Journal of Applied Mathematics

  • J. Appl. Math.
  • Volume 2013, Special Issue (2013), Article ID 138287, 10 pages.

A Latent Implementation Error Detection Method for Software Validation

Jiantao Zhou, Jing Liu, Jinzhao Wu, and Guodong Zhong

Full-text: Open access

Abstract

Model checking and conformance testing play an important role in software system design and implementation. From the view of integrating model checking and conformance testing into a tightly coupled validation approach, this paper presents a novel approach to detect latent errors in software implementation. The latent errors can be classified into two kinds, one is called as Unnecessary Implementation Trace, and the other is called as Neglected Implementation Trace. The method complements the incompleteness of security properties for software model checking. More accurate models are characterized to leverage the effectiveness of the model-based software verification and testing combined method.

Article information

Source
J. Appl. Math., Volume 2013, Special Issue (2013), Article ID 138287, 10 pages.

Dates
First available in Project Euclid: 9 May 2014

Permanent link to this document
https://projecteuclid.org/euclid.jam/1399645351

Digital Object Identifier
doi:10.1155/2013/138287

Citation

Zhou, Jiantao; Liu, Jing; Wu, Jinzhao; Zhong, Guodong. A Latent Implementation Error Detection Method for Software Validation. J. Appl. Math. 2013, Special Issue (2013), Article ID 138287, 10 pages. doi:10.1155/2013/138287. https://projecteuclid.org/euclid.jam/1399645351


Export citation

References

  • J. Woodcock, P. G. Larsen, J. Bicarregui, and J. Fitzgerald, “Formal methods: practice and experience,” ACM Computing Surveys, vol. 41, no. 4, article 19, pp. 1–36, 2009.
  • R. Jhala and R. Majumdar, “Software model checking,” ACM Computing Surveys, vol. 41, no. 4, article 21, pp. 1–54, 2009.
  • R. M. Hierons, K. Bogdanov, J. P. Bowen et al., “Using formal specification to support testing,” ACM Computing Surveys, vol. 41, article 9, pp. 1–76, 2009.
  • C. Constant, T. Jéron, H. Marchand, and V. Rusu, “Integrating formal verification and conformance testing for reactive systems,” IEEE Transactions on Software Engineering, vol. 33, no. 8, pp. 558–574, 2007.
  • G. Fraser, F. Wotawa, and P. E. Ammann, “Testing with model checkers: a survey,” Software Testing Verification and Reliability, vol. 19, no. 3, pp. 215–261, 2009.
  • D. Peled, M. Y. Vardi, and M. Yannakakis, “Black box checking,” Journal of Automata, Languages and Combinatorics, vol. 7, no. 2, pp. 225–246, 2002.
  • A. Groce, D. Peled, and M. Yannakakis, “Adaptive model checking,” in Proceedings of Tools and Algorithms for the Construction and Analysis of Systems (TACAS '02), pp. 357–370, Springer, Grenoble, France, April 2002.
  • J. Tretmans, “Model based testing with labelled transition systems,” in Formal Methods and Testing, R. M. Hierons, J. P. Bowen, and M. Harman, Eds., pp. 1–38, Springer, Berlin, germany, 2008.
  • J. Tretmans, “Test generation with inputs, outputs and repetitive quiescence,” Software-Concepts and Tools, vol. 17, no. 3, pp. 103–120, 1996.
  • J. Tretmans and E. Brinksma, “TorX: automated model based testing,” in Proceedings of the 1st European Conference on Model-Driven Software Engineering (ECMDSE '03), pp. 1–13, AGEDIS, Nuremberg, Germany, December 2003.
  • C. Jard and T. Jéron, “TGV: theory, principles and algorithms. A tool for the automatic synthesis of conformance test cases for non-deterministic reactive systems,” International Journal on Software Tools for Technology Transfer, vol. 7, no. 4, pp. 297–315, 2005.
  • V. Rusu, H. Marchand, V. Tschaen, T. Jeron, and B. Jeannet, “From safety verification to safety testing,” in Proceedings of the Testing of Communicating Systems (TestCom '04), pp. 160–176, Springer, Oxford, UK, March 2004.
  • B. Jeannet, T. Jéron, V. Rusu, and E. Zinovieva, “Symbolic test selection based on approximate analysis,” in Proceedings of the 11th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS '05), pp. 349–364, April 2005.
  • M. Oostdijk, V. Rusu, J. Tretmans, R. G. De Vries, and T. A. C. Willemse, “Integrating verification, testing, and learning for cryptographic protocols,” Lecture Notes in Computer Science, vol. 4591, pp. 538–557, 2007.
  • A. Gargantini and C. Heitmeyer, “Using model checking to generate tests from requirements specifications,” ACM SIGSOFT Software Engineering Notes, vol. 24, pp. 146–162, 1999.
  • H. S. Hong, I. Lee, O. Sokolsky, and H. Ural, “A temporal logic based theory of test coverage and generation,” in Proceedings of the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS '02), pp. 327–341, Springer, Grenoble, France, April 2002.
  • D. A. da Silva and P. D. L. Machado, “Towards test purpose generation from CTL properties for reactive systems,” Electronic Notes in Theoretical Computer Science, vol. 164, no. 4, pp. 29–40, 2006.
  • G. Fraser and A. Gargantini, “An evaluation of model checkers for specification based test case generation,” in Proceedings of the 2nd International Conference on Software Testing, Verification, and Validation (ICST '09), pp. 41–50, IEEE Press, Denver, Colo, USA, April 2009.
  • Software Engineering Institute, CMU, Copper Manual, Tutorial, and Specification Grammar, http://www.sei.cmu..edu/library/abstracts/whitepapers/copper.cfm
  • M. B. Dwyer, G. S. Avrunin, and J. C. Corbett, “Patterns in property specifications for finite-state verification,” in Proceedings of the International Conference on Software Engineering (ICSE '99), pp. 411–420, IEEE Press, Los Angeles, Calif, USA, May 1999.
  • M. B. Dwyer, G. S. Avrunin, and J. C. Corbett, Spec Patterns, The Santos Laboratory, Kansas State University.
  • A. Fedeli, F. Fummi, and G. Pravadelli, “Properties incompleteness evaluation by functional verification,” IEEE Transactions on Computers, vol. 56, no. 4, pp. 528–544, 2007.
  • J. B. Wang, M. Chen, X. Wan, and C. Wei, “Ant-colony-optimization-based scheduling algorithm for uplink CDMA nonreal-time data,” IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp. 231–241, 2009.
  • J. B. Wang, H. M. Chen, M. Chen, and J. Z. Wang, “Cross-layer packet scheduling for downlink multiuser OFDM systems,” Science in China F, vol. 52, no. 12, pp. 2369–2377, 2009.
  • J.-B. Wang, Y. Jiao, X. Song, and M. Chen, “Optimal training sequences for indoor wireless optical communications,” Journal of Optics, vol. 14, no. 1, Article ID 015401, 2012.