Enabledness-based Testing of Object Protocols

نویسندگان

چکیده

A significant proportion of classes in modern software introduce or use object protocols, prescriptions on the temporal orderings method calls objects. This article studies search-based test generation techniques that aim to exploit a particular abstraction protocols (enabledness preserving abstractions (EPAs)) find failures. We define coverage criteria over an extension EPAs includes abnormal termination and case technique aimed at achieving high coverage. Results suggest proposed with fitness function aims combined structural extended EPA can provide better failure-detection capabilities not only for protocol failures but also general when compared random testing standard

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EMG-based Fatigue Assessment During Endurance Testing With Different VT Protocols

BACKGROUND: Muscle fatigue can be defined as the failure of a muscle to maintain a reasonably expected force output. The multivariate approach to fatigue assessment is used because the multiple (EMG) feature provides more information than anyone. OBJECTIVE: This study presents a method of assessing muscle fatigue during endurance testing at 50% maximal voluntary contraction (MVC) using electro...

متن کامل

Model-Based Testing of Cryptographic Protocols

Modeling is a popular way of representing the behavior of a system. A very useful type of model in computing is an abstract state machine which describes transitions over first order structures. The general purpose model-based testing tool SpecExplorer (used within Microsoft, also available externally) uses such a model, written in AsmL or Spec#, to perform a search that checks that all reachab...

متن کامل

Specification Based Conformance Testing for Email Protocols

The paper presents a method for conformance testing of Internet electronic mail protocols. The method is based on formal specification of the standards following the approach of the contract specification, and designing tests as traversal of a state machine. The paper presents the implementation of the method for the most widely used e-mail protocols SMTP, POP3 and IMAP4 and is illustrated by t...

متن کامل

Syntax-based Vulnerability Testing of Frame-based Network Protocols

Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number of mutated Protocol Data Units (PDUs), built by intentionally disobeying the protocol’s syntax. Security vulnerabilities can be discovered by detecting anomalous behaviour or crashes in the IUT (e.g. segmentation faults...

متن کامل

Model-Based Testing of Object-Oriented Systems

This paper discusses a model-based approach to testing as a vital part of software development. It argues that an approach using models as central development artifact needs to be added to the portfolio of software engineering techniques, to further increase efficiency and flexibility of the development as well as quality and reusability of results. Then test case modeling is examined in depth ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Software Engineering and Methodology

سال: 2021

ISSN: ['1049-331X', '1557-7392']

DOI: https://doi.org/10.1145/3415153