首页 > 最新文献

2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)最新文献

英文 中文
Obtaining Fuzzing Results with Different Timeouts 获得不同超时时间下的模糊测试结果
Wen-Xin Zhang
Coverage-Guided fuzzing is the type of fuzzing which focuses on the code or branch coverage. It is mainly efficient in detecting buffer overflow. For the code coverage, it is an important parameter of performance evaluation of the Coverage-Guided fuzzing tools, since the higher coverage means higher possibility of bug detection. However, the timeout set for the fuzzing also affects the efficiency, due to the fact that the growth rate of code coverage will gradually become slower as the running time becoming longer. Setting a timeout that is too long cannot help improving the coverage nor the bug detected, and it will be a complete waste of time. Since selecting the fuzzing time might be quite confusing for testers, in this paper, the author decided to discover the relationship of the growth of the coverage and the running time of the. AFL and FuzzFactory were used for the evaluation and the timeout were set as 1 second, 1 minute, 1 hour, 6 hours and 12 hours respectively. The results showed the relationship between fuzzing time and the performance, for all fuzzers and the effect between different fuzzers.
覆盖引导的模糊测试是一种专注于代码或分支覆盖的模糊测试。它主要用于检测缓冲区溢出。对于代码覆盖率来说,它是覆盖率引导的模糊测试工具性能评估的一个重要参数,因为覆盖率越高意味着发现bug的可能性越高。但是,为模糊测试设置的超时也会影响效率,因为随着运行时间的延长,代码覆盖率的增长速度会逐渐变慢。设置过长的超时既不能帮助提高覆盖率,也不能帮助检测到错误,而且完全是浪费时间。由于模糊时间的选择可能会让测试人员感到困惑,因此在本文中,作者决定发现覆盖率的增长与运行时间的关系。采用AFL和FuzzFactory进行评价,超时时间分别设置为1秒、1分钟、1小时、6小时和12小时。结果显示了模糊时间与性能之间的关系,以及不同模糊器之间的效果。
{"title":"Obtaining Fuzzing Results with Different Timeouts","authors":"Wen-Xin Zhang","doi":"10.1109/ICSTW55395.2022.00048","DOIUrl":"https://doi.org/10.1109/ICSTW55395.2022.00048","url":null,"abstract":"Coverage-Guided fuzzing is the type of fuzzing which focuses on the code or branch coverage. It is mainly efficient in detecting buffer overflow. For the code coverage, it is an important parameter of performance evaluation of the Coverage-Guided fuzzing tools, since the higher coverage means higher possibility of bug detection. However, the timeout set for the fuzzing also affects the efficiency, due to the fact that the growth rate of code coverage will gradually become slower as the running time becoming longer. Setting a timeout that is too long cannot help improving the coverage nor the bug detected, and it will be a complete waste of time. Since selecting the fuzzing time might be quite confusing for testers, in this paper, the author decided to discover the relationship of the growth of the coverage and the running time of the. AFL and FuzzFactory were used for the evaluation and the timeout were set as 1 second, 1 minute, 1 hour, 6 hours and 12 hours respectively. The results showed the relationship between fuzzing time and the performance, for all fuzzers and the effect between different fuzzers.","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Architecture Elements Applied to Software Test: View, Viewpoints and Containers 应用于软件测试的软件架构元素:视图、视点和容器
J. Hagar
This paper presents definitions of test architecture views, viewpoints, and containers. The paper encourages debate within the modelling and architecture community and builds on previous work and papers. There are job postings for test architects. However, many testers and system architects do not consider test modeling and planning to include test architectures, views, viewpoints, and contents. The world of standards, particularly test standards, has not yet reached a consensus on software test architectures. This paper also presents definitions and considerations for architectural elements and concepts within a test perspective.
