首页 > 最新文献

2010 Third International Conference on Software Testing, Verification, and Validation Workshops最新文献

英文 中文
Language-Specific vs. Language-Independent Approaches: Embedding Semantics on a Metamodel for Testing and Verifying Access Control Policies 特定于语言的方法与独立于语言的方法:在元模型上嵌入语义以测试和验证访问控制策略
Yves Le Traon, T. Mouelhi, Franck Fleurey, B. Baudry
in this paper, we study an issue related to the abstraction level of a meta-model through the example of a model-driven approach for specifying, deploying and testing security policies in Java applications. The issue we focus on is the balance between a "generic" meta-model and the semantics we want to attach to it, which ahs to be precise enough. The goal of the original work was to present a full MDE process to check the consistency of a security policy and generate qualification criteria for the test cases testing the security mechanisms in the final code. The most original idea is that security policy is specified independently of the underlying access control language (OrBAC, RBAC, DAC or MAC). It is based on a generic security meta-model which can be used for early consistency checks in the security policy. We qualify the test cases that validate the security policy in the application with a fault injection technique, mutation applied to access control policies. In the empirical results on 3 case studies, we explore the advantages and limitations of the mutation operators and verification checks whose semantics is defined on the meta-model. The overall question we address is not the feasibility of the approach as shown in our previous work but the quality of a metamodel for test and verification purpose.
在本文中,我们通过在Java应用程序中指定、部署和测试安全策略的模型驱动方法的示例来研究与元模型抽象级别相关的问题。我们关注的问题是“通用”元模型和我们想要附加到它的语义之间的平衡,这必须足够精确。原始工作的目标是提供一个完整的MDE过程,以检查安全策略的一致性,并为测试最终代码中的安全机制的测试用例生成资格标准。最原始的想法是,安全策略的指定独立于底层访问控制语言(OrBAC、RBAC、DAC或MAC)。它基于通用的安全元模型,可用于安全策略中的早期一致性检查。我们使用故障注入技术对验证应用程序中的安全策略的测试用例进行限定,该技术将突变应用于访问控制策略。在三个案例研究的实证结果中,我们探讨了语义定义在元模型上的突变操作符和验证检查的优势和局限性。我们要解决的总体问题不是我们之前工作中所展示的方法的可行性,而是用于测试和验证目的的元模型的质量。
{"title":"Language-Specific vs. Language-Independent Approaches: Embedding Semantics on a Metamodel for Testing and Verifying Access Control Policies","authors":"Yves Le Traon, T. Mouelhi, Franck Fleurey, B. Baudry","doi":"10.1109/ICSTW.2010.67","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.67","url":null,"abstract":"in this paper, we study an issue related to the abstraction level of a meta-model through the example of a model-driven approach for specifying, deploying and testing security policies in Java applications. The issue we focus on is the balance between a \"generic\" meta-model and the semantics we want to attach to it, which ahs to be precise enough. The goal of the original work was to present a full MDE process to check the consistency of a security policy and generate qualification criteria for the test cases testing the security mechanisms in the final code. The most original idea is that security policy is specified independently of the underlying access control language (OrBAC, RBAC, DAC or MAC). It is based on a generic security meta-model which can be used for early consistency checks in the security policy. We qualify the test cases that validate the security policy in the application with a fault injection technique, mutation applied to access control policies. In the empirical results on 3 case studies, we explore the advantages and limitations of the mutation operators and verification checks whose semantics is defined on the meta-model. The overall question we address is not the feasibility of the approach as shown in our previous work but the quality of a metamodel for test and verification purpose.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128306198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quantitative Evaluation of Mutation Operators for WS-BPEL Compositions WS-BPEL组合的变异算子的定量评估
Antonia Estero-Botaro, F. Palomo-Lozano, I. Medina-Bulo
This work presents a quantitative evaluation of the quality of a set of mutation operators for WS-BPEL 2.0 (Web Services Business Process Execution Language), an OASIS standardized language for the composition of Web Services. A series of experiments is conducted, aiming to determine how selective operators are for the qualification of test cases and, more generally, the quality of the operators themselves. This includes a formalization of mutation testing defining the key concepts and measures employed. Three different compositions are considered and special attention is paid to the properties that suitable test-suites should enjoy.
