Testing Prototypes Validity to Enhance Code Reuse
نویسندگان
چکیده
The complexity of distributed systems is a problem when designers want to evaluate their safety and liveness. Often, they are built by integration of existing components with newly developed ones. Actually, it is valuable to handle the integration of external pieces of software in the specification and testing activities. However, it is difficult to validate them formally unless doing reverse-engineering (which is a heavy procedure). This paper proposes to use structured formal specifications to generate a reasonable set of tests that evaluate behavior of software components in order to get an answer to both questions. To do so, we use the description of components’ external behavior and express it using the OF-Class formalism (an encapsulation of Colored Petri Nets). Test patterns are generated using an appropriate formalism, HML logic, and exploit various hypotheses corresponding to users’ testing procedure
منابع مشابه
Dwarf Frankenstein is still in your memory: tiny code reuse attacks
Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...
متن کاملTo Enhance Type 4 Clone Detection in Clone Testing
The means of software reuse is copying and modifying block of code that detect cloning. As a survey, it is observed that 20-30% of module in system may be cloned. So it is mandatory to detect clones in system to reduce replication and improve reusability. Code clone is similar or duplicate code in source code that is created either by replication or some modifications. Clone is a persistent for...
متن کاملAggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...
متن کاملInforming Design of a Search Tool for Bioinformatics
We conducted an exploratory survey of software developers involved in creating, testing and maintaining bioinformatics software. In this paper we discuss how our study led us to conceptualize a tool that would index bioinformatics source code on the Web and create a searchable code repository. Such a tool would promote code reuse, facilitate software development for end-user programmers in bioi...
متن کاملProceedings of the 2002 Winter Simulation Conference
Is it really true that simulation models and simulation software should always be regarded as candidates for reuse, or is it better to be selective? What are the obstacles to simulation software and model reuse? Can these be surmounted and, if so, at what cost? There is a range of levels at which simulation software may be reused, a range of costs to be borne and range of benefits that may be a...
متن کامل