首页 > 最新文献

2010 Third International Conference on Software Testing, Verification and Validation最新文献

英文 中文
Explanation-Based Generalization of Infeasible Path 基于解释的不可行路径概化
Mickaël Delahaye, Bernard Botella, A. Gotlieb
Recent code-based test input generators based on dynamic symbolic execution increase path coverage by solving path condition with a constraint or an SMT solver. When the solver considers path condition produced from an infeasible path, it tries to show unsatisfiability, which is a useless time-consuming process. In this paper, we propose a new method that takes opportunity of the detection of a single infeasible path to generalize to a (possibly infinite) family of infeasible paths, which will not have to be considered in further path conditions solving. The method exploits non-intrusive constraint-based explanations, a technique developed in Constraint Programming to explain unsatisfiability. Experimental results obtained with our prototype tool IPEG show that, whatever is the underlying constraint solving procedure (IC, Colibri and the SMT solver Z3), this approach can save considerable computational time.
最近基于动态符号执行的基于代码的测试输入生成器通过使用约束或SMT求解器求解路径条件来增加路径覆盖率。当求解器考虑由不可行路径产生的路径条件时,它试图表现出不满足性,这是一个无用的耗时过程。在本文中,我们提出了一种新的方法,利用检测到单个不可行路径的机会推广到(可能无限的)不可行路径族,这在进一步的路径条件求解中不必考虑。该方法利用非侵入式的基于约束的解释,这是约束规划中发展起来的一种解释不满意性的技术。实验结果表明,无论底层约束求解程序(IC、Colibri和SMT求解器Z3)如何,该方法都可以节省大量的计算时间。
{"title":"Explanation-Based Generalization of Infeasible Path","authors":"Mickaël Delahaye, Bernard Botella, A. Gotlieb","doi":"10.1109/ICST.2010.13","DOIUrl":"https://doi.org/10.1109/ICST.2010.13","url":null,"abstract":"Recent code-based test input generators based on dynamic symbolic execution increase path coverage by solving path condition with a constraint or an SMT solver. When the solver considers path condition produced from an infeasible path, it tries to show unsatisfiability, which is a useless time-consuming process. In this paper, we propose a new method that takes opportunity of the detection of a single infeasible path to generalize to a (possibly infinite) family of infeasible paths, which will not have to be considered in further path conditions solving. The method exploits non-intrusive constraint-based explanations, a technique developed in Constraint Programming to explain unsatisfiability. Experimental results obtained with our prototype tool IPEG show that, whatever is the underlying constraint solving procedure (IC, Colibri and the SMT solver Z3), this approach can save considerable computational time.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126107657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Towards Automated, Formal Verification of Model Transformations 迈向模型转换的自动化、形式化验证
M. Asztalos, L. Lengyel, T. Levendovszky
Verification of models and model processing programs are inevitable in real-world model-based software development. Model transformation developers are interested in offline verification methods, when only the definition of the model transformation and the metamodels of the source and target languages are used to analyze the properties and no concrete input models are taken into account. Therefore, the results of the analysis hold for each output model not just particular ones, and we have to perform the analysis only once. Most often, formal verification of model transformations is performed manually or the methods can be applied only for a certain transformation or for the analysis of only a certain property. Previous work has presented a formalism to describe the characteristics of model transformations in separate formal expressions called assertions. This description is based on the first-order logic, therefore, if deduction rules are provided, a reasoning system can use an assertion set to automatically derive additional assertions describing additional properties of model transformations. In this paper, we propose deduction rules and present the verification of a model transformation of processing business process models.