这项工作对WS-BPEL 2.0 (Web服务业务流程执行语言)的一组突变操作符的质量进行了定量评估,WS-BPEL 2.0是用于组合Web服务的OASIS标准化语言。进行了一系列的实验,目的是确定对测试用例的资格有多少选择性操作符,更一般地说,确定操作符本身的质量。这包括定义关键概念和所采用的度量的突变测试的形式化。考虑了三种不同的组合,并特别注意了合适的测试套件应该享受的属性。
{"title":"Quantitative Evaluation of Mutation Operators for WS-BPEL Compositions","authors":"Antonia Estero-Botaro, F. Palomo-Lozano, I. Medina-Bulo","doi":"10.1109/ICSTW.2010.36","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.36","url":null,"abstract":"This work presents a quantitative evaluation of the quality of a set of mutation operators for WS-BPEL 2.0 (Web Services Business Process Execution Language), an OASIS standardized language for the composition of Web Services. A series of experiments is conducted, aiming to determine how selective operators are for the qualification of test cases and, more generally, the quality of the operators themselves. This includes a formalization of mutation testing defining the key concepts and measures employed. Three different compositions are considered and special attention is paid to the properties that suitable test-suites should enjoy.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129366663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Type Sensitive Application of Mutation Operators for Dynamically Typed Programs 变异算子在动态类型化程序中的类型敏感应用
L. Bottaci
It is commonly accepted that strong typing is useful for revealing programmer errors and so the use of dynamically typed languages increases the importance of software testing. Mutation analysis is a demanding software testing criterion. Although mutation analysis has been applied to procedural languages, and object oriented languages, little work has been done on the mutation analysis of programs written in dynamically typed languages. Mutation analysis depends on the substitution and modification of program elements. In a strongly typed language, the declared type of the mutated element, a variable or operator, can be used to avoid generating type-incorrect substitutions or modifications. Ina dynamically typed language, this type information is not available and so a much greater range of mutations are potentially applicable but many of the resulting mutants are likely to be incompetent (too easily killed). This paper describes a mutation analysis method in which the definition of mutants is performed at run-time when type information is available. The type information can be used to avoid generating incompetent mutants.
人们普遍认为,强类型有助于揭示程序员的错误,因此使用动态类型语言增加了软件测试的重要性。突变分析是一项要求很高的软件测试标准。虽然突变分析已经应用于过程语言和面向对象语言,但对动态类型语言编写的程序进行突变分析的工作还很少。突变分析依赖于程序元素的替换和修改。在强类型语言中,可以使用已改变元素的声明类型(变量或操作符)来避免生成类型不正确的替换或修改。在动态类型语言中,这种类型信息是不可用的,因此可能适用更大范围的突变,但许多产生的突变可能是不称职的(太容易被杀死)。本文描述了一种突变分析方法,该方法在类型信息可用的情况下在运行时执行突变的定义。类型信息可以用来避免产生不合格的突变体。
{"title":"Type Sensitive Application of Mutation Operators for Dynamically Typed Programs","authors":"L. Bottaci","doi":"10.1109/ICSTW.2010.56","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.56","url":null,"abstract":"It is commonly accepted that strong typing is useful for revealing programmer errors and so the use of dynamically typed languages increases the importance of software testing. Mutation analysis is a demanding software testing criterion. Although mutation analysis has been applied to procedural languages, and object oriented languages, little work has been done on the mutation analysis of programs written in dynamically typed languages. Mutation analysis depends on the substitution and modification of program elements. In a strongly typed language, the declared type of the mutated element, a variable or operator, can be used to avoid generating type-incorrect substitutions or modifications. Ina dynamically typed language, this type information is not available and so a much greater range of mutations are potentially applicable but many of the resulting mutants are likely to be incompetent (too easily killed). This paper describes a mutation analysis method in which the definition of mutants is performed at run-time when type information is available. The type information can be used to avoid generating incompetent mutants.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Semantic Mutation Testing 语义突变测试
J. A. Clark, Haitao Dan, R. Hierons
Mutation testing is a powerful and flexible test technique. Traditional mutation testing makes a small change to the syntax of a description (usually a program) in order to create a mutant. A test set is considered to be good if it distinguishes between the original description and all of the (functionally nonequivalent) mutants. These mutants can be seen as representing potential small slips and thus mutation testing aims to produce a test set that is good at finding such slips. It has also been argued that a test set that finds such small changes is likely to find larger changes. This paper introduces a new approach to mutation testing, called semantic mutation testing. Rather than mutate the description, semantic mutation testing mutates the semantics of the language in which the description is written. The mutations of the semantics of the language represent possible misunderstandings of the description language and thus capture a different class of faults. Since the likely misunderstandings are highly context dependent, this context should be used to determine which semantic mutants should be produced. The approach is illustrated through examples with state charts and C code. In addition, a semantic mutation testing tool for C is proposed.
