The Semantics of Predicate Logic as a Programming Language
Journal of the ACM (JACM)
Logic, Programming, and PROLOG
Logic, Programming, and PROLOG
Network protocol system monitoring: a formal approach with passive testing
IEEE/ACM Transactions on Networking (TON)
Runtime Monitoring of Message-Based Workflows with Data
EDOC '08 Proceedings of the 2008 12th International IEEE Enterprise Distributed Object Computing Conference
Using formal specifications to support testing
ACM Computing Surveys (CSUR)
A passive testing approach based on invariants: application to the WAP
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Automated Passive Testing Approach for the IMS PoC Service
ASE '09 Proceedings of the 2009 IEEE/ACM International Conference on Automated Software Engineering
Fast testing of critical properties through passive testing
TestCom'03 Proceedings of the 15th IFIP international conference on Testing of communicating systems
The good, the bad, and the ugly, but how ugly is ugly?
RV'07 Proceedings of the 7th international conference on Runtime verification
Temporal Assertions with Parametrized Propositions*
Journal of Logic and Computation
Timed Extended Invariants for the Passive Testing of Web Services
ICWS '10 Proceedings of the 2010 IEEE International Conference on Web Services
Runtime Verification for LTL and TLTL
ACM Transactions on Software Engineering and Methodology (TOSEM)
Passive testing – a constrained invariant checking approach
TestCom'05 Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating Systems
An EFSM-based passive fault detection approach
TestCom'07/FATES'07 Proceedings of the 19th IFIP TC6/WG6.1 international conference, and 7th international conference on Testing of Software and Communicating Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Passive testing techniques are used whenever the system under test cannot be interrupted, or access to its interfaces is unavailable. Under such conditions, communication traces are extracted from points of observation and compared with the expected behavior formally specified as properties. Since most works on the subject come from a formal model context, they are optimized for testing the control part of the communication with a secondary focus on the data parts. In the current work we provide a data-centric approach for black-box testing of network protocols. A syntax and semantics are provided to express and evaluate complex properties in a bottom-up fashion starting from expected data relations in messages. The approach has been implemented into a framework, and some experimental results are briefly discussed.