在实际的基于模型的软件开发中,模型验证和模型处理程序是不可避免的。当只使用模型转换的定义和源语言和目标语言的元模型来分析属性,而不考虑具体的输入模型时,模型转换开发人员对离线验证方法感兴趣。因此,分析的结果适用于每个输出模型,而不仅仅是特定的模型,并且我们只需要执行一次分析。大多数情况下,模型转换的正式验证是手动执行的,或者方法只能应用于特定的转换或特定属性的分析。以前的工作提出了一种形式主义,以称为断言的单独形式表达式来描述模型转换的特征。此描述基于一阶逻辑,因此,如果提供了演绎规则,推理系统可以使用断言集自动派生描述模型转换的附加属性的附加断言。在本文中,我们提出了演绎规则,并给出了一种处理业务过程模型转换的验证方法。
{"title":"Towards Automated, Formal Verification of Model Transformations","authors":"M. Asztalos, L. Lengyel, T. Levendovszky","doi":"10.1109/ICST.2010.42","DOIUrl":"https://doi.org/10.1109/ICST.2010.42","url":null,"abstract":"Verification of models and model processing programs are inevitable in real-world model-based software development. Model transformation developers are interested in offline verification methods, when only the definition of the model transformation and the metamodels of the source and target languages are used to analyze the properties and no concrete input models are taken into account. Therefore, the results of the analysis hold for each output model not just particular ones, and we have to perform the analysis only once. Most often, formal verification of model transformations is performed manually or the methods can be applied only for a certain transformation or for the analysis of only a certain property. Previous work has presented a formalism to describe the characteristics of model transformations in separate formal expressions called assertions. This description is based on the first-order logic, therefore, if deduction rules are provided, a reasoning system can use an assertion set to automatically derive additional assertions describing additional properties of model transformations. In this paper, we propose deduction rules and present the verification of a model transformation of processing business process models.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114397195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Elaborating Software Test Processes and Strategies 阐述软件测试过程和策略
Jussi Kasurinen
This paper introduces the research topic of “Elaborating Software Test Processes and Strategies”, in which I with assistance from our research group conducted a qualitative study on software producing organization’s test processes. My goal is to develop a reference model for organizations to enhance and develop their test processes based on the upcoming ISO/IEC 29119 software testing standard by interviewing professional software developers from different phases of software process. The study focuses on the aspects that compose testing strategy; human resources, test tools, test case selection, testing methods and the role of the management in the test process to name few of the major components. Based on the preliminary results, there exists room for improvements in testability of the software products and focusing the available test resources, problems which could be addressed by means of systematic process improvement and defining test strategy for the organization.
本文介绍了“阐述软件测试过程和策略”的研究课题,在课题组的协助下,我对软件生产组织的测试过程进行了定性研究。我的目标是通过采访来自软件过程不同阶段的专业软件开发人员,为组织开发一个参考模型,以基于即将发布的ISO/IEC 29119软件测试标准来增强和开发他们的测试过程。重点研究了构成测试策略的几个方面;人力资源、测试工具、测试用例选择、测试方法和测试过程中管理的角色,这些都是主要的组成部分。基于初步的结果,在软件产品的可测试性和集中可用的测试资源方面存在改进的空间,这些问题可以通过系统的过程改进和为组织定义测试策略来解决。
{"title":"Elaborating Software Test Processes and Strategies","authors":"Jussi Kasurinen","doi":"10.1109/ICST.2010.25","DOIUrl":"https://doi.org/10.1109/ICST.2010.25","url":null,"abstract":"This paper introduces the research topic of “Elaborating Software Test Processes and Strategies”, in which I with assistance from our research group conducted a qualitative study on software producing organization’s test processes. My goal is to develop a reference model for organizations to enhance and develop their test processes based on the upcoming ISO/IEC 29119 software testing standard by interviewing professional software developers from different phases of software process. The study focuses on the aspects that compose testing strategy; human resources, test tools, test case selection, testing methods and the role of the management in the test process to name few of the major components. Based on the preliminary results, there exists room for improvements in testability of the software products and focusing the available test resources, problems which could be addressed by means of systematic process improvement and defining test strategy for the organization.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Fault Detection Likelihood of Test Sequence Length 测试序列长度的故障检测可能性
F. Belli, Michael Linschulte, Christof J. Budnik, H. Stieber
Testing of graphical user interfaces is important due to its potential to reveal faults in operation and performance of the system under consideration. Most existing test approaches generate test cases as sequences of events of different length. The cost of the test process depends on the number and total length of those test sequences. One of the problems to be encountered is the determination of the test sequence length. Widely accepted hypothesis is that the longer the test sequences, the higher the chances to detect faults. However, there is no evidence that an increase of the test sequence length really affect the fault detection. This paper introduces a reliability theoretical approach to analyze the problem in the light of real-life case studies. Based on a reliability growth model the expected number of additional faults is predicted that will be detected when increasing the length of test sequences.