突变检测是一种强大而灵活的检测技术。传统的突变测试对描述(通常是一个程序)的语法做一个小的改变,以创建一个突变。如果一个测试集能够区分原始描述和所有(功能上不等同的)突变,那么它就被认为是好的。这些突变体可以看作是潜在的小滑动的代表,因此突变检测的目的是产生一个善于发现这些滑动的测试集。也有人认为,发现如此小的变化的测试集很可能发现更大的变化。本文介绍了一种新的突变检测方法,即语义突变检测。语义突变测试不是改变描述,而是改变编写描述的语言的语义。语言语义的突变表示了对描述语言可能存在的误解,从而捕获了不同类型的错误。由于可能的误解高度依赖于上下文,因此应该使用该上下文来确定应该产生哪些语义突变。通过状态图和C代码的例子说明了这种方法。此外,还提出了一种针对C语言的语义突变测试工具。
{"title":"Semantic Mutation Testing","authors":"J. A. Clark, Haitao Dan, R. Hierons","doi":"10.1109/icstw.2010.8","DOIUrl":"https://doi.org/10.1109/icstw.2010.8","url":null,"abstract":"Mutation testing is a powerful and flexible test technique. Traditional mutation testing makes a small change to the syntax of a description (usually a program) in order to create a mutant. A test set is considered to be good if it distinguishes between the original description and all of the (functionally nonequivalent) mutants. These mutants can be seen as representing potential small slips and thus mutation testing aims to produce a test set that is good at finding such slips. It has also been argued that a test set that finds such small changes is likely to find larger changes. This paper introduces a new approach to mutation testing, called semantic mutation testing. Rather than mutate the description, semantic mutation testing mutates the semantics of the language in which the description is written. The mutations of the semantics of the language represent possible misunderstandings of the description language and thus capture a different class of faults. Since the likely misunderstandings are highly context dependent, this context should be used to determine which semantic mutants should be produced. The approach is illustrated through examples with state charts and C code. In addition, a semantic mutation testing tool for C is proposed.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"9 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Most Common Mistakes in Test-Driven Development Practice: Results from an Online Survey with Developers 测试驱动开发实践中最常见的错误:来自开发人员在线调查的结果
M. Aniche, M. Gerosa
Test-driven development (TDD) is a software development practice that supposedly leads to better quality and fewer defects in code. TDD is a simple practice, but developers sometimes do not apply all the required steps correctly. This article presents some of the most common mistakes that programmers make when practicing TDD, identified by an online survey with 218 volunteer programmers. Some mistakes identified were: to forget the refactoring step, building complex test scenarios, and refactor another piece of code while working on a test. Some mistakes are frequently made by around 25% of programmers.