本文给出了测试架构视图、视点和容器的定义。这篇论文鼓励在建模和建筑社区内进行讨论,并以以前的工作和论文为基础。有测试架构师的招聘启事。然而,许多测试人员和系统架构师没有考虑测试建模和计划来包括测试架构、视图、视点和内容。标准的世界,特别是测试标准,还没有在软件测试架构上达成一致。本文还展示了测试透视图中体系结构元素和概念的定义和注意事项。
{"title":"Software Architecture Elements Applied to Software Test: View, Viewpoints and Containers","authors":"J. Hagar","doi":"10.1109/ICSTW55395.2022.00051","DOIUrl":"https://doi.org/10.1109/ICSTW55395.2022.00051","url":null,"abstract":"This paper presents definitions of test architecture views, viewpoints, and containers. The paper encourages debate within the modelling and architecture community and builds on previous work and papers. There are job postings for test architects. However, many testers and system architects do not consider test modeling and planning to include test architectures, views, viewpoints, and contents. The world of standards, particularly test standards, has not yet reached a consensus on software test architectures. This paper also presents definitions and considerations for architectural elements and concepts within a test perspective.","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115761985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System 安全与安全分析的监测方法:在负荷定位系统中的应用
Zujany Salazar, A. Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, M. Rakoczy
Safety monitoring of Industrial Control Systems (ICS) is a must for optimal operation of safe manufacturing facilities. Failures and miss-behaviours seldomly occur without prior warning, but these warnings are often subtle, requiring careful analysis of data by experienced personnel for early detection. Monitoring function allows to promptly take adequate corrective actions in order to maximize uptime and increase trust of running industrial systems. In this paper, we present two main approaches of monitoring techniques implemented in the Montimage MMT tool. The first approach is a signature-based approach, where there are safety properties to be checked on the ICS logs, and the other relies on Machine Learning (ML) to detect anomalies. Both methods have been applied to check safety on an industrial system: a crane load position system provided by ABB. Several experiments have been performed to check if the information provided by a system’s PLC is correct, guarantying the safety of the system.
工业控制系统(ICS)的安全监测是安全生产设施优化运行的必要条件。故障和错误行为很少在没有事先警告的情况下发生,但这些警告往往是微妙的,需要有经验的人员对数据进行仔细分析,以便及早发现。监控功能允许及时采取适当的纠正措施,以最大限度地延长正常运行时间,增加运行工业系统的信任。在本文中,我们介绍了在Montimage MMT工具中实现的两种主要监控技术方法。第一种方法是基于签名的方法,在ICS日志中检查安全属性,另一种方法依赖于机器学习(ML)来检测异常。将这两种方法应用于工业系统的安全性检查:ABB提供的起重机负载位置系统,并进行了多次实验,以检查系统PLC提供的信息是否正确,保证了系统的安全性。
{"title":"Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System","authors":"Zujany Salazar, A. Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, M. Rakoczy","doi":"10.1109/ICSTW55395.2022.00021","DOIUrl":"https://doi.org/10.1109/ICSTW55395.2022.00021","url":null,"abstract":"Safety monitoring of Industrial Control Systems (ICS) is a must for optimal operation of safe manufacturing facilities. Failures and miss-behaviours seldomly occur without prior warning, but these warnings are often subtle, requiring careful analysis of data by experienced personnel for early detection. Monitoring function allows to promptly take adequate corrective actions in order to maximize uptime and increase trust of running industrial systems. In this paper, we present two main approaches of monitoring techniques implemented in the Montimage MMT tool. The first approach is a signature-based approach, where there are safety properties to be checked on the ICS logs, and the other relies on Machine Learning (ML) to detect anomalies. Both methods have been applied to check safety on an industrial system: a crane load position system provided by ABB. Several experiments have been performed to check if the information provided by a system’s PLC is correct, guarantying the safety of the system.","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121927060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the AIST 2022 Chair 来自AIST 2022主席的信息
{"title":"Message from the AIST 2022 Chair","authors":"","doi":"10.1109/icstw55395.2022.00007","DOIUrl":"https://doi.org/10.1109/icstw55395.2022.00007","url":null,"abstract":"","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124837583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Combinatorial Testing to High-Speed Railway Automatic Train Protection System 组合测试在高速铁路列车自动保护系统中的应用
Rui Huang, Chang Rao, Yu Lei, Jin Guo, Yadong Zhang
The onboard Automatic Train Protection System (ATP) is one of the key components of the Chinese high-speed railway train control system. ATP is a safety-critical system since a failure of ATP could result in serious accidents. This paper reports a combinatorial testing practice performed in testing one of the major ATP functions, i.e. Balise Information Processing (BIP). We created one input model for each of the total 7 application scenarios of BIP. We generated a total of 178 pair-wise tests using the ACTS tool. We executed all these 178 tests, among which 172 tests passed and 6 tests failed. We found a total of 5 new faults, including 2 critical faults, and 3 major faults. We believe that combinatorial testing can be a very effective approach to testing large and complex real-world systems such as ATP.
