A protocol test generation procedure
Computer Networks and ISDN Systems
Hierarchical GUI Test Case Generation Using Automated Planning
IEEE Transactions on Software Engineering - Special issue on 1999 international conference on software engineering
Coverage criteria for GUI testing
Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering
Specification-Based Test Generation for Security-Critical Systems Using Mutations
ICFEM '02 Proceedings of the 4th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
Finite-State Testing and Analysis of Graphical User Interfaces
ISSRE '01 Proceedings of the 12th International Symposium on Software Reliability Engineering
Test minimization for human-computer interaction
Applied Intelligence
Basic Operations for Generating Behavioral Mutants
MUTATION '06 Proceedings of the Second Workshop on Mutation Analysis
An event-flow model of GUI-based applications for testing: Research Articles
Software Testing, Verification & Reliability
Mutation Testing of Protocol Messages Based on Extended TTCN-3
AINA '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications
Model-based test prioritizing: a comparative soft-computing approach and case studies
KI'09 Proceedings of the 32nd annual German conference on Advances in artificial intelligence
Minimal spanning set for coverage testing of interactive systems
ICTAC'04 Proceedings of the First international conference on Theoretical Aspects of Computing
TestCom'05 Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating Systems
Hi-index | 0.00 |
A firewall is the most important tool of network security defense. Its proper functioning is critical to the network it protects. Therefore a firewall should be tested rigorously with respect to its implemented network protocols and security policy specification. We propose a combined approach for test case generation to uncover errors both in firewall software and in its configuration. In the proposed approach, abstract test cases are generated by mutating event sequence graph model of chosen network protocol and filled with values from policy specification by using equivalence partitioning and boundary value analysis. A case study is presented to validate the presented approach.