图形用户界面的测试很重要,因为它有可能揭示所考虑的系统在操作和性能方面的错误。大多数现有的测试方法将测试用例生成为不同长度的事件序列。测试过程的成本取决于这些测试序列的数量和总长度。要遇到的问题之一是测试序列长度的确定。广泛接受的假设是,测试序列越长,检测到故障的机会就越高。然而,没有证据表明增加测试序列长度确实会影响故障检测。本文引入了一种可靠性理论方法,结合实际案例分析了这一问题。在可靠性增长模型的基础上,预测了随着测试序列长度的增加,预计将检测到的附加故障的数量。
{"title":"Fault Detection Likelihood of Test Sequence Length","authors":"F. Belli, Michael Linschulte, Christof J. Budnik, H. Stieber","doi":"10.1109/ICST.2010.51","DOIUrl":"https://doi.org/10.1109/ICST.2010.51","url":null,"abstract":"Testing of graphical user interfaces is important due to its potential to reveal faults in operation and performance of the system under consideration. Most existing test approaches generate test cases as sequences of events of different length. The cost of the test process depends on the number and total length of those test sequences. One of the problems to be encountered is the determination of the test sequence length. Widely accepted hypothesis is that the longer the test sequences, the higher the chances to detect faults. However, there is no evidence that an increase of the test sequence length really affect the fault detection. This paper introduces a reliability theoretical approach to analyze the problem in the light of real-life case studies. Based on a reliability growth model the expected number of additional faults is predicted that will be detected when increasing the length of test sequences.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes 用于识别未完成的Bug修复的自动Bug邻域分析
Mijung Kim, S. Sinha, C. Görg, Hina B. Shah, M. J. Harrold, M. Nanda
Although many static-analysis techniques have been developed for automatically detecting bugs, such as null dereferences, fewer automated approaches have been presented for analyzing whether and how such bugs are fixed. Attempted bug fixes may be incomplete in that a related manifestation of the bug remains unfixed. In this paper, we characterize the “completeness” of attempted bug fixes that involve the flow of invalid values from one program point to another, such as null dereferences, in Java programs. Our characterization is based on the definition of a bug neighborhood, which is a scope of flows of invalid values. We present an automated analysis that, given two versions P and P' of a program, identifies the bugs in P that have been fixed in P', and classifies each fix as complete or incomplete. We implemented our technique for null-dereference bugs and conducted empirical studies using open-source projects. Our results indicate that, for the projects we studied, many bug fixes are not complete, and thus, may cause failures in subsequent executions of the program.
尽管已经开发了许多用于自动检测错误的静态分析技术,例如空引用,但是用于分析是否以及如何修复这些错误的自动化方法较少。尝试的错误修复可能是不完整的,因为错误的相关表现仍然未修复。在本文中,我们描述了试图修复的错误的“完整性”,这些错误涉及到从一个程序点到另一个程序点的无效值流,例如Java程序中的空解引用。我们的描述是基于bug邻域的定义,它是无效值流的范围。我们提出了一个自动分析,给定程序的两个版本P和P',识别P'中已修复的P中的错误,并将每个修复分类为完整或不完整。我们实现了零参考错误的技术,并使用开源项目进行了实证研究。我们的结果表明,对于我们研究的项目,许多错误修复是不完整的,因此,可能会导致程序的后续执行失败。
{"title":"Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes","authors":"Mijung Kim, S. Sinha, C. Görg, Hina B. Shah, M. J. Harrold, M. Nanda","doi":"10.1109/ICST.2010.63","DOIUrl":"https://doi.org/10.1109/ICST.2010.63","url":null,"abstract":"Although many static-analysis techniques have been developed for automatically detecting bugs, such as null dereferences, fewer automated approaches have been presented for analyzing whether and how such bugs are fixed. Attempted bug fixes may be incomplete in that a related manifestation of the bug remains unfixed. In this paper, we characterize the “completeness” of attempted bug fixes that involve the flow of invalid values from one program point to another, such as null dereferences, in Java programs. Our characterization is based on the definition of a bug neighborhood, which is a scope of flows of invalid values. We present an automated analysis that, given two versions P and P' of a program, identifies the bugs in P that have been fixed in P', and classifies each fix as complete or incomplete. We implemented our technique for null-dereference bugs and conducted empirical studies using open-source projects. Our results indicate that, for the projects we studied, many bug fixes are not complete, and thus, may cause failures in subsequent executions of the program.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
TestFul: An Evolutionary Test Approach for Java TestFul: Java的进化测试方法
L. Baresi, P. Lanzi, Matteo Miraz
This paper presents TestFul, an evolutionary testing approach for Java classes that works both at class and method level. TestFul exploits a multi-objective evolutionary algorithm to identify the “best” tests. The paper introduces the main elements of TestFul. It also compares TestFul against well-known search-based solutions using a set of classes taken from literature, known software libraries, and independent testing benchmarks. The comparison considers statement and branch coverage, size of generated tests, and generation time. On considered classes, TestFul generates better tests than other search-based solutions, and achieves higher structural coverages with tests small enough to be usable.
