Accurate static branch prediction by value range propagation
PLDI '95 Proceedings of the ACM SIGPLAN 1995 conference on Programming language design and implementation
Computer
Increased Software Reliability Through Input Validation Analysis and Testing
ISSRE '99 Proceedings of the 10th International Symposium on Software Reliability Engineering
Finite-State Testing and Analysis of Graphical User Interfaces
ISSRE '01 Proceedings of the 12th International Symposium on Software Reliability Engineering
Simple Support for Design by Contract in C++
TOOLS '01 Proceedings of the 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems (TOOLS39)
IEEE Security and Privacy
Input validation analysis and testing
Empirical Software Engineering
Test by Contract for UML-Based Software Component Testing
CSA '08 Proceedings of the International Symposium on Computer Science and its Applications
Covering code behavior on input validation in functional testing
Information and Software Technology
GUI-Based Testing of Boundary Overflow Vulnerability
COMPSAC '09 Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02
Towards Contract-based Testing of Web Services
Electronic Notes in Theoretical Computer Science (ENTCS)
Modeling, analysis and testing of safety issues: an event-based approach and case study
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Temporal higher-order contracts
Proceedings of the 16th ACM SIGPLAN international conference on Functional programming
Hi-index | 0.00 |
This paper proposes an approach for validation of numerical inputs based on graphical user interfaces (GUI) that are modeled and specified by event sequence graphs (ESG). For considering complex structures of input data, ESGs are augmented by decision tables and patterns of design by contract (DbC). The approach is evaluated by experiments on boundary overflows, which occur when input values violate the range of specified values. Furthermore, a tool is presented that implements our approach enabling a semiautomatically detection of boundary overflow errors and suggesting correction steps based on DbC.