نتایج جستجو برای: box testing

تعداد نتایج: 418764  

Journal: :Journal of Systems and Software 2008
Shaoying Liu Yuting Chen

Specification-based (or functional) testing enables us to detect errors in the implementation of functions defined in specifications, but since specifications are often incomplete in practice for some reasons (e.g., lack of ideas, no time to write), it is unlikely to be sufficient for testing all parts of corresponding programs. On the other hand, implementation-based (or structural) testing fo...

2006
Yonghee Shin

This paper proposes an automated, white-box security testing framework to identify true input manipulation vulnerabilities that can reduce warnings generated by static analysis tools or automated black-box testing tools.

2017
Bernhard K. Aichernig Martin Tappler

System verification is often hindered by the absence of formal models. Peled et al. proposed black-box checking as a solution to this problem. This technique applies active automata learning to infer models of systems with unknown internal structure. This kind of learning relies on conformance testing to determine whether a learned model actually represents the considered system. Since conforma...

2003
Eliane Martins Ana Maria Ambrósio

ATIFS is a testing toolset which supports the activities of black-box testing for reactive systems, especially communication systems [MAF03]. In ATIFS, two types of testing are carried on: conformance testing and software fault injection. Its tools were conceived to provide a user with facilities for test case derivation, test execution and test result analysis. At the moment, several prototype...

2004
Phil McMinn Mike Holcombe

Fitness functions derived for certain white-box test goals can cause problems for Evolutionary Testing (ET), due to a lack of sufficient guidance to the required test data. Often this is because the search does not take into account data dependencies within the program, and the fact that some special intermediate statement (or statements) needs to have been executed in order for the target stru...

2010
Edward de Bono Mary Lou Cook

As a cultural theory, Object Relations and the development of transitional space as an opportunity to build self-stability through creative play has tremendous potential. There is much to gain by increasing awareness of the potential and experimenting along those lines. Trial and error in a safe container, what Winnicott referred to as reality testing, engenders creative discovery and developme...

2012
Nikolai Kosmatov Nicky Williams Bernard Botella Muriel Roger Omar Chebaro

PathCrawler is a test generation tool developed at CEA LIST for structural testing of C programs. The new version of PathCrawler is developed in an entirely novel form: that of a test-case generation web service which is freely accessible at PathCrawler-online.com. This service allows many test-case generation sessions to be run in parallel in a completely robust and secure way. This tool demo ...

2003
Marcelo Fantinato Mario Jino

Model Based Testing (MBT) is a functional testing technique that makes use of information from behavioral models of the software to carry out the testing task. This technique has been commonly used in testing of interactive systems, where the used model represents the system behavior reacting to user’s actions. Finite State Machines (FSMs) are one of the most used modeling techniques for MBT. H...

2012
Muhammad Zohaib Z. Iqbal

The behavior of real-time embedded systems (RTES) is driven by their environment. Independent system test teams normally focus on black-box testing as they have typically no easy access to precise design information. Black-box testing in this context is mostly about selecting test scenarios that are more likely to lead to unsafe situations in the environment. Our Model-Based Testing (MBT) metho...

2002
Stanley Chow Philip A. Eisen Harold Johnson Paul C. van Oorschot

For digital rights management (drm) software implementations incorporating cryptography, white-box cryptography (cryptographic implementation designed to withstand the white-box attack context) is more appropriate than traditional black-box cryptography. In the whitebox context, the attacker has total visibility into software implementation and execution. Our objective is to prevent extraction ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید