Cryptographic Veri cation of Test Coverage
نویسنده
چکیده
The market for software components is growing, driven on the \demand side" by the need for rapid deployment of highly functional products, and on the \supply side" by distributed object standards. As components and component vendors proliferate, there is naturally a growing concern about quality, and the eeectiveness of testing processes. White box testing, particularly the use of coverage criteria, is a widely used method for measuring the \thoroughness" of testing eeorts. High levels of test coverage are used as indicators of good quality control procedures. Software vendors who can demonstrate high levels of test coverage have a credible claim to high quality. However, verifying such claims involves knowledge of the source code. In applications where reliability and quality are critical, it would be desirable to verify test coverage claims without forcing vendors to give up valuable technical secrets. In this paper, we explore cryptographic techniques that can be used to verify such claims. Our techniques have some limitations; however, if such methods can be perfected and popularized, they can have an important \leveling" eeect on the software market place: small, relatively unknown software vendors with limited resources can provide credible evidence of high-quality processes, and thus compete with much larger corporations.
منابع مشابه
Model Abstraction for Formal Veri cation
As the complexity of circuit designs grows, designers look toward formal veri cation to achieve better test coverage for validating complex designs. However, this approach is inherently computationally intensive, and hence, only small designs can be veri ed using this method. To achieve better performance, model abstraction is necessary. Model abstraction reduces the number of states necessary ...
متن کاملCryptographic Veri cation of Test Coverage Claims
The market for software components is growing, driven on the \demand side" by the need for rapid deployment of highly functional products, and on the \supply side" by distributed object standards. As components and component vendors proliferate, there is naturally a growing concern about quality, and the e ectiveness of testing processes. White box testing, particularly the use of coverage crit...
متن کاملVeri cation Methodology of Compatible Microprocessors
| As the complexity of high-performance microprocessor increases, functional veri cation becomes more di cult and emerges as the bottleneck of the design cycle. In this paper, we suggest a functional veri cation methodology, especially for the compatible microprocessor design. To guarantee the perfect compatibility with previous microprocessors, we developed three C models in di erent represent...
متن کاملUser De ned Coverage - A Tool Supported Methodology for Design Veri cation
This paper describes a new coverage methodology developed at IBM's Haifa Research Lab. The main idea behind the methodology is a separation of the coverage model de nition from the coverage analysis tool. This enables the user to de ne the coverage models that best t the points of signi cance in the design, and still have the bene ts of a coverage tool. To support this methodology, we developed...
متن کاملMémoire d ' Habilitation à Diriger les Recherches
Security is a very old concern, which until quite recently was mostly of interest for military purposes. The deployment of electronic commerce changes this drastically. The security of exchanges is ensured by cryptographic protocols which are notoriously error prone. The formal veri cation of cryptographic protocols is a di cult problem that can be seen as a particular model-checking problem in...
متن کامل