Conformance testing with labelled transition systems: implementation relations and test generation
Computer Networks and ISDN Systems - Special issue on protocol testing
A survey of communication protocol testing
Journal of Systems and Software
A Notion of Glue Expressiveness for Component-Based Systems
CONCUR '08 Proceedings of the 19th international conference on Concurrency Theory
Robustness testing for software components
Science of Computer Programming
Compositional testing of communication systems
TestCom'06 Proceedings of the 18th IFIP TC6/WG6.1 international conference on Testing of Communicating Systems
Test generation for interworking systems
Computer Communications
A finite transition model for security protocol verification
Proceedings of the 6th International Conference on Security of Information and Networks
Using transition systems to model and verify the implementation of security protocol
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
Networked systems mainly consists of autonomous components conforming to the network protocols. Those concurrent and networked components are potentially to be attacked by malicious users. They have to implement some mechanisms to avoid the possible threatening requests aimed at disrupting or crashing the system, and then provoke some denial of service attack. In this paper, we address this problem. We suggest a method to model this kind of components and we propose a robustness testing approach to evaluate the system security. A new definition of Glued_IOLTS is used to define this kind of system and an algorithm for robustness testing cases generation is given. A case study with the RADIUS protocol is presented.