studies that focus on 
GUI risk-based testing are few. Among all the papers 
that we collected in SLR, most of RBT studies was 
concentrating on regression testing, security testing, 
and user acceptance testing. We found only one paper 
(P08) that was specifically discussing an approach to 
perform GUI risk-based testing.  
Our results indicate that the potential of 
prioritizing and detecting the most critical parts of 
GUI applications could make RBT an asset for GUI 
testing. Indeed, it assists testers to identify the 
dangerous test areas and prioritize the critical GUI 
features. Moreover, it can be used to estimate the risks 
values of each feature and specify tests for the highest 
risk features. Finally, analyzing the risks of the SUT, 
modeling threat/failure, and presenting the tests for 
the severe threats are the benefits that it brings to 
identify the part of a system failure. We listed a set of 
algorithms such as Markov chains, random walk, 
Chinese postman that can be used to achieve the 
above goals. 
REFERENCES 
Adorf, H., Felderer, M., Varendorff, M., Breu, R., 2015. A 
Bayesian Prediction Model for Risk-Based Test 
Selection.  Euromicro Conference on Software 
Engineering and Advanced Applications, pp. 374-382. 
Alam, M., Irshad Khan, A., 2013. Risk-based Testing 
Techniques: A Perspective Study. International 
Journal of Computer Applications, Volume 65, pp. 33-
41. 
Ali, S., Yue, T., Hoffmann, A., Wendland, M., 2014. How 
does the UML Testing Profile Support Risk-Based 
Testing.  IEEE International Symposium on Software 
Reliability Engineering Workshops, Volume 13, pp. 
311-316. 
Amland, S., 1999. Risk Analysis Fundamentals and Metrics 
for Software Testing. Barcelona, 5th International 
Conference EUROSTAR 99. 
Bach, J., 1999. Heuristic Risk-Based Testing. s.l.:Software 
Testing and Quality Engineering Magazine. 
Bai, X., 2012. Risk Assessment And Adaptive Group 
Testing of Semantic Web Service. International 
Journal of Software Engineering and Knowledge 
Engineering, 22(5), pp. 595-620. 
Bauer, T., Eschbach, R., Größl, M., Hussain, T. , Streitferdt, 
D., Kantz, F., 2009. Combining combinatorial and 
model-based test approaches for highly configurable 
safety-critical systems. Enschede, s.n. 
Botella, J., Legeard, B., Peureux, F., Vernotte, A., 2014. 
Risk-Based Vulnerability Testing Using Security Test 
Patterns. In: Leveraging Applications of Formal 
Methods, Verification and Validation. Specialized 
Techniques and Applications. Corfu: Springer Berlin 
Heidelberg, pp. 337-352. 
Casado, R., Tuya, J., Younas, M., 2010. Testing Long-lived 
Web Services Transactions Using a Risk-based 
Approach.  International Conference on Quality 
Software, pp. 337-340. 
Crispin, L., Gregory, J., 2009. A practical guide for testers 
and agile teams. Boston: Pearson Education, Inc.. 
Entin, V., Winder, M., Zhang, B., Christmann, S., 2012. 
Introducing Model-Based Testing in an Industrial 
Scrum Project. Proceeding AST '12 Proceedings of the 
7th International Workshop on Automation of Software 
Test, pp. 43-49. 
Felderer, M., Schieferdecker, I., 2014. A taxonomy of risk-
based testing. International Journal on Software Tools 
for Technology Transfer, 18(Springer Berlin 
Heidelberg), p. 559–568. 
France, H., 2016. Defining the right testing strategy, 
Toronto: QA Consultants. 
Garousi, V., Mäntylä, M., 2016. When and what to 
automate in software testing? A multi-vocal literature 
review. information and Software Technology, Volume 
76, pp. 92-117. 
Gleirscher, M., 2011. Hazard-based Selection of Test 
Cases. Proceedings of the 6th International Workshop 
on Automation of Software Test, pp. 64-70 . 
Grood, D., Derk, J., 2008. Test Risk Analysis. In: TestGoal. 
Leiden: Springer, pp. 101-108. 
Großmann, J., Schneider, M., Viehmann, J., Wendland, M., 
2014. Combining Risk Analysis and Security Testing. 
In: 
Leveraging Applications of Formal Methods 
Verification and Validation Specialized Techniques and