测试驱动开发(TDD)是一种软件开发实践,它被认为可以提高代码质量,减少代码缺陷。TDD是一种简单的实践,但是开发人员有时并没有正确地应用所有必需的步骤。本文介绍了程序员在实践TDD时最常犯的一些错误,这些错误是通过对218名志愿程序员的在线调查确定的。确定的一些错误是:忘记重构步骤,构建复杂的测试场景,以及在进行测试时重构另一段代码。大约25%的程序员经常犯一些错误。
{"title":"Most Common Mistakes in Test-Driven Development Practice: Results from an Online Survey with Developers","authors":"M. Aniche, M. Gerosa","doi":"10.1109/ICSTW.2010.16","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.16","url":null,"abstract":"Test-driven development (TDD) is a software development practice that supposedly leads to better quality and fewer defects in code. TDD is a simple practice, but developers sometimes do not apply all the required steps correctly. This article presents some of the most common mistakes that programmers make when practicing TDD, identified by an online survey with 218 volunteer programmers. Some mistakes identified were: to forget the refactoring step, building complex test scenarios, and refactor another piece of code while working on a test. Some mistakes are frequently made by around 25% of programmers.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130695611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Using Methods & Measures from Network Analysis for GUI Testing 用网络分析的方法和措施进行GUI测试
Ethar Elsaka, W. E. Moustafa, Bao-Ngoc Nguyen, A. Memon
Graphical user interfaces (GUIs) for today's applications are extremely large. Moreover, they provide many degrees of freedom to the end-user, thus allowing the user to perform a very large number of event sequences on the GUI. The large sizes and degrees of freedom create severe problems for GUI quality assurance, including GUI testing. In this paper, we leverage methods and measures from network analysis to analyze and study GUIs, with the goal of aiding GUI testing activities. We apply these methods and measures on the event-flow graph model of GUIs. Results of a case study show that "network centrality measures" are able to identify the most important events in the GUI as well as the most important sequences of events. These events and sequences are good candidates for test prioritization. In addition, the "betweenness clustering" method is able to partition the GUI into regions that can be tested separately.
当今应用程序的图形用户界面(gui)非常大。此外,它们为最终用户提供了许多自由度,从而允许用户在GUI上执行大量事件序列。大尺寸和自由度给GUI质量保证(包括GUI测试)带来了严重的问题。在本文中,我们利用来自网络分析的方法和度量来分析和研究GUI,目的是帮助GUI测试活动。我们将这些方法和措施应用于gui的事件流图模型。一个案例研究的结果表明,“网络中心性度量”能够识别GUI中最重要的事件以及最重要的事件序列。这些事件和序列是测试优先级的良好候选。此外,“间性聚类”方法能够将GUI划分为可以单独测试的区域。
{"title":"Using Methods & Measures from Network Analysis for GUI Testing","authors":"Ethar Elsaka, W. E. Moustafa, Bao-Ngoc Nguyen, A. Memon","doi":"10.1109/ICSTW.2010.61","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.61","url":null,"abstract":"Graphical user interfaces (GUIs) for today's applications are extremely large. Moreover, they provide many degrees of freedom to the end-user, thus allowing the user to perform a very large number of event sequences on the GUI. The large sizes and degrees of freedom create severe problems for GUI quality assurance, including GUI testing. In this paper, we leverage methods and measures from network analysis to analyze and study GUIs, with the goal of aiding GUI testing activities. We apply these methods and measures on the event-flow graph model of GUIs. Results of a case study show that \"network centrality measures\" are able to identify the most important events in the GUI as well as the most important sequences of events. These events and sequences are good candidates for test prioritization. In addition, the \"betweenness clustering\" method is able to partition the GUI into regions that can be tested separately.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Software Testing as an Online Service: Observations from Practice 作为在线服务的软件测试:来自实践的观察
L. Riungu, Ossi Taipale, K. Smolander
The objective of this qualitative study was to explore and understand the conditions that influence software testing as an online service and elicit important research issues. Interviews were conducted with managers from eleven organizations. The study used qualitative grounded theory as its research method. The results indicate that the demand for software testing as an online service is on the rise and is influenced by conditions such as the level of domain knowledge needed to effectively test an application, flexibility and cost effectiveness as benefits, security and pricing as top requirements, cloud computing as the delivery mode and the need for software testers to hone their skills. Potential research areas suggested include application areas best suited for online software testing, pricing and handling of test data among others.
