Coverage-Based Testing with Symbolic Transition Systems

被引:9
作者
van den Bos, Petra [1 ]
Tretmans, Jan [1 ,2 ]
机构
[1] Radboud Univ Nijmegen, Inst Comp & Informat Sci, Nijmegen, Netherlands
[2] ESI TNO, Eindhoven, Netherlands
来源
TESTS AND PROOFS (TAP 2019) | 2019年 / 11823卷
关键词
TEST-GENERATION; FRAMEWORK; EXECUTION;
D O I
10.1007/978-3-030-31157-5_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We provide a model-based testing approach for systems comprising both state-transition based control flow, and data elements such as variables and data-dependent transitions. We propose test generation and execution, based on model-coverage: we generate test cases that aim to reach all transitions of the model. To obtain a test case reaching a certain transition, we need to combine reachability in the control flow, and satisfiability of the data elements of the model. Concrete values for data parameters are generated on-the-fly, i.e., during test execution, such that received outputs from the system can be taken into account for the inputs later provided in test execution. Due to undecidability of the satisfiability problem, SMT solvers may return result 'unknown'. Our algorithm deals with this explicitly. We implemented our method in Maude combined with Z3, and use this to demonstrate the applicability of our method on the Bounded Retransmission Protocol benchmark. We measure performance by counting the number of inputs and outputs needed to discover bugs in mutants, i.e., in non-conforming variants of the specification. As a result, we find that we perform 3 times better, according to the geometric mean, than when using random testing as implemented by the tool TorXakis.
引用
收藏
页码:64 / 82
页数:19
相关论文
共 26 条
[1]  
[Anonymous], TORXAKIS
[2]  
[Anonymous], AUTOMATA WIKI
[3]   Maude:: Specification and programming in rewriting logic [J].
Clavel, M ;
Durán, F ;
Eker, S ;
Lincoln, P ;
Martí-Oliet, N ;
Meseguer, J ;
Quesada, JF .
THEORETICAL COMPUTER SCIENCE, 2002, 285 (02) :187-243
[4]   Z3: An efficient SMT solver [J].
de Moura, Leonardo ;
Bjorner, Nikolaj .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 :337-340
[5]  
Ehrig H., 1985, EATCS Monographs on Theoretical Computer Science, V6, DOI DOI 10.1007/978-3-642-69962-7
[6]  
Frantzen L, 2006, LECT NOTES COMPUT SC, V4262, P40
[7]  
Frantzen L., 2005, LNCS, V3395, P1, DOI [10.1007/978-3-540-31848-41, DOI 10.1007/978-3-540-31848-41]
[8]  
Friedman G., 2002, Software Engineering Notes, V27, P134, DOI 10.1145/566171.566192
[9]  
Gaston C, 2006, LECT NOTES COMPUT SC, V3964, P1
[10]   SAGE: Whitebox Fuzzing for Security Testing [J].
Godefroid, Patrice ;
Levin, Michael Y. ;
Molinar, David .
COMMUNICATIONS OF THE ACM, 2012, 55 (03) :40-44