Testing Prototypes Validity to Enhance Code Reuse

نویسندگان

  • Didier Buchs
  • Alioune Diagne
  • Fabrice Kordon
چکیده

The complexity of distributed systems is a problem when designers want to evaluate their safety and liveness. Often, they are built by integration of existing components with newly developed ones. Actually, it is valuable to handle the integration of external pieces of software in the specification and testing activities. However, it is difficult to validate them formally unless doing reverse-engineering (which is a heavy procedure). This paper proposes to use structured formal specifications to generate a reasonable set of tests that evaluate behavior of software components in order to get an answer to both questions. To do so, we use the description of components’ external behavior and express it using the OF-Class formalism (an encapsulation of Colored Petri Nets). Test patterns are generated using an appropriate formalism, HML logic, and exploit various hypotheses corresponding to users’ testing procedure

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

متن کامل

To Enhance Type 4 Clone Detection in Clone Testing

The means of software reuse is copying and modifying block of code that detect cloning. As a survey, it is observed that 20-30% of module in system may be cloned. So it is mandatory to detect clones in system to reduce replication and improve reusability. Code clone is similar or duplicate code in source code that is created either by replication or some modifications. Clone is a persistent for...

متن کامل

Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

متن کامل

Informing Design of a Search Tool for Bioinformatics

We conducted an exploratory survey of software developers involved in creating, testing and maintaining bioinformatics software. In this paper we discuss how our study led us to conceptualize a tool that would index bioinformatics source code on the Web and create a searchable code repository. Such a tool would promote code reuse, facilitate software development for end-user programmers in bioi...

متن کامل

Proceedings of the 2002 Winter Simulation Conference

Is it really true that simulation models and simulation software should always be regarded as candidates for reuse, or is it better to be selective? What are the obstacles to simulation software and model reuse? Can these be surmounted and, if so, at what cost? There is a range of levels at which simulation software may be reused, a range of costs to be borne and range of benefits that may be a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998