首页 > 最新文献

2010 Third International Conference on Software Testing, Verification, and Validation Workshops最新文献

英文 中文
Supporting Test-Driven Development of Graphical User Interfaces Using Agile Interaction Design 使用敏捷交互设计支持图形用户界面的测试驱动开发
T. Hellmann, Ali Hosseini-Khayat, F. Maurer
Test-driven development of GUIs is currently very difficult. On the one hand, to avoid frequent updates of the tests, test-driven development requires a degree of stability in the application under development, whereas GUIs are very likely to change during development. On the other hand, the easiest way of creating GUI tests - using a capture/replay tool - requires the GUI to exist. This paper introduces a new approach to user-interface test-driven development, wherein a capture-replay tool is used to record test scripts from low-fidelity prototypes. This allows GUI tests to be
测试驱动的gui开发目前非常困难。一方面,为了避免测试的频繁更新,测试驱动的开发需要在开发中的应用程序中保持一定程度的稳定性,而gui在开发过程中很可能会发生变化。另一方面,创建GUI测试的最简单方法——使用捕获/重放工具——需要GUI存在。本文介绍了一种用户界面测试驱动开发的新方法,其中使用捕获-重放工具来记录来自低保真原型的测试脚本。这允许GUI测试
{"title":"Supporting Test-Driven Development of Graphical User Interfaces Using Agile Interaction Design","authors":"T. Hellmann, Ali Hosseini-Khayat, F. Maurer","doi":"10.1109/ICSTW.2010.35","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.35","url":null,"abstract":"Test-driven development of GUIs is currently very difficult. On the one hand, to avoid frequent updates of the tests, test-driven development requires a degree of stability in the application under development, whereas GUIs are very likely to change during development. On the other hand, the easiest way of creating GUI tests - using a capture/replay tool - requires the GUI to exist. This paper introduces a new approach to user-interface test-driven development, wherein a capture-replay tool is used to record test scripts from low-fidelity prototypes. This allows GUI tests to be","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133623226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Searching for Safety Violations Using Estimation of Distribution Algorithms 基于分布估计算法的安全违规搜索
J. Staunton, J. A. Clark
Using aspects of model checking to analyse multi- threaded software is a promising method for finding common concurrent errors such as deadlock. Traditional model checking tools exhaustively search the state space of a concurrent system in order to find faults. Unfortunately, model checking suffers from the state space explosion problem, limiting the applicability of the approach to commercial software. Metaheuristic search mechanisms have been used in an attempt to overcome this issue with good results. Techniques such as Genetic Algorithms (GAs) and Estimation of Distribution Algorithms (EDAs) focus the search of the state space on areas that are more likely to contain errors. In this work, a novel EDA-based approach to exploring the state space of a model is outlined. Experiments are performed on an implementation using the Java PathFinder (JPF) model checker and the ECJ toolkit. The EDA-based approach is shown to perform well against standard search procedures such as depth-first search, whilst also outperforming random search on a benchmark problem. On larger problems, the EDA is shown to be the only effective technique of those compared.