本文介绍了TestFul,这是一种在类和方法级别上工作的Java类的进化测试方法。TestFul利用多目标进化算法来识别“最佳”测试。本文介绍了TestFul的主要组成部分。它还使用一组取自文献、已知软件库和独立测试基准的类,将TestFul与知名的基于搜索的解决方案进行比较。比较考虑语句和分支覆盖率、生成测试的大小以及生成时间。在考虑过的类上,TestFul生成的测试比其他基于搜索的解决方案更好,并且使用小到可以使用的测试实现更高的结构覆盖率。
{"title":"TestFul: An Evolutionary Test Approach for Java","authors":"L. Baresi, P. Lanzi, Matteo Miraz","doi":"10.1109/ICST.2010.54","DOIUrl":"https://doi.org/10.1109/ICST.2010.54","url":null,"abstract":"This paper presents TestFul, an evolutionary testing approach for Java classes that works both at class and method level. TestFul exploits a multi-objective evolutionary algorithm to identify the “best” tests. The paper introduces the main elements of TestFul. It also compares TestFul against well-known search-based solutions using a set of classes taken from literature, known software libraries, and independent testing benchmarks. The comparison considers statement and branch coverage, size of generated tests, and generation time. On considered classes, TestFul generates better tests than other search-based solutions, and achieves higher structural coverages with tests small enough to be usable.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
When BDDs Fail: Conformance Testing with Symbolic Execution and SMT Solving 当bdd失败时:符号化执行和SMT解决的一致性测试
Elisabeth Jöbstl, Martin Weiglhofer, B. Aichernig, F. Wotawa
Model-based testing is a well known technique that allows one to validate the correctness of software with respect to its model. If a lot of data is involved, symbolic techniques usually outperform explicit data enumeration. In this paper, we focus on a new symbolic test case generation technique. Our approach is based on symbolic execution and on satisfiability (modulo theory; SMT) solving. Our work was motivated by the complete failure of a well-known existing symbolic test case generator to produce any test cases for an industrial Session Initiation Protocol (SIP) implementation. Hence, we have replaced the BDD-based analysis of the existing tool with a combination of symbolic execution and SMT solving. Our new tool generates the test cases for SIP in seconds. However, further experiments showed that our approach is not a substitutive but a complementary approach: we present the technique and the results obtained for two protocol specifications, the first supporting our new technique, the second being witness for the classic BDD-technique.
