| 451 | Shufang Lee and Xiaoying Bai and Yinong Chen Automatic Mutation Testing and Simulation on OWL-S Specified Web Services Proceedings of the 41st Annual Simulation Symposium (ANSS'08)Ottawa, Canada., 14-16 April 2008. |
|
| | Abstract: Web Ontology Language for Services (OWL-S) is a standard XML-based language for specifying workflows and integration semantics among Web services (WS), which form composite WS. This paper analyzes the fault patterns of OWL-S specified composite WS and their workflows, proposes an ontology-based mutation analysis method, and applies specification-based mutation techniques for composite WS simulation and testing. Four categories of OWL-S mutant operators are specified, including data mutation, condition mutation, control flow mutation, and data flow mutation. Finally, the paper studies the ontology-based input mutation technique using a BookFinder service as a case study, which shows that ontology-based mutation provides viable test adequacy criteria for testing OWL-S specified composite WS. |
| | @INPROCEEDINGS{LeeBC08,
author = {Shufang Lee and Xiaoying Bai and Yinong Chen},
title = {Automatic Mutation Testing and Simulation on OWL-S Specified Web Services},
booktitle = {Proceedings of the 41st Annual Simulation Symposium (ANSS'08)},
year = {2008},
address = {Ottawa, Canada.},
month = {14-16 April},
pages = {149-156}
} |
| 452 | JeeHyun Hwang and Tao Xie and Fei Chen and Alex X. Liu Systematic Structural Testing of Firewall Policies Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS '08)Napoli, Italy, 6-8 October 2008. |
|
| | Abstract: Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall directly depends on the quality of its policy (i.e., configuration), ensuring the correctness of security policies is important and yet difficult.To help ensure the correctness of a firewall policy, we propose a systematic structural testing approach for firewall policies. We define structural coverage (based on coverage criteria of rules, predicates, and clauses) on the policy under test. Considering achieving higher structural coverage effectively, we develop three automated packet generation techniques: the random packet generation, the one based on local constraint solving (considering individual rules locally in a policy), and the most sophisticated one based on global constraint solving (considering multiple rules globally in a policy).We have conducted an experiment on a set of real policies and a set of faulty policies to detect faults with generated packet sets. Generally, our experimental results show that a packet set with higher structural coverage has higher fault detection capability (i.e., detecting more injected faults). Our experimental results show that a reduced packet set (maintaining the same level of structural coverage with the corresponding original packet set) maintains similar fault detection capability with the original set. |
| | @INPROCEEDINGS{HwangXCL08,
author = {JeeHyun Hwang and Tao Xie and Fei Chen and Alex X. Liu},
title = {Systematic Structural Testing of Firewall Policies},
booktitle = {Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS '08)},
year = {2008},
address = {Napoli, Italy},
month = {6-8 October},
pages = {105-114}
} |
| 453 | Shamaila Hussain Mutation Clustering King's College London, UK, 2008.Unknown- |
|
| | Abstract: Available soon... |
| | @PHDTHESIS{Hussain08,
author = {Shamaila Hussain},
title = {Mutation Clustering},
school = {King's College London},
year = {2008},
type = {phdthesis},
address = {UK},
month = {},
} |
| 454 | Alessandro Marchetto Talking about a Mutation-Based Reverse Engineering for web testing: A preliminary Experiment Proceedings of the 6th International Conference on Software Engineering Research, Management and Applications (SERA'08)Prague, Czech Republic, 20-22 August 2008. |
|
| | Abstract: One of the most well known and used approach to dynamically analyze a Web application requires to the user to analyze code and requirements of the application to extract its scenarios and the needed inputs. This information is used to exercise the application behavior and so build its model. Hence, high knowledge and effort are required to apply that kind of analysis. Moreover, it is well recognized that a dynamic approach builds partial models since it is strictly related to the application execution. In this paper, we talk about an approach that uses code mutation to reverse engineer a Web application and build its model then used for testing. We document an experiment done to evaluate feasibility and effectiveness of that approach comparing it with other traditional ones. The results show that the approach automatically builds models containing a limited degree of inaccuracy that can be pruned during the application testing. |
| | @INPROCEEDINGS{Marchett08,
author = {Alessandro Marchetto},
title = {Talking about a Mutation-Based Reverse Engineering for web testing: A preliminary Experiment},
booktitle = {Proceedings of the 6th International Conference on Software Engineering Research, Management and Applications (SERA'08)},
year = {2008},
address = {Prague, Czech Republic},
month = {20-22 August},
pages = {161-168}
} |
| 455 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry A Generic Metamodel For Security Policies Mutation Proceedings of the IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW'08)Lillehammer, Norway, 9-11 April 2008. |
|
| | Abstract: We present a new approach for mutation analysis of security policies test cases. We propose a metamodel that provides a generic representation of security policies access control models and define a set of mutation operators at this generic level. We use Kermeta to build the metamodel and implement the mutation operators. We also illustrate our approach with two successful instantiation of this metamodel: we defined policies with RBAC and OrBAC and mutated these policies. |
| | @INPROCEEDINGS{MouelhiFB08,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry},
title = {A Generic Metamodel For Security Policies Mutation},
booktitle = {Proceedings of the IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW'08)},
year = {2008},
address = {Lillehammer, Norway},
month = {9-11 April},
pages = {278-286}
} |
| 456 | Samer Hanna and Malcolm C. Munro Fault-Based Web Services Testing Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG'08), 2008. |
|