利用模型检查的各个方面来分析多线程软件是发现死锁等常见并发错误的一种很有前途的方法。传统的模型检测工具通过对并发系统的状态空间进行穷尽搜索来发现故障。不幸的是,模型检查存在状态空间爆炸问题,限制了该方法在商业软件中的适用性。元启发式搜索机制已经被用来尝试克服这个问题,并取得了良好的结果。遗传算法(GAs)和分布估计算法(EDAs)等技术将状态空间的搜索重点放在更可能包含错误的区域上。在这项工作中,概述了一种新的基于eda的方法来探索模型的状态空间。使用Java PathFinder (JPF)模型检查器和ECJ工具包对实现进行了实验。基于eda的方法在深度优先搜索等标准搜索过程中表现良好,同时在基准问题上也优于随机搜索。在较大的问题上,EDA被证明是这些比较中唯一有效的技术。
{"title":"Searching for Safety Violations Using Estimation of Distribution Algorithms","authors":"J. Staunton, J. A. Clark","doi":"10.1109/ICSTW.2010.24","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.24","url":null,"abstract":"Using aspects of model checking to analyse multi- threaded software is a promising method for finding common concurrent errors such as deadlock. Traditional model checking tools exhaustively search the state space of a concurrent system in order to find faults. Unfortunately, model checking suffers from the state space explosion problem, limiting the applicability of the approach to commercial software. Metaheuristic search mechanisms have been used in an attempt to overcome this issue with good results. Techniques such as Genetic Algorithms (GAs) and Estimation of Distribution Algorithms (EDAs) focus the search of the state space on areas that are more likely to contain errors. In this work, a novel EDA-based approach to exploring the state space of a model is outlined. Experiments are performed on an implementation using the Java PathFinder (JPF) model checker and the ECJ toolkit. The EDA-based approach is shown to perform well against standard search procedures such as depth-first search, whilst also outperforming random search on a benchmark problem. On larger problems, the EDA is shown to be the only effective technique of those compared.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Rich Internet Application Testing Using Execution Trace Data 使用执行跟踪数据进行富Internet应用程序测试
Domenico Amalfitano, A. R. Fasolino, Porfirio Tramontana
The rapid and growing diffusion of Rich Internet Applications (RIAs) with their enhanced interactivity, responsiveness and dynamicity is sharpening the distance between Web applications and desktop applications, making the Web experience more and more appealing and user-friendly. This paper presents a technique for testing RIAs that generates test cases from application execution traces, and obtains more scalable test suites thanks to testing reduction techniques. Execution traces provide a fast and cheap way for generating test cases and can be obtained either from user sessions, or by crawling the application or by combining both approaches. The proposed technique has been evaluated by a preliminary experiment that investigated the effectiveness of different approaches for execution trace collection and of several criteria for reducing the test suites. The experimental results showed the feasibility of the technique and that its effectiveness can be improved by hybrid approaches that combine both manually and automatically obtained execution traces of the application.
富Internet应用程序(ria)以其增强的交互性、响应性和动态性迅速扩散,拉大了Web应用程序和桌面应用程序之间的距离,使Web体验越来越吸引人,用户友好。本文提出了一种测试ria的技术,该技术从应用程序执行跟踪中生成测试用例,并通过测试缩减技术获得更多可伸缩的测试套件。执行跟踪为生成测试用例提供了一种快速而廉价的方法,可以从用户会话中获得,也可以通过爬行应用程序或结合这两种方法获得。所提出的技术已经通过一个初步的实验进行了评估,该实验调查了用于执行跟踪收集的不同方法的有效性,以及用于减少测试套件的几个标准。实验结果表明,该方法是可行的,并且可以通过人工和自动混合获取应用程序的执行轨迹来提高其有效性。
{"title":"Rich Internet Application Testing Using Execution Trace Data","authors":"Domenico Amalfitano, A. R. Fasolino, Porfirio Tramontana","doi":"10.1109/ICSTW.2010.34","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.34","url":null,"abstract":"The rapid and growing diffusion of Rich Internet Applications (RIAs) with their enhanced interactivity, responsiveness and dynamicity is sharpening the distance between Web applications and desktop applications, making the Web experience more and more appealing and user-friendly. This paper presents a technique for testing RIAs that generates test cases from application execution traces, and obtains more scalable test suites thanks to testing reduction techniques. Execution traces provide a fast and cheap way for generating test cases and can be obtained either from user sessions, or by crawling the application or by combining both approaches. The proposed technique has been evaluated by a preliminary experiment that investigated the effectiveness of different approaches for execution trace collection and of several criteria for reducing the test suites. The experimental results showed the feasibility of the technique and that its effectiveness can be improved by hybrid approaches that combine both manually and automatically obtained execution traces of the application.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Practical Experience Gained from Passive Testing of Web Based Systems 从基于Web的系统被动测试中获得的实践经验
A. Bagnato, Fabio Raiteri, Wissam Mallouli, B. Wehbi
In recent years Web-based systems have become extremely popular and, nowadays, they are used in critical environments such as financial, medical, and military systems. As the use of Web applications for security-critical services has increased, the number and sophistication of attacks against these applications have grown as well. For this reason it is essential to be able to prove that the target Web-based system implements its designed security requirements avoiding known vulnerabilities in HTTP-based solutions. To reach this aim, we can rely on several testing techniques and mainly on security passive testing approach that is becoming increasingly important to security-relevant aspects into web based software systems. This article describes the application of the TestInv-P passive testing tool as part of the testing phase of TXT e-tourism Web application. TestInv-P is a passive testing tool that monitors communication traces of an application during run-time and verifies whether it satisfies certain security-related invariants derived from SHIELDS models.