基于模型的测试是一种众所周知的技术,它允许人们根据其模型验证软件的正确性。如果涉及大量数据,符号技术通常优于显式数据枚举。在本文中,我们重点研究了一种新的符号测试用例生成技术。我们的方法是基于符号执行和可满足性(模理论;SMT)解决。我们的工作是由一个众所周知的现有的符号测试用例生成器的完全失败所驱动的,它无法为工业会话发起协议(SIP)实现生成任何测试用例。因此,我们已经用符号执行和SMT求解的组合取代了现有工具的基于bdd的分析。我们的新工具在几秒钟内为SIP生成测试用例。然而,进一步的实验表明,我们的方法不是一种替代方法,而是一种补充方法:我们提出了两种协议规范的技术和结果,第一个支持我们的新技术,第二个是经典bdd技术的见证。
{"title":"When BDDs Fail: Conformance Testing with Symbolic Execution and SMT Solving","authors":"Elisabeth Jöbstl, Martin Weiglhofer, B. Aichernig, F. Wotawa","doi":"10.1109/ICST.2010.48","DOIUrl":"https://doi.org/10.1109/ICST.2010.48","url":null,"abstract":"Model-based testing is a well known technique that allows one to validate the correctness of software with respect to its model. If a lot of data is involved, symbolic techniques usually outperform explicit data enumeration. In this paper, we focus on a new symbolic test case generation technique. Our approach is based on symbolic execution and on satisfiability (modulo theory; SMT) solving. Our work was motivated by the complete failure of a well-known existing symbolic test case generator to produce any test cases for an industrial Session Initiation Protocol (SIP) implementation. Hence, we have replaced the BDD-based analysis of the existing tool with a combination of symbolic execution and SMT solving. Our new tool generates the test cases for SIP in seconds. However, further experiments showed that our approach is not a substitutive but a complementary approach: we present the technique and the results obtained for two protocol specifications, the first supporting our new technique, the second being witness for the classic BDD-technique.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124407448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Verified Firewall Policy Transformations for Test Case Generation 用于生成测试用例的已验证防火墙策略转换
Achim D. Brucker, Lukas Brügger, P. Kearney, B. Wolff
We present an optimization technique for model-based generation of test cases for firewalls. Starting from a formal model for firewall policies in higher-order logic, we derive a collection of semantics-preserving policy transformation rules and an algorithm that optimizes the specification with respect of the number of test cases required for path coverage. The correctness of the rules and the algorithm is established by formal proofs in Isabelle/HOL. Finally, we use the normalized policies to generate test cases with the domain-specific firewall testing tool HOL-TestGen/FW. The resulting procedure is characterized by a gain in efficiency of two orders of magnitude. It can handle configurations with hundreds of rules such as frequently occur in practice. Our approach can be seen as an instance of a methodology to tame inherent state-space explosions in test case generation for security policies.
我们提出了一种基于模型的防火墙测试用例生成的优化技术。从高阶逻辑中防火墙策略的正式模型开始,我们导出了一组保持语义的策略转换规则和一种算法,该算法根据路径覆盖所需的测试用例的数量来优化规范。在Isabelle/HOL中通过形式化证明证明了规则和算法的正确性。最后,我们使用规范化策略与特定于域的防火墙测试工具HOL-TestGen/FW生成测试用例。由此产生的程序的特点是效率提高了两个数量级。它可以处理具有数百条规则的配置,例如在实践中经常出现的配置。我们的方法可以看作是在安全策略的测试用例生成中驯服固有状态空间爆炸的方法的一个实例。
{"title":"Verified Firewall Policy Transformations for Test Case Generation","authors":"Achim D. Brucker, Lukas Brügger, P. Kearney, B. Wolff","doi":"10.1109/ICST.2010.50","DOIUrl":"https://doi.org/10.1109/ICST.2010.50","url":null,"abstract":"We present an optimization technique for model-based generation of test cases for firewalls. Starting from a formal model for firewall policies in higher-order logic, we derive a collection of semantics-preserving policy transformation rules and an algorithm that optimizes the specification with respect of the number of test cases required for path coverage. The correctness of the rules and the algorithm is established by formal proofs in Isabelle/HOL. Finally, we use the normalized policies to generate test cases with the domain-specific firewall testing tool HOL-TestGen/FW. The resulting procedure is characterized by a gain in efficiency of two orders of magnitude. It can handle configurations with hundreds of rules such as frequently occur in practice. Our approach can be seen as an instance of a methodology to tame inherent state-space explosions in test case generation for security policies.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124613594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Generating Transition Probabilities for Automatic Model-Based Test Generation 基于模型的自动测试生成转移概率的生成
Abderrahmane Feliachi, H. L. Guen
Markov chains with Labelled Transitions can be used to generate test cases in a model-based approach. These test cases are generated by random walks on the model according to probabilities associated with transitions. When these probabilities correspond to a usage profile, reliability may be estimated. However, in early stages of development, such probabilities are not easy to determine, thus default profiles must be considered. In such a case it may be interesting to target some coverage criteria rather to use classical uniform probability generation approach. In this paper we enrich an existing industrial tool based on usage profile with 3 possibilities to create default profiles that improve transition coverage. We report experiments that compare the improvement of the coverage rates by our approaches with respect to uniform probabilities on transitions from a given state, which is the current default profile.