这个定性研究的目的是探索和理解影响软件测试作为一种在线服务的条件,并引出重要的研究问题。采访了来自11个组织的经理。本研究采用定性扎根理论作为研究方法。结果表明,将软件测试作为一种在线服务的需求正在上升,并受到以下条件的影响:有效测试应用程序所需的领域知识水平、灵活性和成本效益、安全性和定价是首要要求、云计算作为交付模式以及软件测试人员磨练技能的需要。建议的潜在研究领域包括最适合在线软件测试的应用领域、测试数据的定价和处理等。
{"title":"Software Testing as an Online Service: Observations from Practice","authors":"L. Riungu, Ossi Taipale, K. Smolander","doi":"10.1109/ICSTW.2010.62","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.62","url":null,"abstract":"The objective of this qualitative study was to explore and understand the conditions that influence software testing as an online service and elicit important research issues. Interviews were conducted with managers from eleven organizations. The study used qualitative grounded theory as its research method. The results indicate that the demand for software testing as an online service is on the rise and is influenced by conditions such as the level of domain knowledge needed to effectively test an application, flexibility and cost effectiveness as benefits, security and pricing as top requirements, cloud computing as the delivery mode and the need for software testers to hone their skills. Potential research areas suggested include application areas best suited for online software testing, pricing and handling of test data among others.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129827121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Considering Signal Constraints in Search-Based Testing of Continuous Systems 考虑信号约束的连续系统搜索测试
Benjamin Wilmes, Andreas Windisch
This paper presents a technique to consider constraints on input signals of continuous systems when applying search-based testing. The signal constraints are described using a logic based on Signal Temporal Logic. We developed a distance-oriented evaluation technique for these constraints that provides an exact rating of the amount of constraint violation, thus allowing a ranking of the generated solutions in terms of constraint violation. An adaptive penalty function is then used to incorporate the evaluation results into the optimization. Finally, the overall method is shown to be capable of considering signal constraints appropriately when experimentally applied to search-based black-box testing of a MATLAB SIMULINK model of an automatic transmission controller.
本文提出了一种在基于搜索的测试中考虑连续系统输入信号约束的方法。使用基于信号时序逻辑的逻辑来描述信号约束。我们为这些约束开发了一种面向距离的评估技术,该技术提供了约束违反数量的精确评级,从而允许根据约束违反对生成的解决方案进行排名。然后使用自适应惩罚函数将评价结果纳入优化。最后,通过对自动变速器控制器的MATLAB SIMULINK模型进行基于搜索的黑盒测试,证明了该方法能够适当地考虑信号约束。
{"title":"Considering Signal Constraints in Search-Based Testing of Continuous Systems","authors":"Benjamin Wilmes, Andreas Windisch","doi":"10.1109/ICSTW.2010.22","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.22","url":null,"abstract":"This paper presents a technique to consider constraints on input signals of continuous systems when applying search-based testing. The signal constraints are described using a logic based on Signal Temporal Logic. We developed a distance-oriented evaluation technique for these constraints that provides an exact rating of the amount of constraint violation, thus allowing a ranking of the generated solutions in terms of constraint violation. An adaptive penalty function is then used to incorporate the evaluation results into the optimization. Finally, the overall method is shown to be capable of considering signal constraints appropriately when experimentally applied to search-based black-box testing of a MATLAB SIMULINK model of an automatic transmission controller.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127228480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Honeyware: A Web-Based Low Interaction Client Honeypot Honeyware:一个基于web的低交互客户端蜜罐
Yaser Alosefer, O. Rana
Modern attacks are being made against client side applications, such as web browsers, which most users use to surf and communicate on the internet. Client honeypots visit and interact with suspect web sites in order to detect and collect information about malware to protect users from malicious websites or to allow security professionals to investigate malicious content. This paper will present the idea of using web-based technology and integrating it with a client honeypot by building a low interaction client honeypot tool called Honeyware. It describes the benefits of Honeyware as well as the challenges of a low interaction client honeypot and provides some ideas for how these challenges could be overcome.
