5 research outputs found

    Goal-Oriented Mutation Testing with Focal Methods

    Full text link
    Mutation testing is the state-of-the-art technique for assessing the fault-detection capacity of a test suite. Unfortunately, mutation testing consumes enormous computing resources because it runs the whole test suite for each and every injected mutant. In this paper we explore fine-grained traceability links at method level (named focal methods), to reduce the execution time of mutation testing and to verify the quality of the test cases for each individual method, instead of the usually verified overall test suite quality. Validation of our approach on the open source Apache Ant project shows a speed-up of 573.5x for the mutants located in focal methods with a quality score of 80%.Comment: A-TEST 201

    Standard Compliant Hazard and Threat Analysis for the Automotive Domain

    No full text
    The automotive industry has successfully collaborated to release the ISO 26262 standard for developing safe software for cars. The standard describes in detail how to conduct hazard analysis and risk assessments to determine the necessary safety measures for each feature. However, the standard does not concern threat analysis for malicious attackers or how to select appropriate security countermeasures. We propose the application of ISO 27001 for this purpose and show how it can be applied together with ISO 26262. We show how ISO 26262 documentation can be re-used and enhanced to satisfy the analysis and documentation demands of the ISO 27001 standard. We illustrate our approach based on an electronic steering column lock system

    Implementing trust in cloud infrastructures

    No full text
    Today's cloud computing infrastructures usually require customers who transfer data into the cloud to trust the providers of the cloud infrastructure. Not every customer is willing to grant this trust without justification. It should be possible to detect that at least the configuration of the cloud infrastructure -- as provided in the form of a hyper visor and administrative domain software -- has not been changed without the customer's consent. We present a system that enables periodical and necessity-driven integrity measurements and remote attestations of vital parts of cloud computing infrastructures. Building on the analysis of several relevant attack scenarios, our system is implemented on top of the Xen Cloud Platform and makes use of trusted computing technology to provide security guarantees. We evaluate both security and performance of this system. We show how our system attests the integrity of a cloud infrastructure and detects all changes performed by system administrators in a typical software configuration, even in the presence of a simulated denial-of-service attack

    Procedures performed during neurosurgery residency in Europe

    No full text
    International audienceAbstract Background In a previous article ( 10.1007/s00701-019-03888-3 ), preliminary results of a survey, aiming to shed light on the number of surgical procedures performed and assisted during neurosurgery residency in Europe were reported. We here present the final results and extend the analyses. Methods Board-certified neurosurgeons of European Association of Neurosurgical Societies (EANS) member countries were asked to review their residency case logs and participate in a 31-question electronic survey (SurveyMonkey Inc., San Mateo, CA). The responses received between April 25, 2018, and April 25, 2020, were considered. We excluded responses that were incomplete, from non-EANS member countries, or from respondents that have not yet completed their residency. Results Of 430 responses, 168 were considered for analysis after checking in- and exclusion criteria. Survey responders had a mean age of 42.7 ± 8.8 years, and 88.8% were male. Responses mainly came from surgeons employed at university/teaching hospitals (85.1%) in Germany (22.0%), France (12.5%), the United Kingdom (UK; 8.3%), Switzerland (7.7%), and Greece (7.1%). Most responders graduated in the years between 2011 and 2019 (57.7%). Thirty-eight responders (22.6%) graduated before and 130 responders (77.4%) after the European WTD 2003/88/EC came into effect. The mean number of surgical procedures performed independently, supervised or assisted throughout residency was 540 (95% CI 424–657), 482 (95% CI 398–568), and 579 (95% CI 441–717), respectively. Detailed numbers for cranial, spinal, adult, and pediatric subgroups are presented in the article. There was an annual decrease of about 33 cases in total caseload between 1976 and 2019 (coeff. − 33, 95% CI − 62 to − 4, p = 0.025). Variables associated with lesser total caseload during residency were training abroad (1210 vs. 1747, p = 0.083) and female sex by trend (947 vs. 1671, p = 0.111), whereas case numbers were comparable across the EANS countries ( p = 0.443). Conclusion The final results of this survey largely confirm the previously reported numbers. They provide an opportunity for current trainees to compare their own case logs with. Again, we confirm a significant decline in surgical exposure during training between 1976 and 2019. In addition, the current analysis reveals that female sex and training abroad may be variables associated with lesser case numbers during residency
    corecore