带有标记转换的马尔可夫链可以用于在基于模型的方法中生成测试用例。这些测试用例是根据与转换相关的概率在模型上随机游走生成的。当这些概率与使用概况对应时,就可以对可靠性进行估计。然而,在开发的早期阶段,这样的概率不容易确定,因此必须考虑默认配置文件。在这种情况下,瞄准一些覆盖标准而不是使用经典的均匀概率生成方法可能会很有趣。在本文中,我们基于使用配置文件丰富了现有的工业工具,使用3种可能性来创建改进转换覆盖率的默认配置文件。我们报告了一些实验,这些实验比较了我们的方法对从给定状态(即当前默认配置文件)过渡的均匀概率的覆盖率的改进。
{"title":"Generating Transition Probabilities for Automatic Model-Based Test Generation","authors":"Abderrahmane Feliachi, H. L. Guen","doi":"10.1109/ICST.2010.26","DOIUrl":"https://doi.org/10.1109/ICST.2010.26","url":null,"abstract":"Markov chains with Labelled Transitions can be used to generate test cases in a model-based approach. These test cases are generated by random walks on the model according to probabilities associated with transitions. When these probabilities correspond to a usage profile, reliability may be estimated. However, in early stages of development, such probabilities are not easy to determine, thus default profiles must be considered. In such a case it may be interesting to target some coverage criteria rather to use classical uniform probability generation approach. In this paper we enrich an existing industrial tool based on usage profile with 3 possibilities to create default profiles that improve transition coverage. We report experiments that compare the improvement of the coverage rates by our approaches with respect to uniform probabilities on transitions from a given state, which is the current default profile.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
GUI Testing Techniques Evaluation by Designed Experiments 通过设计实验评估GUI测试技术
C. Bertolini, A. Mota, E. Aranha, Cristiano Ferraz
Industry uses different testing techniques for test case generation and execution. But in general no systematic evaluation is performed to identify which technique is better (for instance, to find bugs faster). This paper presents a statistical assessment of two GUI testing techniques, BxT and DH, which are used on Motorola phone applications. These techniques test applications by pressing certain phone keys, from certain screens and during some amount of time. We consider three exploration parameters for each technique in our design and analysis of experiments: Driven determines whether a test case always starts from a single initial state (screen) or set of initial states; KeyProb associates an occurrence probability for SizeTC refers to the number of steps a test can have (a fourth parameter is the Technique itself). As conclusions, we show that BxT is better than DH and the SizeTC and the Technique parameters and the combination Driven*SizeTC have significant effects on the time to find a bug.
工业使用不同的测试技术来生成和执行测试用例。但是一般来说,没有进行系统的评估来确定哪种技术更好(例如,更快地找到bug)。本文对摩托罗拉手机应用中使用的两种GUI测试技术BxT和DH进行了统计评估。这些技术通过在特定的屏幕上按特定的电话键,在特定的时间内测试应用程序。在我们的设计和实验分析中,我们考虑了每种技术的三个探索参数:驱动决定测试用例是否总是从单个初始状态(屏幕)或一组初始状态开始;KeyProb关联一个发生概率,SizeTC指的是一个测试可以拥有的步骤数(第四个参数是技术本身)。作为结论,我们发现BxT优于DH和SizeTC,技术参数和组合Driven*SizeTC对发现bug的时间有显著影响。
{"title":"GUI Testing Techniques Evaluation by Designed Experiments","authors":"C. Bertolini, A. Mota, E. Aranha, Cristiano Ferraz","doi":"10.1109/ICST.2010.41","DOIUrl":"https://doi.org/10.1109/ICST.2010.41","url":null,"abstract":"Industry uses different testing techniques for test case generation and execution. But in general no systematic evaluation is performed to identify which technique is better (for instance, to find bugs faster). This paper presents a statistical assessment of two GUI testing techniques, BxT and DH, which are used on Motorola phone applications. These techniques test applications by pressing certain phone keys, from certain screens and during some amount of time. We consider three exploration parameters for each technique in our design and analysis of experiments: Driven determines whether a test case always starts from a single initial state (screen) or set of initial states; KeyProb associates an occurrence probability for SizeTC refers to the number of steps a test can have (a fourth parameter is the Technique itself). As conclusions, we show that BxT is better than DH and the SizeTC and the Technique parameters and the combination Driven*SizeTC have significant effects on the time to find a bug.","PeriodicalId":192678,"journal":{"name":"2010 Third International Conference on Software Testing, Verification and Validation","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2010 Third International Conference on Software Testing, Verification and Validation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1