Sciweavers

1518 search results - page 65 / 304
» Cryptographic Test Correction
Sort
View
ICST
2009
IEEE
14 years 10 months ago
Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation
A software development process is conceptually an abstract form of model transformation, starting from an enduser model of requirements, through to a system model for which code c...
Emine G. Aydal, Richard F. Paige, Mark Utting, Jim...
90
Voted
ICSE
2007
IEEE-ACM
16 years 20 days ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
125
Voted
AADEBUG
2005
Springer
15 years 2 months ago
Random testing of C calling conventions
In a C compiler, function calls are difficult to implement correctly because they must respect a platform-specific calling convention. But they are governed by a simple invariant...
Christian Lindig
112
Voted
ICST
2010
IEEE
14 years 11 months ago
When BDDs Fail: Conformance Testing with Symbolic Execution and SMT Solving
—Model-based testing is a well known technique that allows one to validate the correctness of software with respect to its model. If a lot of data is involved, symbolic technique...
Elisabeth Jöbstl, Martin Weiglhofer, Bernhard...
TAP
2010
Springer
134views Hardware» more  TAP 2010»
14 years 10 months ago
Testing First-Order Logic Axioms in Program Verification
Program verification systems based on automated theorem provers rely on user-provided axioms in order to verify domain-specific properties of code. However, formulating axioms corr...
Ki Yung Ahn, Ewen Denney