车载列车自动保护系统(ATP)是我国高速铁路列控系统的关键部件之一。ATP是一个安全关键系统,因为ATP的故障可能导致严重的事故。本文报道了一种组合测试实践,用于测试ATP的主要功能之一,即Balise信息处理(BIP)。我们为总共7个BIP应用场景中的每一个创建了一个输入模型。我们使用ACTS工具共生成178个成对检验。我们执行了全部178个测试,其中172个测试通过,6个测试失败。共发现5个新故障,其中2个严重故障,3个主要故障。我们相信组合测试可以是一个非常有效的方法来测试大型和复杂的现实世界的系统,如ATP。
{"title":"Applying Combinatorial Testing to High-Speed Railway Automatic Train Protection System","authors":"Rui Huang, Chang Rao, Yu Lei, Jin Guo, Yadong Zhang","doi":"10.1109/ICSTW55395.2022.00022","DOIUrl":"https://doi.org/10.1109/ICSTW55395.2022.00022","url":null,"abstract":"The onboard Automatic Train Protection System (ATP) is one of the key components of the Chinese high-speed railway train control system. ATP is a safety-critical system since a failure of ATP could result in serious accidents. This paper reports a combinatorial testing practice performed in testing one of the major ATP functions, i.e. Balise Information Processing (BIP). We created one input model for each of the total 7 application scenarios of BIP. We generated a total of 178 pair-wise tests using the ACTS tool. We executed all these 178 tests, among which 172 tests passed and 6 tests failed. We found a total of 5 new faults, including 2 critical faults, and 3 major faults. We believe that combinatorial testing can be a very effective approach to testing large and complex real-world systems such as ATP.","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134036226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Removing Uninteresting Bytes in Software Fuzzing 去除软件模糊测试中不感兴趣的字节
Aftab Hussain, Mohammad Amin Alipour
Software fuzzing mutates bytes in test seeds to explore different behaviors of a program under test. Initial seeds can have great impact on the performance of fuzzing campaigns. Mutating a lot of uninteresting bytes in a large seed wastes the fuzzing resources and slows down the exploration of important parts of the program. However, identifying "uninteresting" bytes is difficult. In this paper, we propose and evaluate Diar, a simple approach for mitigating the problem of uninteresting bytes in the seeds. In this approach, we call a byte uninteresting if its removal does not substantially change the coverage of a seed. Next, we use the non-adequate test reduction technique to remove such bytes in the seeds. We performed a preliminary study by applying this approach on the initial seeds in two fuzzing campaigns. Our results suggest fuzzing campaigns that start with reduced seeds, find new paths faster, and can produce higher coverage overall.
软件模糊测试通过改变测试种子中的字节来探索被测程序的不同行为。初始种子对模糊测试活动的性能有很大的影响。在一个大的种子中改变许多不感兴趣的字节会浪费模糊资源,并减慢对程序重要部分的探索。然而,识别“无趣”字节是困难的。在本文中,我们提出并评估了Diar,一种减轻种子中无趣字节问题的简单方法。在这种方法中,如果删除一个字节并没有实质上改变种子的覆盖范围,我们就称它为无趣字节。接下来,我们使用非适当的测试缩减技术来删除种子中的这些字节。我们通过将这种方法应用于两个模糊运动中的初始种子进行了初步研究。我们的研究结果表明,模糊运动从减少种子开始,更快地找到新的路径,并且可以产生更高的总体覆盖率。
{"title":"Removing Uninteresting Bytes in Software Fuzzing","authors":"Aftab Hussain, Mohammad Amin Alipour","doi":"10.1109/ICSTW55395.2022.00058","DOIUrl":"https://doi.org/10.1109/ICSTW55395.2022.00058","url":null,"abstract":"Software fuzzing mutates bytes in test seeds to explore different behaviors of a program under test. Initial seeds can have great impact on the performance of fuzzing campaigns. Mutating a lot of uninteresting bytes in a large seed wastes the fuzzing resources and slows down the exploration of important parts of the program. However, identifying \"uninteresting\" bytes is difficult. In this paper, we propose and evaluate Diar, a simple approach for mitigating the problem of uninteresting bytes in the seeds. In this approach, we call a byte uninteresting if its removal does not substantially change the coverage of a seed. Next, we use the non-adequate test reduction technique to remove such bytes in the seeds. We performed a preliminary study by applying this approach on the initial seeds in two fuzzing campaigns. Our results suggest fuzzing campaigns that start with reduced seeds, find new paths faster, and can produce higher coverage overall.","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering of Usage Traces for Regression Test Cases Selection 回归测试用例选择的使用轨迹聚类
Vahana Dorcis, F. Bouquet, Frédéric Dadeau
Our objective is to define a regression testing approach that relies on usage traces that capture the behaviours of the system when exploited by the users. We achieve that by studying and evaluating clustering techniques applied to usage traces for regression tests selection. We first evaluate the existing vectorization methods and the clusters computed by the classical algorithms, and then, evaluate the clusters using existing state-of-the-art validation methods. We conclude that neither the existing clustering algorithms, nor the seminal clustering evaluation techniques are well-suited for identifying representative behaviours of the system when applied to usage traces. Thus, we propose a custom clustering algorithm and a dedicated cluster evaluation index for selecting usage trace to be used as regression tests.
