A Formal Approach for Passive Testing of Protocol Data Portions
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Passive testing and applications to network management
ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
A Temporal Logic for Input Output Symbolic Transition Systems
APSEC '05 Proceedings of the 12th Asia-Pacific Software Engineering Conference
Integrating formal verification and conformance testing for reactive systems
IEEE Transactions on Software Engineering
Passive Testing of Timed Systems
ATVA '08 Proceedings of the 6th International Symposium on Automated Technology for Verification and Analysis
Parametric Trace Slicing and Monitoring
TACAS '09 Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009,
A passive testing approach based on invariants: application to the WAP
Computer Networks: The International Journal of Computer and Telecommunications Networking
Integrating verification, testing, and learning for cryptographic protocols
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
Symbolic execution techniques for refinement testing
TAP'07 Proceedings of the 1st international conference on Tests and proofs
Practical Experience Gained from Passive Testing of Web Based Systems
ICSTW '10 Proceedings of the 2010 Third International Conference on Software Testing, Verification, and Validation Workshops
When BDDs Fail: Conformance Testing with Symbolic Execution and SMT Solving
ICST '10 Proceedings of the 2010 Third International Conference on Software Testing, Verification and Validation
Temporal Assertions with Parametrized Propositions*
Journal of Logic and Computation
Timed Extended Invariants for the Passive Testing of Web Services
ICWS '10 Proceedings of the 2010 IEEE International Conference on Web Services
Checking the behavioral conformance of web services with symbolic testing and an SMT solver
TAP'11 Proceedings of the 5th international conference on Tests and proofs
Symbolic execution techniques for test purpose definition
TestCom'06 Proceedings of the 18th IFIP TC6/WG6.1 international conference on Testing of Communicating Systems
Automatic verification and conformance testing for validating safety properties of reactive systems
FM'05 Proceedings of the 2005 international conference on Formal Methods
Passive testing – a constrained invariant checking approach
TestCom'05 Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating Systems
Data-centric property formulation for passive testing of communication protocols
ACC'11/MMACTEE'11 Proceedings of the 13th IASME/WSEAS international conference on Mathematical Methods and Computational Techniques in Electrical Engineering conference on Applied Computing
Formal passive testing of timed systems: theory and tools
Software Testing, Verification & Reliability
An EFSM-based passive fault detection approach
TestCom'07/FATES'07 Proceedings of the 19th IFIP TC6/WG6.1 international conference, and 7th international conference on Testing of Software and Communicating Systems
An IOSTS Based Passive Testing Approach for the Validation of Data-Centric Protocols
QSIC '12 Proceedings of the 2012 12th International Conference on Quality Software
A formal data-centric approach for passive testing of communication protocols
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
This paper presents a new approach to perform passive testing based on the analysis of the control and data part of the system under test. Passive testing techniques are based on the observation and verification of properties on the behaviour of a system without interfering with its normal operation. Many passive testing techniques consider only the control part of the system and neglect data, or are confronted with an overwhelming amount of data values to process. In our approach, we consider control and data parts by integrating the concepts of symbolic execution and we improve trace analysis by introducing trace slicing techniques. Properties are described using Input-Output Symbolic Transition Systems (IOSTSs) and we illustrate in the paper how they can be tested on real execution traces optimizing the trace analysis. These properties can be designed to test the functional conformance of a protocol as well as security properties. In addition to the theoretical approach, we have developed a software tool that implements the algorithms presented in this paper. Finally, as a proof of concept of our approach and tool we have applied the techniques to a real-life case study: the SIP protocol. In particular, the proposed techniques are applied to a set of real execution traces extracted from an IMS/SIP architecture.