190 research outputs found
Protocol-Inspired Hardware Testing
The relevance of protocol conformance testing techniques to hardware testing is discussed. It is shown that the ioconf (input-output conformance) approach used in protocol testing can be applied to generate tests for a synchronous hardware design using its formal specification. The generated tests are automatically applied to a circuit by a VHDL testbench, thus giving confidence that the hardware design meets its high-level formal specification. Case studies illustrate how the ideas can be applied to standard hardware verification benchmarks such as the Single Pulser and Black-Jack Dealer
Specification and Verification of Synchronous Hardware using LOTOS
This paper investigates specification and verification of synchronous circuits using DILL (Digital Logic in LOTOS). After an overview of the DILL approach, the paper focuses on the characteristics of synchronous circuits. A more constrained model is presented for specifying digital components and verifying them. Two standard benchmark circuits are specified using this new model, and analysed by the CADP toolset (CÊsar/Aldébaran Development Package)
Computational framework for interactive architecting of complex systems
Presented is a novel framework for interactive systems architecture definition at early design stages. It incorporates graphâtheoretic data structures, entity relationships, and algorithms that enable the systems architect to operate interactively and simultaneously in different domains. It explicitly captures the âzigzaggingâ of the functional reasoning process, including not only allocated, but also the derived functions. A prototype software tool, AirCADia Architect, was implemented, which allowed the framework to be demonstrated to and tried handsâon by practicing aircraft systems architects. The tool enables architects to effectively express their ideas when interactively synthesizing new architectures, while still retaining control over the process. The proposed approach was especially acknowledged as the way forward for rationale capture
Security Testing: A Survey
Identifying vulnerabilities and ensuring security functionality by security testing is a widely applied measure to evaluate and improve the security of software. Due to the openness of modern software-based systems, applying appropriate security testing techniques is of growing importance and essential to perform effective and efficient security testing. Therefore, an overview of actual security testing techniques is of high value both for researchers to evaluate and refine the techniques and for practitioners to apply and disseminate them. This chapter fulfills this need and provides an overview of recent security testing techniques. For this purpose, it first summarize the required background of testing and security engineering. Then, basics and recent developments of security testing techniques applied during the secure software development lifecycle, i.e., model-based security testing, code-based testing and static analysis, penetration testing and dynamic analysis, as well as security regression testing are discussed. Finally, the security testing techniques are illustrated by adopting them for an example three-tiered web-based business application
The Blind Men and the Elephant: Towards an Empirical Evaluation Framework for Software Sustainability
Software sustainability has been identified as one of the key challenges in the development of scientific and engineering software as we move towards new paradigms of research and computing infrastructures. However, it is suggested that sustainability is not well understood within the software engineering community, which can led to ineffective and inefficient efforts to address the concept or result in its complete omission from the software system. This paper proposes a definition of software sustainability and considers how it can be measured empirically in the design and engineering process of software systems
- âŠ