现代的攻击是针对客户端应用程序的,比如大多数用户用来在互联网上冲浪和交流的web浏览器。客户端蜜罐访问可疑网站并与之交互,以检测和收集有关恶意软件的信息,以保护用户免受恶意网站的攻击,或允许安全专业人员调查恶意内容。本文将通过构建一个低交互的客户端蜜罐工具Honeyware,提出使用基于web的技术并将其与客户端蜜罐集成的想法。它描述了Honeyware的优点以及低交互客户端蜜罐的挑战,并提供了如何克服这些挑战的一些想法。
{"title":"Honeyware: A Web-Based Low Interaction Client Honeypot","authors":"Yaser Alosefer, O. Rana","doi":"10.1109/ICSTW.2010.41","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.41","url":null,"abstract":"Modern attacks are being made against client side applications, such as web browsers, which most users use to surf and communicate on the internet. Client honeypots visit and interact with suspect web sites in order to detect and collect information about malware to protect users from malicious websites or to allow security professionals to investigate malicious content. This paper will present the idea of using web-based technology and integrating it with a client honeypot by building a low interaction client honeypot tool called Honeyware. It describes the benefits of Honeyware as well as the challenges of a low interaction client honeypot and provides some ideas for how these challenges could be overcome.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130168483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
An Empirical Evaluation of the First and Second Order Mutation Testing Strategies 一、二级突变检测策略的实证评价
Mike Papadakis, N. Malevris
Various mutation approximation techniques have been proposed in the literature in order to reduce the expenses of mutation. This paper presents results from an empirical study conducted for first and second order mutation testing strategies. Its scope is to evaluate the relative application cost and effectiveness of the different mutation strategies. The application cost was based: on the number of mutants, the equivalent ones and on the number of test cases needed to expose them by each strategy. Each strategy's effectiveness was evaluated by its ability to expose a set of seeded faults. The results indicate that on the one hand the first order mutation testing strategies can be in general more effective than the second order ones. On the other hand, the second order strategies can drastically decrease the number of the introduced equivalent mutants, generally forming a valid cost effective alternative to mutation testing.
为了减少突变的代价,文献中提出了各种各样的突变近似技术。本文介绍了一阶和二阶突变检测策略的实证研究结果。其范围是评估不同突变策略的相对应用成本和有效性。应用程序成本是基于:突变的数量,等效的数量,以及每个策略暴露它们所需的测试用例的数量。每个策略的有效性是通过其暴露一组种子错误的能力来评估的。结果表明,一级突变检测策略一般比二级突变检测策略更有效。另一方面,二阶策略可以大大减少引入的等效突变体的数量,通常形成一个有效的成本效益替代突变检测。
{"title":"An Empirical Evaluation of the First and Second Order Mutation Testing Strategies","authors":"Mike Papadakis, N. Malevris","doi":"10.1109/ICSTW.2010.50","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.50","url":null,"abstract":"Various mutation approximation techniques have been proposed in the literature in order to reduce the expenses of mutation. This paper presents results from an empirical study conducted for first and second order mutation testing strategies. Its scope is to evaluate the relative application cost and effectiveness of the different mutation strategies. The application cost was based: on the number of mutants, the equivalent ones and on the number of test cases needed to expose them by each strategy. Each strategy's effectiveness was evaluated by its ability to expose a set of seeded faults. The results indicate that on the one hand the first order mutation testing strategies can be in general more effective than the second order ones. On the other hand, the second order strategies can drastically decrease the number of the introduced equivalent mutants, generally forming a valid cost effective alternative to mutation testing.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125386072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
期刊
2010 Third International Conference on Software Testing, Verification, and Validation Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1