| | Abstract: Web services are considered a new paradigm for building software applications that has many advantages over the previous paradigms; however, Web services are still not widely used because Service Requesters do not trust Web Services that were built by others. Testing can participate in solving this problem because it can be used to assess the quality attributes of Web Services and hence increase the requesters’ trustworthiness. This paper proposes an approach that can be used to test the robustness and other related attribute of Web Services, and that can be easily enhanced to assess other quality attributes. The framework is based on rules for test case generation that are designed by, firstly, analyzing WSDL document to know what faults could affect the robustness quality attribute of Web Services, and secondly, using the fault-based testing techniques to detect such faults. A proof of concept tool that depends on these rules has been implemented in order to assess the usefulness of the rules in detecting robustness faults in different Web Services platforms. |
| | @INPROCEEDINGS{HannaM08,
author = {Samer Hanna and Malcolm C. Munro},
title = {Fault-Based Web Services Testing},
booktitle = {Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG'08)},
year = {2008},
address = {},
month = {},
pages = {471-476}
} |
| 457 | Hossain Shahriar and Mohammad Zulkernine MUSIC: Mutation-based SQL Injection Vulnerability Checking Proceedings of the 8th International Conference on Quality Software (QSIC'08)Oxford, UK, 12-13 August 2008. |
|
| | Abstract: SQL injection is one of the most prominent vulnerabilities for web-based applications. Exploitation of SQL injection vulnerabilities (SQLIV) through successful attacks might result in severe consequences such as authentication bypassing, leaking of private information etc. Therefore, testing an application for SQLIV is an important step for ensuring its quality. However, it is challenging as the sources of SQLIV vary widely, which include the lack of effective input filters in applications, insecure coding by programmers, inappropriate usage of APIs for manipulating databases etc. Moreover, existing testing approaches do not address the issue of generating adequate test data sets that can detect SQLIV. In this work, we present a mutation-based testing approach for SQLIV testing. We propose nine mutation operators that inject SQLIV in application source code. The operators result in mutants, which can be killed only with test data containing SQL injection attacks. By this approach, we force the generation of an adequate test data set containing effective test cases capable of revealing SQLIV. We implement a MUtation-based SQL Injection vulnerabilities Checking (testing) tool (MUSIC) that automatically generates mutants for the applications written in Java Server Pages (JSP) and performs mutation analysis. We validate the proposed operators with five open source web-based applications written in JSP. We show that the proposed operators are effective for testing SQLIV. |
| | @INPROCEEDINGS{ShahriarZ08,
author = {Hossain Shahriar and Mohammad Zulkernine},
title = {MUSIC: Mutation-based SQL Injection Vulnerability Checking},
booktitle = {Proceedings of the 8th International Conference on Quality Software (QSIC'08)},
year = {2008},
address = {Oxford, UK},
month = {12-13 August},
pages = {77-86}
} |
| 458 | Ralph Guderlei and Rene Just and Christoph Schneckenburger Benchmarking Testing Strategies with Tools from Mutation Analysis Proceedings of the IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW'08)Lillehammer, Norway, 9-11 April 2008. |
|
| | Abstract: The assessment of a testing strategy and the comparison of different testing strategies is a crucial part in current research on software testing. Often, manual error seeding is used to generate faulty programs. As a consequence, the results obtained from the examination of these programs are often not reproducible and likely to be biased. In this paper, a flexible approach to the benchmarking of testing strategies is presented. The approach utilizes well- known results from mutation analysis to construct an objective effectiveness measure for test oracles. This measure allows to draw conclusions not only on the effectiveness of a single testing strategy but also to compare different testing strategies by their effectiveness measure. |
| | @INPROCEEDINGS{GuderleiJS08,
author = {Ralph Guderlei and Rene Just and Christoph Schneckenburger},
title = {Benchmarking Testing Strategies with Tools from Mutation Analysis},
booktitle = {Proceedings of the IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW'08)},
year = {2008},
address = {Lillehammer, Norway},
month = {9-11 April},
pages = {361-364}
} |
| 459 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon Mutating DAC And MAC Security Policies: A Generic Metamodel Based Approach Proceedings of the 1st International Modeling Security WorkshopToulouse, France, 28th September 2008. |
|
| | Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| | @INPROCEEDINGS{MouelhiFBL08a,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon},
title = {Mutating DAC And MAC Security Policies: A Generic Metamodel Based Approach},
booktitle = {Proceedings of the 1st International Modeling Security Workshop},
year = {2008},
address = {Toulouse, France},
month = {28th September},
pages = {}
} |
| 460 | Gustav Munkby and Sibylle Schupp Improving Fault Injection of Soft Errors Using Program Dependencies Proceedings of the 3rd Testing: Academic and Industrial Conference Practice and Research Techniques (TAIC PART'08)Windsor, UK, 29-31 August 2008. |
|
| | Abstract: Research has shown that modern micro-architectures are vulnerable to soft errors, i.e., temporary errors caused by voltage spikes produced by cosmic radiation. Soft-error impact is usually evaluated using fault injection, a black-box testing approach similar to mutation testing. In this paper, we complement an existing evaluation of a prototype brake-by-wire controller, developed by Volvo Technology, with static-analysis techniques to improve test effectiveness. The fault-injection tests are both time- and data-intensive, which renders their qualitative and quantitative assessment difficult. We devise a prototype visualization tool, which groups experiments by injection point and provides an overview of both instruction and fault coverage, and the ability to detect patterns and anomalies. We use the program-dependence graph to identify experiments with a priori known outcome, and implement a static analysis to reduce the test volume. The existing pre-injection heuristic is extended with liveness analysis to enable an unbiased fault-to-failure probability. |
| | @INPROCEEDINGS{MunkbyS08,
author = {Gustav Munkby and Sibylle Schupp},
title = {Improving Fault Injection of Soft Errors Using Program Dependencies},
booktitle = {Proceedings of the 3rd Testing: Academic and Industrial Conference Practice and Research Techniques (TAIC PART'08)},
year = {2008},
address = {Windsor, UK},
month = {29-31 August},
pages = {77-81}
} |