我们的目标是定义一种回归测试方法,它依赖于用户使用时捕获系统行为的使用跟踪。我们通过研究和评估应用于回归测试选择的使用轨迹的聚类技术来实现这一点。我们首先评估现有的矢量化方法和经典算法计算的聚类,然后使用现有的最先进的验证方法评估聚类。我们得出的结论是,无论是现有的聚类算法,还是开创性的聚类评估技术,都不适合在应用于使用痕迹时识别系统的代表性行为。因此,我们提出了一种自定义聚类算法和一个专用的聚类评估指标,用于选择使用跟踪作为回归测试。
{"title":"Clustering of Usage Traces for Regression Test Cases Selection","authors":"Vahana Dorcis, F. Bouquet, Frédéric Dadeau","doi":"10.1109/ICSTW55395.2022.00036","DOIUrl":"https://doi.org/10.1109/ICSTW55395.2022.00036","url":null,"abstract":"Our objective is to define a regression testing approach that relies on usage traces that capture the behaviours of the system when exploited by the users. We achieve that by studying and evaluating clustering techniques applied to usage traces for regression tests selection. We first evaluate the existing vectorization methods and the clusters computed by the classical algorithms, and then, evaluate the clusters using existing state-of-the-art validation methods. We conclude that neither the existing clustering algorithms, nor the seminal clustering evaluation techniques are well-suited for identifying representative behaviours of the system when applied to usage traces. Thus, we propose a custom clustering algorithm and a dedicated cluster evaluation index for selecting usage trace to be used as regression tests.","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133864988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Falsification of Multiple Requirements for Cyber-Physical Systems Using Online Generative Adversarial Networks and Multi-Armed Bandits 利用在线生成对抗网络和多武装盗匪伪造网络物理系统的多重需求
J. Peltomäki, Ivan Porres
We consider the problem of falsifying safety requirements of Cyber-Physical Systems expressed in signal temporal logic (STL). This problem can be turned into an optimization problem via STL robustness functions. In this paper, our focus is in falsifying systems with multiple requirements. We propose to solve such conjunctive requirements using online generative adversarial networks (GANs) as test generators. Our main contribution is an algorithm which falsifies a conjunctive requirement φ1 ∧•⋯•∧φn by using a GAN for each requirement φi separately. Using ideas from multi-armed bandit algorithms, our algorithm only trains a single GAN at every step, which saves resources. Our experiments indicate that, in addition to saving resources, this multi-armed bandit algorithm can falsify requirements with fewer number of executions on the system under test when compared to (i) an algorithm training a single GAN for the complete conjunctive requirement and (ii) an algorithm always training n GANs at each step.