近年来,基于web的系统变得非常流行,如今,它们被用于金融、医疗和军事系统等关键环境中。随着对安全关键型服务使用Web应用程序的增加,针对这些应用程序的攻击的数量和复杂程度也在增加。因此,必须能够证明目标基于web的系统实现了其设计的安全需求,避免了基于http的解决方案中的已知漏洞。为了达到这个目标,我们可以依靠几种测试技术,主要是安全被动测试方法,这对于基于web的软件系统的安全相关方面变得越来越重要。本文描述了testinvp被动测试工具的应用,作为TXT电子旅游Web应用程序测试阶段的一部分。TestInv-P是一个被动的测试工具,它在运行期间监视应用程序的通信跟踪,并验证它是否满足从SHIELDS模型派生的某些与安全相关的不变量。
{"title":"Practical Experience Gained from Passive Testing of Web Based Systems","authors":"A. Bagnato, Fabio Raiteri, Wissam Mallouli, B. Wehbi","doi":"10.1109/ICSTW.2010.39","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.39","url":null,"abstract":"In recent years Web-based systems have become extremely popular and, nowadays, they are used in critical environments such as financial, medical, and military systems. As the use of Web applications for security-critical services has increased, the number and sophistication of attacks against these applications have grown as well. For this reason it is essential to be able to prove that the target Web-based system implements its designed security requirements avoiding known vulnerabilities in HTTP-based solutions. To reach this aim, we can rely on several testing techniques and mainly on security passive testing approach that is becoming increasingly important to security-relevant aspects into web based software systems. This article describes the application of the TestInv-P passive testing tool as part of the testing phase of TXT e-tourism Web application. TestInv-P is a passive testing tool that monitors communication traces of an application during run-time and verifies whether it satisfies certain security-related invariants derived from SHIELDS models.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123999611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Modeling of GUI Test Profile GUI测试剖面的建模研究
Lei Zhao, K. Cai
GUI (Graphical User Interface) test cases contain much richer information than the test cases in non-GUI testing. Based on the information, the GUI test profiles can be represented in more forms. In this paper, we study the modeling of the test profiles in GUI testing. Several models of GUI test profiles are proposed. Then we present a methodology of studying the relationship between the test profiles and the fault detection in GUI testing. A control scheme based on this relationship that may be able to improve the efficiency of GUI testing is also proposed.
