نتایج جستجو برای: black box testing

تعداد نتایج: 545580  

Journal: :CoRR 2012
Stephan Arlt Evren Ermis Sergio Feo Arenis Andreas Podelski

In black-box testing of GUI applications (a form of system testing), a dynamic analysis of the GUI application is used to infer a black-box model; the black-box model is then used to derive test cases for the test of the GUI application. In this paper, we propose to supplement the test with the verification of the black-box model. We present a method that can give a guarantee of the absence of ...

2018
Arjun Nitin Bhagoji Warren He Bo Li Dawn Song

In this paper, we propose novel Gradient Estimation black-box attacks to generate adversarial examples with query access to the target model’s class probabilities, which do not rely on transferability. We also propose strategies to decouple the number of queries required to generate each adversarial example from the dimensionality of the input. An iterative variant of our attack achieves close ...

2000
Uwe Aßmann Holger Bär Thomas Genssler

In the recent past, architectural languages have begun to introduce so-called connec-tors. Connectors separate communication code from the application-speciic components so that it can be easily exchanged. Unfortunately, however, communication code is usually deeply woven into the components and often has to be replaced when the component is reused in a diierent context. In this paper we show t...

2017
Julien Provost Jean-Marc Roussel Jean-Marc Faure

Conformance test is a black-box test technique aiming at checking whether an implementation conforms to its specification. Numerous results have been already obtained in this field for specifications expressed in a formal language. However, these results cannot be applied for conformance test of industrial logic controllers whose specifications are given in standardized specification languages....

2003
Tao Xie David Notkin

Unit testing, a common step in software development, presents a challenge. When produced manually, unit test suites are often insufficient to identify defects. The main alternative is to use one of a variety of automatic unit test generation tools: these are able to produce and execute a large number of test inputs that extensively exercise the unit under test. However, without a priori specifi...

Journal: :JCS 2014
Luciane Telinski Wiedermann Agner Inali Wisniewski Soares Jean Marcelo Simão Paulo Cézar Stadzisz

Testing model transformations has played a leading role with the dissemination of MDA in software development processes. Software testing based on black-box testing, together with the “category partitioning” method, can be efficiently used in order to conduct the verification of model transformations. This study employs software testing techniques to an ATL model transformation in the MDA conte...

2004
Kim G. Larsen Marius Mikucionis Brian Nielsen

We present the development of T-UPPAAL — a new tool for online black-box testing of real-time embedded systems from non-deterministic timed automata specifications. It is based on a sound and complete randomized online testing algorithm and is implemented using symbolic state representation and manipulation techniques. We propose the notion of relativized timed input/output conformance as the f...

1999
Jens Grabowski

The third edition of TTCN (Tree and Tabular Combined Notation) will be a complete redesign of the entire test speciication language. The close relation between graphical and textual representation will be removed, OSI speciic language constructs will be cleared away and new concepts will be introduced. The intention of this redesign is to modernize TTCN and to widen its application area beyond ...

Journal: :CoRR 2008
Amitabh Saxena Brecht Wyseur

We study the relationship between obfuscation and white-box cryptography. We capture the requirements of any white-box primitive using a White-Box Property (WBP) and give some negative/positive results. Loosely speaking, the WBP is defined for some scheme and a security notion (we call the pair a specification), and implies that w.r.t. the specification, an obfuscation does not leak any “useful...

Journal: :CoRR 2017
Adi Sosnovich Orna Grumberg Gabi Nakibly

The Internet infrastructure relies entirely on open standards for its routing protocols. However, the overwhelming majority of routers on the Internet are proprietary and closed-source. Hence, there is no straightforward way to analyze them. Specifically, one cannot easily and systematically identify deviations of a router’s routing functionality from the routing protocol’s standard. Such devia...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید