Filters








2,790 Hits in 4.1 sec

A Review on Software Fault Injection Methods and Tools
English

K. Umadevi , S. Brintha Rajakumari
2015 International Journal of Innovative Research in Computer and Communication Engineering  
Fault injection is being practiced for a long time using various methods.  ...  This review intends to give an overview about some of these common techniques practiced, tools developed and research studies carried out in the context of fault injection methods used over the last few  ...  Almost any Java code can be injected into the application in scope at the injection point. POJO (plain old java object) can be plugged in to replace built in functions.  ... 
doi:10.15680/ijircce.2015.0303027 fatcat:afcm267srjh6bhadrvd2g7f2rq

Standardizing Source Code Security Audits

Suzanna Schmeelk
2012 International Journal of Software Engineering & Applications  
A source code security audit is a powerful methodology for locating and removing security vulnerabilities.  ...  This paper assembles a broad array of literature to promote standardizing source code security audits techniques. It, then, explores a case study using the aforementioned techniques.  ...  Tool usability distinguishes how a tool works in practice. Java Tools: FindBugs [5] , [15] is a pattern-driven tool for examining Java byte code and source code.  ... 
doi:10.5121/ijsea.2012.3101 fatcat:yfce675bizdgnl7yi4honfz5s4

MDroid+

Kevin Moran, Michele Tufano, Carlos Bernal-Cárdenas, Mario Linares-Vásquez, Gabriele Bavota, Christopher Vendome, Massimiliano Di Penta, Denys Poshyvanyk
2018 Proceedings of the 40th International Conference on Software Engineering Companion Proceeedings - ICSE '18  
Traditional mutation testing typically utilizes a set of simple language specific source code transformations, called operators, to introduce faults.  ...  Mutation testing has shown great promise in assessing the effectiveness of test suites while exhibiting additional applications to test-case generation, selection, and prioritization.  ...  Bavota was supported in part by the SNF project JITRA, No. 172479. We would like to thank Sebastián Sierra and Camilo Escobar from Universidad de los Andes for their help testing MDroid+.  ... 
doi:10.1145/3183440.3183492 dblp:conf/icse/MoranTBVBVPP18 fatcat:dk7sjgf5s5b77goew5df4npl4i

Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems [chapter]

Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano
2005 IFIP Advances in Information and Communication Technology  
in the currently working environment.  ...  integration with other components in the system.  ...  Providing immunization and performing fault injection at the component interfaces require modification of the component code; however, we assume that the source code is not available in a large disturbed  ... 
doi:10.1007/0-387-25660-1_9 fatcat:qxmqvywzijf7xmbk7m3f4dhnda

A GUI Crawling-Based Technique for Android Mobile Application Testing

Domenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana
2011 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops  
TESTBEDS 2011,Berlin, Germany First injected fault • The second injected fault consists in the change of the code of the Scientific Calculator Activity causing an interface without a Button drawn on the  ...  are EDS • The processing in Android applications is event- driven  ...  the crawler for defining the input values needed for firing the events; ▫ I.e. a possible fault in the reciprocal function due to an unmanaged exception of a division by zero might be revealed only by  ... 
doi:10.1109/icstw.2011.77 dblp:conf/icst/AmalfitanoFT11 fatcat:z55zqf5kijbrvgs2vxyaxdgl4i

Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis

Seokmo Kim, R. Young Chul Kim, Young B. Park
2015 Wireless personal communications  
The proposed method verifies the vulnerability by implanting a fault, based on the information received from static code analysis.  ...  Therefore, vulnerabilities innate in software should be detected for software security assurance.  ...  Especially, modeling in model-driven architecture is the most important point in software development stage. Reusing model and creating a code through the model is increasing productivity.  ... 
doi:10.1007/s11277-015-3152-1 fatcat:uazqpnf525ccbo5xmw25ci6zqu

Making Service-Oriented Java Applications Interoperable without Compromising Transparency [chapter]

Sven De Labey, Eric Steegmans
2008 Enterprise Interoperability III  
We describe a Java extension and focus on how this language enables a precompiler to transparently inject the boilerplate code that realizes interoperable service interactions.  ...  Moreover, by mixing business logic with non-functional concerns, the source code is obfuscated, which decreases code comprehensibility and maintainability.  ...  ServiceJ source code is transformed to Java before it is compiled by the Java compiler.  ... 
doi:10.1007/978-1-84800-221-0_19 dblp:conf/iesa/LabeyS08 fatcat:jlaroj7ipbbfrcukfoe3q3idmi