GUI(图形用户界面)测试用例比非GUI测试中的测试用例包含更丰富的信息。基于这些信息,GUI测试概要文件可以以更多的形式表示。本文研究了GUI测试中测试概要文件的建模问题。提出了几种GUI测试概要模型。然后提出了一种研究GUI测试中测试轮廓与故障检测之间关系的方法。本文还提出了一种基于这种关系的控制方案,可以提高GUI测试的效率。
{"title":"On Modeling of GUI Test Profile","authors":"Lei Zhao, K. Cai","doi":"10.1109/ICSTW.2010.19","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.19","url":null,"abstract":"GUI (Graphical User Interface) test cases contain much richer information than the test cases in non-GUI testing. Based on the information, the GUI test profiles can be represented in more forms. In this paper, we study the modeling of the test profiles in GUI testing. Several models of GUI test profiles are proposed. Then we present a methodology of studying the relationship between the test profiles and the fault detection in GUI testing. A control scheme based on this relationship that may be able to improve the efficiency of GUI testing is also proposed.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128368026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Manifesto for Higher Order Mutation Testing 高阶突变检测的宣言
M. Harman, Yue Jia, W. Langdon
We argue that higher order mutants are potentially better able to simulate real faults and to reveal insights into bugs than the restricted class of first order mutants. The Mutation Testing community has previously shied away from Higher Order Mutation Testing believing it to be too expensive and therefore impractical. However, this paper argues that Search Based Software Engineering can provide a solution to this apparent problem, citing results from recent work on search based optimization techniques for constructing higher order mutants. We also present a research agenda for the development of Higher Order Mutation Testing.
我们认为,高阶突变体可能比一类受限的一阶突变体更能模拟真实的故障,并揭示对错误的见解。突变测试社区以前一直回避高阶突变测试,认为它太昂贵,因此不切实际。然而,本文认为基于搜索的软件工程可以为这个明显的问题提供一个解决方案,并引用了最近在构建高阶突变体的基于搜索的优化技术方面的研究结果。我们也提出了一个研究议程的发展,高阶突变检测。
{"title":"A Manifesto for Higher Order Mutation Testing","authors":"M. Harman, Yue Jia, W. Langdon","doi":"10.1109/ICSTW.2010.13","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.13","url":null,"abstract":"We argue that higher order mutants are potentially better able to simulate real faults and to reveal insights into bugs than the restricted class of first order mutants. The Mutation Testing community has previously shied away from Higher Order Mutation Testing believing it to be too expensive and therefore impractical. However, this paper argues that Search Based Software Engineering can provide a solution to this apparent problem, citing results from recent work on search based optimization techniques for constructing higher order mutants. We also present a research agenda for the development of Higher Order Mutation Testing.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128828079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Generating Distinguishing Tests Using the Minion Constraint Solver 使用仆从约束求解器生成区分测试
F. Wotawa, M. Nica, B. Aichernig
We discuss the generation of test cases for demonstrating the non-equivalence of two programs. This problem has applications in mutation testing and automated debugging. After transforming the programs into Static-Single-Assignment form, the MINION constraint solver is used to generate test vectors that demonstrate the observable difference. The experiments show the feasability of our constraint solving approach.
我们讨论了证明两个程序不等价的测试用例的生成。这个问题在突变测试和自动调试中都有应用。将程序转化为静态单分配形式后,利用MINION约束解算器生成可观察差异的测试向量。实验证明了约束求解方法的可行性。
{"title":"Generating Distinguishing Tests Using the Minion Constraint Solver","authors":"F. Wotawa, M. Nica, B. Aichernig","doi":"10.1109/ICSTW.2010.11","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.11","url":null,"abstract":"We discuss the generation of test cases for demonstrating the non-equivalence of two programs. This problem has applications in mutation testing and automated debugging. After transforming the programs into Static-Single-Assignment form, the MINION constraint solver is used to generate test vectors that demonstrate the observable difference. The experiments show the feasability of our constraint solving approach.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122093041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Integrating Model-Based Testing with Evolutionary Functional Testing 集成基于模型的测试和进化功能测试
Felix F. Lindlar, Andreas Windisch, J. Wegener
Evolutionary Functional Testing (EFT) is a relatively recent approach to automating the testing process. The research presented in this paper aims at increasing the acceptability of EFT in industrial settings. An approach suitable for efficiently and effectively testing complex continuous control systems is introduced. The main focus is on generating realistic test stimuli, enabling interactivity between test driver and test object, and facilitating the process of designing a suitable fitness function. This is accomplished by integrating EFT with model-based testing methodologies resulting in an intuitive testing approach that enables even testers not familiar with search based testing to achieve good results with limited effort. A test environment optimized for deployment in the industrial domain is introduced. Features of the test environment include the capability of automatically generating realistic continuous test data sets, interacting with the system under test during test execution, and automatically executing and evaluating large numbers of tests. A thorough case study using an adaptive cruise control system from the automotive domain is performed to assess the approach. Results of this work indicate high usability, efficiency, and effectiveness of the proposed method for testing complex embedded systems.
