• Title/Summary/Keyword: Black-box

Search Result 457, Processing Time 0.033 seconds

An Effective Test Data Selection Technique for Customized COM Components and its Empirical Study (맞춤된 COM 컴포넌트를 위한 효과적인 테스트 데이타 선정 기법과 적용사례)

  • 윤회진;이병희;김은희;최병주
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.6
    • /
    • pp.741-749
    • /
    • 2004
  • Component users must customize components they obtain from providers, in order to fit them to their own purposes. Normally, a component consists of black-box parts and white-box parts. Component users customize a component by modifying white-box parts of a component, and the customization faults appear through the interaction between black-box parts and white-box parts. Customization testing could be an integration testing of these two parts of a component. Also, customization testing in CBSD should select effective test data to reduce the testing cost, since CBSD aims to reduce the development cost. Therefore, this paper proposes a customization testing technique based on COM architecture through analyzing many COM components, and the technique selects effective test data. This paper evaluates the effectiveness of the test data selected by the proposed technique through an empirical study. It applies the techlique to a large-scale component-based system, Chamois, and it shows that the technique enables us to test customized COM components that run in a real component-based system

A Component Composition Testing Technique in CBSD (CBSD에서의 컴포넌트 조립 테스트 기법)

  • Yoon, Hoi-Jin;Choi, Byoung-Ju
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.10
    • /
    • pp.694-702
    • /
    • 2002
  • An application in Component-Based Software Development (CBSD) is built by 'composing'two kinds of components; One is a component that is made by current developer himself, and the other is a component that is from other developments. We define the former as a 'White-box component' and the latter as a 'Black-box component.' The error from the composition can be said to be caused by interactions of Black-box components and White-box components. This paper proposes a new testing technique for composition errors, and applies the technique to Enterprise Java Beans component architecture. Our technique selects test cases by injecting a fault only into the specific parts of a White-box component. This specific parts for injecting a fault are selected by analyzing composition patterns, and lead to make our test cases have a good effectiveness. We show the effectiveness of our test cases through an experiment. Moreover, we also mention an automation tool for our technique.

The Grey Box of Technoscientific Practices: Laboratory as a Heterotopic Space where In/visible Collaborations Take Place (과학적 실행의 회색상자(grey box): 비/가시적 협력의 헤테로토피아(heterotopia)로서의 실험실 공간)

  • Lee, June Seok
    • Journal of Science and Technology Studies
    • /
    • v.13 no.1
    • /
    • pp.1-39
    • /
    • 2013
  • How would technoscientists collaborate in their technoscientific practices? Based on the ethnographic research done at NRI(Neuroscience Research Institute), this research shows how collaboration occurs in/outside the interdisciplinary laboratory. As previous studies show, collaboration makes researches possible that otherwise would have been impossible. Korean technoscientists who are situated in the scientific periphery, practice contextualized collaboration in their labs. These collaborations are invisible before opening the black box of the lab. But it acquires visibility after certain incidents such as collaborations, debates and discussions, malfunctioning of the instruments, and networking with other actors occur. These networks again become invisible after the certain incidents end. However these blackboxing and whiteboxing (opening the blackbox) processes occur simultaneously in various levels, it is almost impossible to identify them separately. In real technoscientific practices, blackboxing and whiteboxing do not occur distinctively. They almost always occur at the same time on multi-layered levels, hence forming the 'grey box' of technoscientific practices. Lastly, collaborations inside laboratory have in/visible features, because laboratories function as Foucauldian heterotopias.

  • PDF

Vertical System Testing Method For Efficient Error Tracing (효과적인 오류 추적을 위한 수직적 시스템 시험 방법)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.19-29
    • /
    • 2008
  • In case of unit testing, White-box test can be used to closely check source code and to analyze logic and statement errors. On the other hand, in case of function testing of system level, Black-box test can be mainly used to compare actual and expected results by inputting test data because the scale of function is large. This Black-Box test in system testing level has problem in tracing errors in source code when we find errors. Moreover applying White-box test is not easy for system testing level because the levels of test target are different. Therefore this paper suggests the vertical test method of a practical and integrated system level which can checks up to source code level using White-box test style although it aims to test the highly abstract level like a system function. In addition, the experiment explains how to apply the vertical test by displaying an example which traces from UML specification model to the source code and also shows efficiency of error trace.

  • PDF

Repair and Restoration of Joseon Historical Document Box (조선왕조 실록함의 수리복원)

  • Yi, Yonghee;Park, Junghae;Park, Suzin
    • Conservation Science in Museum
    • /
    • v.15
    • /
    • pp.122-137
    • /
    • 2014
  • The National Museum of Korea own a historical document box K976 that was once used to store Joseon Wangjo Sillok Annals of the Joseon Dynasty of the Joseon Dynasty. The rectangular box has a lid, and the entire surface is varnished with black lacquer. The wood of the box had become warped and the upper part of the wooden frame had been damaged. In some areas, the paint was flaking off, exposing the underlying wood, and an iron ring that connected the lid to the body of the box was missing. Thus, in 2013, Conservation Science Department in National Museum of Korea began to repair and restore the Joseon document box. Before the treatment, analyses were conducted to examine the box's structure, damaged parts, species of wood, and lacquering techniques. The wood was found to be that of a linden tree. As for the lacquering technique, the surface of the box was first coated with a layer of lacquer and bone ash, and then covered with Korean traditional paper. Next, the box was painted with a layer of mud and ashes, followed by a layer of black pigment mixed with soot, and then varnished again with lacquer.

Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers (화이트 박스 블록 암호에 대한 최신 암호분석 기술 동향 연구)

  • Chaerin Oh;Woosang Im;Hyunil Kim;Changho Seo
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.9-18
    • /
    • 2023
  • Black box cryptography is a cryptographic scheme based on a hardware encryption device, operating under the assumption that the device and the user can be trusted. However, with the increasing use of cryptographic algorithms on unreliable open platforms, the threats to black box cryptography systems have become even more significant. As a consequence, white box cryptography have been proposed to securely operate cryptographic algorithms on open platforms by hiding encryption keys during the encryption process, making it difficult for attackers to extract the keys. However, unlike traditional cryptography, white box-based encryption lacks established specifications, making challenging verify its structural security. To promote the safer utilization of white box cryptography, CHES organizes The WhibOx Contest periodically, which conducts safety analyses of various white box cryptographic techniques. Among these, the Differential Computation Analysis (DCA) attack proposed by Bos in 2016 is widely utilized in safety analyses and represents a powerful attack technique against robust white box block ciphers. Therefore, this paper analyzes the research trends in white box block ciphers and provides a summary of DCA attacks and relevant countermeasures. adhering to the format of a research paper.

Construction of UOWHF based on Block Cipher (유니버설 일방향 해쉬 함수에 대한 블록 암호 기반 구성 방법)

  • 이원일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.101-111
    • /
    • 2004
  • Preneel, Govaerts, and Vandewalle considered the 64 basic ways to construct a collision resistant hash function from a block cipher. They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. Black, Rogaway, and Shrimpton presented a more proof-centric look at the schemes from PGV. They proved that, in the black box model of block cipher, 12 of 64 compression functions are CRHFs and 20 of 64 extended hash functions are CRHFs. In this paper, we present 64 schemes of block-cipher-based universal one way hash functions using the main idea of PGV and analyze these schemes in the black box model. We will show that 30 of 64 compression function families UOWHF and 42 of 64 extended hash function families are UOWHF. One of the important results is that, in this black box model, we don't need the mask keys for the security of UOWHF in contrast with the results in general security model of UOWHF. Our results also support the assertion that building an efficient and secure UOWHF is easier than building an efficient and secure CRHF.

Chinoketides A and B, Two New Antimicrobial Polyketides from the Endophytes of Distylium chinense with the "Black-Box" Co-culture Method

  • Lv, Meng-Meng;Tan, Ming-Hui;Lu, Li-Wen;Zhang, Rong-Hua;Guo, Zhi-Yong;Liu, Cheng-Xiong;Yang, Jin;Zou, Kun;Proksch, Peter
    • Natural Product Sciences
    • /
    • v.24 no.3
    • /
    • pp.159-163
    • /
    • 2018
  • Two new polyketides, chinoketides A and B (1 - 2) with a known compound xylarphthalide A (3), were isolated from the solid medium of the endophytes from the leaves of the relic plant Distylium chinense with the "black-box" co-culture method, and the structures of two new compounds were elucidated by NMR, MS and CD spectra. And the absolute configurations of chinoketides A (1) and B (2) were determined as 2R,3R,8S and 5R,6S by calculating their ECD spectra to compare with the experimental CD spectra. Finally, the antimicrobial activities were evaluated to Erwinia carotovora sub sp. Carotovora (Jones) Bersey et al, and the results showed that compounds 1 - 3 displayed the antimicrobial activities with MIC value at 20.5, 30.4 and $10.2{\mu}g/mL$.

Test-case Generation for Simulink/Stateflow Model using a Separated RRT Space (분할된 RRT 공간을 이용한 Simulink/Stateflow모델 테스트케이스 생성)

  • Park, Hyeon Sang;Choi, Kyung Hee;Chung, Ki Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.7
    • /
    • pp.471-478
    • /
    • 2013
  • This paper proposes a black-box based test case generation method for Simulink/Stateflow model utilizing the RRT algorithm which is a method to efficiently solve the path planning for complicated systems. The proposed method in the paper tries to solve the reachability problem with the RRT algorithm, which has to be solved for black-box based test case generations. A major problem of the RRT based test case generation algorithms is that the cost such as running time and required memory size is too much for complicated Stateflow model. The typical RRT algorithm expands rapidly-exploring random tree (RRT) in a single state space. But the proposed method expands it in dynamic state space based on the state of Simulink model, consequently reducing the cost. In the paper, a new definition of RRT state space, a distance measure and a test case generation algorithm are proposed. The performance of proposed method is verified through the experiment against Stateflow model.