我们考虑了用信号时间逻辑(STL)表达的信息物理系统安全要求的证伪问题。这个问题可以通过STL鲁棒性函数转化为一个优化问题。在本文中,我们的重点是伪造具有多个需求的系统。我们建议使用在线生成对抗网络(GANs)作为测试生成器来解决这种连接需求。我们的主要贡献是一种算法,该算法通过对每个要求φi分别使用GAN来证伪一个共轭要求φ1∧•⋯•∧φn。该算法利用多臂强盗算法的思想,每一步只训练一个GAN,节省了资源。我们的实验表明,除了节省资源之外,这种多臂强盗算法可以在被测试系统上以更少的执行次数来伪证需求,而不是(i)为完整的连接需求训练单个GAN的算法和(ii)在每一步总是训练n个GAN的算法。
{"title":"Falsification of Multiple Requirements for Cyber-Physical Systems Using Online Generative Adversarial Networks and Multi-Armed Bandits","authors":"J. Peltomäki, Ivan Porres","doi":"10.1109/ICSTW55395.2022.00018","DOIUrl":"https://doi.org/10.1109/ICSTW55395.2022.00018","url":null,"abstract":"We consider the problem of falsifying safety requirements of Cyber-Physical Systems expressed in signal temporal logic (STL). This problem can be turned into an optimization problem via STL robustness functions. In this paper, our focus is in falsifying systems with multiple requirements. We propose to solve such conjunctive requirements using online generative adversarial networks (GANs) as test generators. Our main contribution is an algorithm which falsifies a conjunctive requirement φ1 ∧•⋯•∧φn by using a GAN for each requirement φi separately. Using ideas from multi-armed bandit algorithms, our algorithm only trains a single GAN at every step, which saves resources. Our experiments indicate that, in addition to saving resources, this multi-armed bandit algorithm can falsify requirements with fewer number of executions on the system under test when compared to (i) an algorithm training a single GAN for the complete conjunctive requirement and (ii) an algorithm always training n GANs at each step.","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using Search-Based Software Testing to Guide the Strive for Robust Machine Learning Components: Lessons Learned Across Systems and Simulators in the Mobility Domain 使用基于搜索的软件测试来指导实现健壮的机器学习组件:在移动领域跨系统和模拟器的经验教训
Markus Borg
This talk shares lessons learned from using search-based techniques for robustness testing in simulators.
本次演讲将分享在模拟器中使用基于搜索的技术进行鲁棒性测试的经验教训。
{"title":"Using Search-Based Software Testing to Guide the Strive for Robust Machine Learning Components: Lessons Learned Across Systems and Simulators in the Mobility Domain","authors":"Markus Borg","doi":"10.1109/ICSTW55395.2022.00014","DOIUrl":"https://doi.org/10.1109/ICSTW55395.2022.00014","url":null,"abstract":"This talk shares lessons learned from using search-based techniques for robustness testing in simulators.","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"478 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis PHP中XSS和SQLi漏洞的系统生成作为静态代码分析的测试用例
Felix Schuckert, Hanno Langweg, Basel Katt
Synthetic static code analysis test suites are important to test the basic functionality of tools. We present a framework that uses different source code patterns to generate Cross Site Scripting and SQL injection test cases. A decision tree is used to determine if the test cases are vulnerable. The test cases are split into two test suites. The first test suite contains 258,432 test cases that have influence on the decision trees. The second test suite contains 20 vulnerable test cases with different data flow patterns. The test cases are scanned with two commercial static code analysis tools to show that they can be used to benchmark and identify problems of static code analysis tools. Expert interviews confirm that the decision tree is a solid way to determine the vulnerable test cases and that the test suites are relevant.
合成静态代码分析测试套件对于测试工具的基本功能非常重要。我们提出了一个框架,它使用不同的源代码模式来生成跨站点脚本和SQL注入测试用例。决策树用于确定测试用例是否易受攻击。测试用例被分成两个测试套件。第一个测试套件包含对决策树有影响的258,432个测试用例。第二个测试套件包含20个具有不同数据流模式的易受攻击的测试用例。用两个商业静态代码分析工具扫描测试用例,以显示它们可以用于基准测试和识别静态代码分析工具的问题。专家访谈确认决策树是确定易受攻击的测试用例的可靠方法,并且测试套件是相关的。
{"title":"Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis","authors":"Felix Schuckert, Hanno Langweg, Basel Katt","doi":"10.1109/ICSTW55395.2022.00053","DOIUrl":"https://doi.org/10.1109/ICSTW55395.2022.00053","url":null,"abstract":"Synthetic static code analysis test suites are important to test the basic functionality of tools. We present a framework that uses different source code patterns to generate Cross Site Scripting and SQL injection test cases. A decision tree is used to determine if the test cases are vulnerable. The test cases are split into two test suites. The first test suite contains 258,432 test cases that have influence on the decision trees. The second test suite contains 20 vulnerable test cases with different data flow patterns. The test cases are scanned with two commercial static code analysis tools to show that they can be used to benchmark and identify problems of static code analysis tools. Expert interviews confirm that the decision tree is a solid way to determine the vulnerable test cases and that the test suites are relevant.","PeriodicalId":147133,"journal":{"name":"2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116352079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1