期刊文献+

测试集自动生成工具TUGEN的设计与实现 被引量:2

TUGEN: A TOOL FOR AUTOMATIC TEST SUITE GENERATION
下载PDF
导出
摘要 测试集自动生成工具的研究是协议一致性测试领域中比较活跃的一个分支,本文在对目前已有的各种测试集生成方法进行分析的基础上,提出了一种新的测试集自动生成方法并对它的实现TUGEN作了介绍.TUGEN基于一种称为EBE的形式模型,EBE模型只对协议的外部行为进行描述,而且可以从协议的Estelle或LOTOS描述中转化得到.TUGEN以协议的EBE-NF描述作为输入,使用我们新提出的一套测试事例生成策略,最后产生出TTCN.MP格式的测试集.我们用X.25LAPB协议的EBE-NF描述作为例子,对TUGEN的正确性和有效性进行了验证并得到了满意的结果.我们相信,TUGEN完全可以成为一个测试集自动生成的有力工具. This paper presents a tool called TUGEN which is used for automatic test suite derivation from formal protocol specification. TUGEN is based on a formal model called EBE (External Behavior Expression) which can be obtained from formal protocol specification in either Estelle of LOTOS. This model specifies only the external behavior of a protocol in terms of the input/output sequences and their logical (function and predicate) relations. Based on the EBE specification of a protocol, a test sequence derivation method is used to identify associations between inputs and outputs through the interaction paths and their I/O subpaths, then generic test cases specified in TTCN (Tree and Tabular Combined Notation) can be generated from these I/O subpaths. Comparison of test cases generated from this tool and those in ISO/IEC DIS 8882 part 2 for X. 25 LAPB protocol shows that the resulting set of test cases of TUGEN is concise and effective. It is our belief that TUGEN can be a powerful utility for protocol test suite generation.
出处 《软件学报》 EI CSCD 北大核心 1994年第5期26-28,共3页 Journal of Software
基金 国家自然科学基金
关键词 通信协议 测试 TUGEN 设计 Protocol conformance testing, implementation under testing, test suite, test case/test sequence, interaction path, sub-interaction path.
  • 相关文献

参考文献2

  • 1Lee D Y,IEEE Trans C,1991年,40卷,4期
  • 2Wu J P,1989年

同被引文献11

  • 1于民.机载计算机关键技术的研究[J].计算机工程,1994,20(5):41-46. 被引量:5
  • 2蔡兵,周六丁,陈延槐.关于链路故障的分布式故障诊断[J].计算机科学,1994,21(4):72-73. 被引量:3
  • 3Harrison W H.Compiler analysis of the value ranges for variables[J].IEEE Transactions on Software Engineering,1977,3(3):243-250.
  • 4Wagner D,Foster J,Brewer E.A first step towards automated detection of buffer overrun vulnerabilities[C].In:Symposium on Network and Distributed Systems Security,2000:3-17.
  • 5Gupta R.A fresh look at optimizing array bound checking[C].Proceedings of the ACM SIGPLAN90 Conference on ProgrammingLanguage Design and Implementation,New York,1990,(20-22):272-282.
  • 6Kolte P,Wolfe M.Elimination of redundant array subscript range checks[C].In:ACM Siglan Noticves-International Conference on Programming Language Design and Implementation,La Jolla,CA,USA,June 1995:270-278.
  • 7Bodik R,Gupta R,Sarkar V.ABCD:eliminating arraybounds checks on demand[C].In:ACM Sigplan Conference on Programming LanguageDesign and Implementation,Vancouver,Canada,June 2000:321-333.
  • 8Suzuki N,Ishihata K.Implementation of an array bound checker[C].In:ACM Symposium Principles of Programming Languages,1977:132-143.
  • 9Larochelle D,Evans D.Statically detecting likely buffer overflow vulnerabilities[J].In:ACM SIGPLAN-SIGACT Conference on the Principles of Programming Languages (POPL),January 2002.177-190.
  • 10Markstein V,Coke J,Markstein P.Optimization of range checking[C].Acm Sigplan Symposium on Compiler Construction,June 1982:114-119.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部