67 research outputs found

    Model-based Testing: Next Generation Functional Software Testing

    Get PDF
    The idea of model-based testing is to use an explicit abstract model of a SUT and its environment to automatically derive tests for the SUT: the behavior of the model of the SUT is interpreted as the intended behavior of the SUT. The technology of automated model-based test case generation has matured to the point where large-scale deployments of this technology are becoming commonplace. The prerequisites for success, such as qualification of the test team, integrated tool chain availability and methods, are now identified, and a wide range of commercial and open-source tools are available. Although MBT will not solve all testing problems, it is an important and useful technique, which brings significant progress over the state of the practice for functional software testing effectiveness, and can increase productivity and improve functional coverage. In this talk, we\u27ll adress the current trend of deploying MBT in the industry, particularly in the TCoE - Test Center of Excellence - managed by the big System Integrators, as a vector for software testing "industrialization"

    Exact and approximate strategies for symmetry reduction in model checking

    Get PDF
    Symmetry reduction techniques can help to combat the state space explosion problem for model checking, but are restricted by the hard problem of determining equivalence of states during search. Consequently, existing symmetry reduction packages can only exploit full symmetry between system components, as checking the equivalence of states is straightforward in this special case. We present a framework for symmetry reduction with an arbitrary group of structural symmetries. By generalising existing techniques for efficiently exploiting symmetry, and introducing an approximate strategy for use with groups for which fast, exact strategies are not available, our approach allows for significant state-space reduction with minimal time overhead. We show how computational group theoretic techniques can be used to analyse the structure of a symmetry group so that an appropriate symmetry reduction strategy can be chosen, and we describe a symmetry reduction package for the Spin model checker which interfaces with the computational algebra system Gap. Experimental results on a variety of Promela models illustrate the effectiveness of our methods

    Génération de tests de vulnérabilité web à partir de modÚles

    No full text
    National audienceCet article concerne la gĂ©nĂ©ration automatique de tests de vulnĂ©rabilitĂ© Ă  partir de modĂšles pour applications Web. Les technologies de gĂ©nĂ©ration de tests Ă  partir de modĂšles sont aujourd'hui principalement mises en Ɠuvre dans le contexte du test fonctionnel. L'application de ces techniques au test de vulnĂ©rabilitĂ© sur applications Web en renouvelle les problĂ©matiques de recherche, tant au niveau de la modĂ©lisation, du pilotage de la gĂ©nĂ©ration des tests qu'au niveau de l'assignation du verdict de test. Cet article prĂ©sente une approche originale pour la gĂ©nĂ©ration de tests de vulnĂ©rabilitĂ© fondĂ©e sur une modĂ©lisation du comportement fonctionnel de l'application sous test et sur la formalisation des attaques Ă  tester sous la forme de schĂ©mas de tests. Ces schĂ©mas dĂ©finissent ainsi la stratĂ©gie de gĂ©nĂ©ration des tests de vulnĂ©rabilitĂ©. Cette approche est illustrĂ©e sur un exemple de site Web vulnĂ©rable (l'application DVWA)

    A subset of precise UML for Model-based Testing

    Get PDF
    This paper presents an original model-based testing approach that takes a UML behavioural view of the system under test and automatically generates test cases and executable test scripts according to model coverage criteria. This approach is embedded in the LEIRIOS Test Designer tool and is currently deployed in domains such as Enterprise IT and electronic transaction applications. This model-based testing approach makes it possible to automatically produce the traceability matrix from requirements to test cases as part of the test generation process. This paper defines the subset of UML used for model-based testing and illustrates it using a small example

    Extending the Unified Process with Model-Based Testing

    No full text
    International audienceThe Unified Process (UP) is a software development tech- nique that includes modeling of specifications and testing workflow. This workflow is achieved by information interpretation of specification to pro- duce manual tests. In this paper, we extend the UP with model-based testing (MBT) where models resulting of the UP will be used for MBT. We describe how model-based testing introduces new test design activi- ties in parallel with the application design activities. We give guidelines to derive the test model from the analysis model produced by the UP. We illustrate this tailored process with the example of a Geneva State taxation

    Model-Based Vulnerability Testing for Web Applications

    No full text
    International audienceThis paper deals with an original approach to automate Model-Based Vulnerability Testing (MBVT) for Web applications, which aims at improving the accuracy and precision of vulnerability testing. Today, Model-Based Testing techniques are mostly used to address functional features. The adaptation of such techniques for vulnerability testing defines novel issues in this research domain. In this paper, we describe the principles of our approach, which is based on a mixed modeling of the application under test: the specification indeed captures some behavioral aspects of the Web application, and includes vulnerability test purposes to drive the test generation algorithm. This approach is illustrated with the widely-used DVWA example

    Detecting Intentional AIS Shutdown in Open Sea Maritime Surveillance Using Self-Supervised Deep Learning

    Full text link
    In maritime traffic surveillance, detecting illegal activities, such as illegal fishing or transshipment of illicit products is a crucial task of the coastal administration. In the open sea, one has to rely on Automatic Identification System (AIS) message transmitted by on-board transponders, which are captured by surveillance satellites. However, insincere vessels often intentionally shut down their AIS transponders to hide illegal activities. In the open sea, it is very challenging to differentiate intentional AIS shutdowns from missing reception due to protocol limitations, bad weather conditions or restricting satellite positions. This paper presents a novel approach for the detection of abnormal AIS missing reception based on self-supervised deep learning techniques and transformer models. Using historical data, the trained model predicts if a message should be received in the upcoming minute or not. Afterwards, the model reports on detected anomalies by comparing the prediction with what actually happens. Our method can process AIS messages in real-time, in particular, more than 500 Millions AIS messages per month, corresponding to the trajectories of more than 60 000 ships. The method is evaluated on 1-year of real-world data coming from four Norwegian surveillance satellites. Using related research results, we validated our method by rediscovering already detected intentional AIS shutdowns.Comment: IEEE Transactions on Intelligent Transportation System

    Model-Based Testing for the Cloud

    Get PDF
    Software in the cloud is characterised by the need to be highly adaptive and continuously available. Incremental changes are applied to the deployed system and need to be tested in the field. Different configurations need to be tested. Higher quality standards regarding both functional and non-functional properties are put on those systems, as they often face large and diverse customer bases and/or are used as services from different peer service implementations. The properties of interest include interoperability, privacy, security, reliability, performance, resource use, timing constraints, service dependencies, availability, and so on. This paper discusses the state of the art in model-based testing of cloud systems. It focuses on two central aspects of the problem domain: (a) dealing with the adaptive and dynamic character of cloud software when tested with model-based testing, by developing new online and offline test strategies, and (b) dealing with the variety of modeling concerns for functional and non-functional properties, by devising a unified framework for them where this is possible. Having discussed the state of the art we identify challenges and future directions

    VETESS : IDM, Test et SysML

    No full text
    Selected paper from the 7-th NEPTUNE WorkshopNational audienceIl apparaĂźt souvent que les processus d'ingĂ©nierie systĂšme sont en fait dĂ©composĂ©s en phases discontinues oĂčtrop peu d'informations sont partagĂ©es entre les diffĂ©rentes Ă©quipes, par exemple entre les Ă©quipes de design et de tests.Cette faiblesse peut ĂȘtre palliĂ©e par l’utilisation de modĂšles de spĂ©cifications qui jouent alors le rĂŽle de rĂ©fĂ©rentiel pourl’ensemble des Ă©quipes participant au cycle de vie du logiciel. Ce type de modĂšle est couramment utilisĂ© comme basedans les activitĂ©s de conception, de vĂ©rification, ou encore de test. Le test basĂ© sur les modĂšles est une approcheoriginale oĂč sont automatiquement gĂ©nĂ©rĂ©s des cas de test et des scripts de test exĂ©cutables Ă  partir d'une spĂ©cificationdu systĂšme sous test. Cette spĂ©cification prend la forme d'un modĂšle comportemental, permettant ainsi au gĂ©nĂ©rateur detests de dĂ©terminer, d'une part, quels sont les contextes d'exĂ©cution pertinents et, d'autre part, de prĂ©dire les effets sur lesystĂšme de ces exĂ©cutions. Le but du projet VETESS est de rendre possible cette approche pour valider les systĂšmesembarquĂ©s automobiles. Il s’agit ainsi de mettre en Ɠuvre et d’outiller un processus automatique permettant de dĂ©river,d'un modĂšle de spĂ©cification dĂ©crit avec un sous-ensemble du langage de modĂ©lisation SysML, des cas de test, et deproduire ensuite les scripts de test correspondants Ă  exĂ©cuter sur banc de test automobiles

    An Access Control Model Based Testing Approach for Smart Card Applications: Results of the {POSÉ} Project

    No full text
    International audienceThis paper is about generating security tests from the Common Criteria expression of a security policy, in addition to functional tests previously generated by a model-based testing approach. The method that we present re-uses the functional model and the concretization layer developed for the functional testing, and relies on an additional security policy model. We discuss how to produce the security policy model from a Common Criteria security target. We propose to compute the tests by using some test purposes as guides for the tests to be extracted from the models. We see a test purpose as the combination of a security property and a test need issued from the know-how of a security engineer. We propose a language based on regular expressions for the expression of such test purposes. We illustrate our approach by means of the IAS case study, a smart card application dedicated to the operations of Identification, Authentication and electronic Signature
    • 

    corecore