A Stack-on-Demand Execution Model for Elastic Computing

Ricky K. K. Ma, King Tin Lam, Cho-Li Wang, Chenggang Zhang
2010 2010 39th International Conference on Parallel Processing  
Our design also couples SOD with a novel object faulting technique for efficient access to remote objects.  ...  We implement the SOD concept into a middleware system for transparent execution migration of Java programs.  ...  State restoration in SODEE mainly relies on the exception handlers injected to each Java method.  ... 
doi:10.1109/icpp.2010.79 dblp:conf/icpp/MaLWZ10 fatcat:ztithhmo4zbmxcbdivdr2kvuum

Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection

T.M. Galla, K.A. Hummel, B. Peer
2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)  
In recent work, we have introduced the concept of using mobile agents for distributed SWIFI in time-driven real-time systems.  ...  It is further shown, how to implement fault injection experiments by means of mobile agents in a structured manner following a classification of faults in terms of domain, persistence, and perception.  ...  Figure 5 illustrates the mapping of a simple agents's source code to the corresponding byte code operations.  ... 
doi:10.1109/hicss.2006.176 dblp:conf/hicss/GallaHP06 fatcat:ps75l7nrqvdf3kxgntkyj5m5zi

A Survey of Context Simulation for Testing Mobile Context-Aware Applications

Chu Luo, Jorge Goncalves, Eduardo Velloso, Vassilis Kostakos
2020 ACM Computing Surveys  
In particular, this article highlights the technical distinctions and commonalities in previous research conducted across a multiple disciplines, particularly at the intersection of software testing, ubiquitous  ...  Finally, this article identifies several unexplored issues and directions for further advancements in this field.  ...  To test other applications with them, testers have to modify the source code of data collection to receive AWARE format messages. Code injection. Code injection is widely used in cyber attacks.  ... 
doi:10.1145/3372788 fatcat:mpkgpye24jetbkep7hh2bkjf7y

Research On Software Security Testing

Gu Tian-Yang, Shi Yin-Sheng, Fang You-Yuan
2010 Zenodo  
NET, Java, the tool is not mature enough to discover security vulnerabilities efficiently. Bytecode scanner is similar with source code analyser, except that its scan object is Java bytecode.  ...  It would record http interaction and inject malicious code in later interaction, then examine the response.  ... 
doi:10.5281/zenodo.1081388 fatcat:xspxapfb7jgwnfu2terj6mixjq

Security Testing [chapter]

Michael Felderer, Matthias Büchler, Martin Johns, Achim D. Brucker, Ruth Breu, Alexander Pretschner
2016 Advances in Computers  
Then, basics and recent developments of security testing techniques applied during the secure software development lifecycle, i.e., model-based security testing, code-based testing and static analysis,  ...  More information and the full terms of the licence here: https://creativecommons.org/licenses/ Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us  ...  Acknowledgements The work was supported in part by the research projects QE LaB -Living Models for Open Systems (FFG 822740) and MOBSTECO (FWF P 26194-N15).  ... 
doi:10.1016/bs.adcom.2015.11.003 fatcat:gdd4ggwo6vcrjosp2nx63kp5mu

Model-driven automated software FMEA

Neal Snooke, Chris Price
2011 2011 Proceedings - Annual Reliability and Maintainability Symposium  
The software FMEA can be used to improve automated or source code embedded testing since tests can exonerate many potential faults allowing the FMEA analysis to present an engineer with a reduced set of  ...  potential faults.  ...  Each of these three facets will be explained in turn. Automated model construction The source code of the software to be analyzed is parsed and transformed into a fault propagation model.  ... 
doi:10.1109/rams.2011.5754453 fatcat:mqnniejdf5fd7poxmxp6o7fvky

Self-Healing by Means of Runtime Execution Profiling [article]

Mohammad Muztaba Fuad, Debzani Deb, Jinsuk Baek
2012 arXiv   pre-print
This paper presents a new technique of finding self-healing actions by matching a fault scenario to already established fault models.  ...  Asking the user to provide fixes for every fault is bad for productivity, especially when the users are non-savvy in technical aspect of computing.  ...  for older systems, the source code may not be available).  ... 
arXiv:1203.5748v1 fatcat:6ddlsyaeknesnjsspf4n4d7tle

State-Model-Based Regression Test Reduction for Component-Based Software

Tamal Sen, Rajib Mall
2012 ISRN Software Engineering  
In our approach, after a modification, control and data dependencies are analyzed to identify the potentially affected statements.  ...  Our technique targets to select a smaller regression test suite compared to the pure dependence-based RTS approaches while maintaining the fault revealing effectiveness.  ...  faults over the faults injected earlier.  ... 
doi:10.5402/2012/561502 fatcat:y2i5p3uyvrb37b4dcfh3cwyaaa
« Previous Showing results 1 — 15 out of 2,790 results