演进功能测试(EFT)是一种相对较新的自动化测试过程的方法。本文提出的研究旨在提高EFT在工业环境中的可接受性。介绍了一种适用于复杂连续控制系统高效测试的方法。主要的重点是产生真实的测试刺激,实现测试驾驶员和测试对象之间的交互,并促进设计合适的适应度函数的过程。这是通过将EFT与基于模型的测试方法集成来实现的,从而产生一种直观的测试方法,即使是不熟悉基于搜索的测试的测试人员也可以通过有限的努力获得良好的结果。介绍了一个针对工业领域部署而优化的测试环境。测试环境的特性包括自动生成真实的连续测试数据集的能力,在测试执行期间与被测系统交互的能力,以及自动执行和评估大量测试的能力。使用汽车领域的自适应巡航控制系统进行了全面的案例研究,以评估该方法。研究结果表明,该方法对复杂嵌入式系统的测试具有较高的可用性、效率和有效性。
{"title":"Integrating Model-Based Testing with Evolutionary Functional Testing","authors":"Felix F. Lindlar, Andreas Windisch, J. Wegener","doi":"10.1109/ICSTW.2010.10","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.10","url":null,"abstract":"Evolutionary Functional Testing (EFT) is a relatively recent approach to automating the testing process. The research presented in this paper aims at increasing the acceptability of EFT in industrial settings. An approach suitable for efficiently and effectively testing complex continuous control systems is introduced. The main focus is on generating realistic test stimuli, enabling interactivity between test driver and test object, and facilitating the process of designing a suitable fitness function. This is accomplished by integrating EFT with model-based testing methodologies resulting in an intuitive testing approach that enables even testers not familiar with search based testing to achieve good results with limited effort. A test environment optimized for deployment in the industrial domain is introduced. Features of the test environment include the capability of automatically generating realistic continuous test data sets, interacting with the system under test during test execution, and automatically executing and evaluating large numbers of tests. A thorough case study using an adaptive cruise control system from the automotive domain is performed to assess the approach. Results of this work indicate high usability, efficiency, and effectiveness of the proposed method for testing complex embedded systems.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"13 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129844358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Functional Programming Way to Interact with Software Attacks and Vulnerabilities 与软件攻击和漏洞交互的函数式编程方法
V. Damjanovic, D. Djuric
This paper proposes using functional programming style in a way to respond to detection of and interaction with the software attacks and vulnerabilities. Additionally, our approach considers involving Description Logics, as a basis for the use of the Semantic Web and meta-programming to produce executable ontologies and to enable semantic reasoning over behavior and interaction with software attacks and vulnerabilities. Accordingly, we introduce Magic Potion, a recently defined Domain Specific meta-Language that uses Modeling Spaces framework to study heterogeneous modeling and meta-modeling problems inspired by Model Driven Architecture. As an example of formalism for modeling software attacks and vulnerabilities, we explore Attack Tree, which provides a formal methodology for analyzing the security of the system. Based on Attack Tree, which is herein specified for a particular problem of dealing with known attacks and vulnerabilities of the security layer of the Wireless Application Protocol, and which is particularly built on top of Magic Potion specification, we define our specific Domain Specific Language that we call Attack Tree Domain Specific Language. It is envisioned as a tool for modeling and interacting with software attacks and vulnerabilities.
本文提出使用函数式编程风格来响应软件攻击和漏洞的检测和交互。此外,我们的方法考虑涉及描述逻辑,作为使用语义Web和元编程的基础,以产生可执行的本体,并支持对行为和与软件攻击和漏洞的交互进行语义推理。因此,我们介绍了Magic Potion,一种最近定义的领域特定元语言,它使用建模空间框架来研究异构建模和受模型驱动体系结构启发的元建模问题。作为建模软件攻击和漏洞的形式化示例,我们探讨了攻击树,它为分析系统的安全性提供了形式化的方法。攻击树是针对无线应用协议安全层的已知攻击和漏洞处理的特定问题而指定的,并且是建立在Magic Potion规范之上的,我们基于攻击树定义了我们特定的领域特定语言,我们称之为攻击树领域特定语言。它被设想为一种对软件攻击和漏洞进行建模和交互的工具。
{"title":"Functional Programming Way to Interact with Software Attacks and Vulnerabilities","authors":"V. Damjanovic, D. Djuric","doi":"10.1109/ICSTW.2010.53","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.53","url":null,"abstract":"This paper proposes using functional programming style in a way to respond to detection of and interaction with the software attacks and vulnerabilities. Additionally, our approach considers involving Description Logics, as a basis for the use of the Semantic Web and meta-programming to produce executable ontologies and to enable semantic reasoning over behavior and interaction with software attacks and vulnerabilities. Accordingly, we introduce Magic Potion, a recently defined Domain Specific meta-Language that uses Modeling Spaces framework to study heterogeneous modeling and meta-modeling problems inspired by Model Driven Architecture. As an example of formalism for modeling software attacks and vulnerabilities, we explore Attack Tree, which provides a formal methodology for analyzing the security of the system. Based on Attack Tree, which is herein specified for a particular problem of dealing with known attacks and vulnerabilities of the security layer of the Wireless Application Protocol, and which is particularly built on top of Magic Potion specification, we define our specific Domain Specific Language that we call Attack Tree Domain Specific Language. It is envisioned as a tool for modeling and interacting with software attacks and vulnerabilities.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128986433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using Constraints to Verify Properties of Rule Programs 使用约束来验证规则程序的属性
B. Berstel, M. Leconte
Rule-based programming has been gaining interest in the industry for several years, through the growing use of Business Rules Management Systems. A demand for verification of semantic properties on rule programs has thus emerged. In this paper we present an approach to rule program verification, using constraints to model program executions and verification properties, and a Constraint-Based Programming Solver (CP Solver) to compute the answers to verification questions. We also study the use of constraint-based programming in rule program verification, and the consequences of this usage on the CP Solver compared to combinatorial optimization problems.
几年来,随着业务规则管理系统(Business Rules Management Systems)的日益普及,基于规则的编程在业界引起了越来越多的兴趣。因此,出现了对规则程序的语义属性进行验证的需求。在本文中,我们提出了一种规则程序验证的方法,使用约束对程序执行和验证属性建模,以及一个基于约束的编程求解器(CP求解器)来计算验证问题的答案。我们还研究了基于约束的编程在规则程序验证中的使用,以及与组合优化问题相比,这种使用对CP求解器的影响。
{"title":"Using Constraints to Verify Properties of Rule Programs","authors":"B. Berstel, M. Leconte","doi":"10.1109/ICSTW.2010.42","DOIUrl":"https://doi.org/10.1109/ICSTW.2010.42","url":null,"abstract":"Rule-based programming has been gaining interest in the industry for several years, through the growing use of Business Rules Management Systems. A demand for verification of semantic properties on rule programs has thus emerged. In this paper we present an approach to rule program verification, using constraints to model program executions and verification properties, and a Constraint-Based Programming Solver (CP Solver) to compute the answers to verification questions. We also study the use of constraint-based programming in rule program verification, and the consequences of this usage on the CP Solver compared to combinatorial optimization problems.","PeriodicalId":117410,"journal":{"name":"2010 Third International Conference on Software Testing, Verification, and Validation Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116315114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2010 Third International Conference on Software Testing, Verification, and Validation Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1