• Title/Summary/Keyword: Software Testing Tool

Search Result 167, Processing Time 0.021 seconds

A Method for Field Based Grey Box Fuzzing with Variational Autoencoder (Variational Autoencoder를 활용한 필드 기반 그레이 박스 퍼징 방법)

  • Lee, Su-rim;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1463-1474
    • /
    • 2018
  • Fuzzing is one of the software testing techniques that find security flaws by inputting invalid values or arbitrary values into the program and various methods have been suggested to increase the efficiency of such fuzzing. In this paper, focusing on the existence of field with high relevance to coverage and software crash, we propose a new method for intensively fuzzing corresponding field part while performing field based fuzzing. In this case, we use a deep learning model called Variational Autoencoder(VAE) to learn the statistical characteristic of input values measured in high coverage and it showed that the coverage of the regenerated files are uniformly higher than that of simple variation. It also showed that new crash could be found by learning the statistical characteristic of the files in which the crash occurred and applying the dropout during the regeneration. Experimental results showed that the coverage is about 10% higher than the files in the queue of the AFL fuzzing tool and in the Hwpviewer binary, we found two new crashes using two crashes that found at the initial fuzzing phase.

Testing Transactions based on Verification of Isolation Levels (고립화 수준을 검증하기 위한 트랜잭션의 시험)

  • Hong, Seok-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.75-84
    • /
    • 2008
  • Concurrency and synchronization problems are often caused by database applications concurrently accessing databases managed by DBMS. Most commercial DBMSs support isolation levels to resolve these problems. Verification of isolation levels are most important because consistency and integrity constraints of the database can be violated according to isolation levels of transactions that consists of database applications. We propose a test tool set to verify and reveal faulty settings of isolation levels and implement a prototype of the test tool set. The proposed tool set analyzes the SQL statements of ESQL/C programs, attaches the test codes to verify isolation levels, runs the test transactions and detects errors.

Design and Implementation of Information Management Tools for the EDISON Open Platform

  • Ma, Jin;Lee, Jongsuk Ruth;Cho, Kumwon;Park, Minjae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1089-1104
    • /
    • 2017
  • We have developed an information management tool for the EDISON (EDucation-research Integration through Simulation On the Net) open platform. EDISON is, at present, a web-based simulation service for education and research in five computational areas, namely, nanophysics, fluid dynamics, chemistry, structural dynamics, and computer aided optimal design. The EDISON open platform consists of three tiers: EDISON application framework, EDISON middleware, and EDISON infra-resources. The platform provides web portals for education and research in areas such as computational fluid dynamics, computational chemistry, computational nanophysics, computational structural dynamics, and computer aided optimal design along with user service. The main purpose of this research is to test the behavior of the release version of the EDISON Open-Platform under normal operating conditions. This management tool has been implemented using the RESTful API designed in EDISON middleware. The intention is to check co-operation between the middleware and the infrastructure. Suggested tools include User management, Simulation and Job management, and Simulation software (i.e., solver) testing. Finally, it is considered meaningful to develop a management tool that is not supported in other web-based online simulation services.

Descriptive Assessment Tool for Computational Thinking Competencies (Computational Thinking 역량 평가를 위한 서술형 수행평가 도구)

  • Jeon, Soojin;Han, Seonkwan
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.3
    • /
    • pp.255-262
    • /
    • 2016
  • In this paper, we proposes a method to effectively evaluate learner competencies of computational thinking. Developed descriptive performance assessment tool is the use of assessment items presented in a creative computing MIT. This tool is selected and modified items through expert delphi technique. The performance assessment tool is composed of four areas that are an experimenting and iterating, testing and debugging, reusing and remixing and abstracting and modularizing. We apply to software classes for the pre-service teachers and conducted this descriptive performance assessment. Applying result of the assessment, the developed assessment tool shows the reliability $Cronbach-{\alpha}$ values higher than 0.6. In addition, the validity of the test results is higher in experts delphi test. Descriptive assessment tool suggested in this study are identified as a useful assessment tool to effectively measure student CT competencies.

Change Impact Analysis for Object-Oriented softwares in the distributed environment (분산 객체지향 소프트웨어를 위한 수정 영향 분석)

  • Kim, Kyung-Hee;Park, Jai-Nyun;Yoon, Yong-Ik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1280-1290
    • /
    • 1999
  • Applying the change impact analysis to the distributed environment is not straightforward since it is based on the centralized system environment. In this paper, we investigate the change impact analysis of object-oriented shoftwares in the distributed environment. We first, categories the types of changes common in object-oriented software into three sets: data, method, and class level changes. We, then, analyze the impact of each set of changes and represent it in the form of a DPDG. A DPDG is a graph showing relationship of object oriented softwares - with data elements. classes, design documents, servers - in the distributed environment. DPDG searches element of software to retest when the software is changed. Thus, DPDG saves effort of software to retest. In this paper, We propose the table of firewall for retest elements that be discovered by DPDG and implement the table of firewall. The table of firewall is used VIST that we design a software testing tool. The VIST utilizes the minimized firewall, then saves efforts and costs of retesting for distributed object-oriented software.

  • PDF

Verification Methods for Vulnerabilities of Airborne Object-Oriented Software (항공용 객체지향 소프트웨어에 대한 취약점 검증 방안)

  • Jang, Jeong-hoon;Kim, Sung-su;Lee, Ji-hyun
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.2
    • /
    • pp.13-24
    • /
    • 2022
  • As the scale of airborne system software increases, the use of OOT (Object-Oriented Technology) is increasing for functional expansion, efficient development, and code reuse, but the verification method for airborne object-oriented software is conducted from the perspective of the existing procedure-oriented program. The purpose of this paper was to analyze the characteristics of OOT and the vulnerabilities derived from the functional characteristics of OOT, and present a verification method applicable to each software development process (Design, Coding and Testing) to ensure the functional safety integrity of aviation software to which OOT is applied. Additionally, we analyzed the meaning of the static analysis results among the step-by-step verification measures proposed by applying LDRA, a static analysis automation tool, to PX4, an open source used to implement flight control software.

Man-hours Prediction Model for Estimating the Development Cost of AI-Based Software (인공지능 기반 소프트웨어 개발 비용 산정에 관한 소요 공수 예측 모형)

  • Chang, Seong Jin;Kim, Pan Koo;Shin, Ju Hyun
    • Smart Media Journal
    • /
    • v.11 no.7
    • /
    • pp.19-27
    • /
    • 2022
  • The artificial intelligence software market is expected to grow sixfold from 2020 to 2025. However, the software development process is not standardized and there is no standard for calculating the cost. Accordingly, each AI software development company calculates the input man-hours according to their respective development procedures and presents this as the basis for the development cost. In this study, the development stage of "artificial intelligence-based software" that learns with a large amount of data and derives and applies an algorithm was defined, and the required labor was collected by conducting a survey on the number of man-hours required for each development stage targeting developers. Correlation analysis and regression analysis were performed between the collected man-hours for each development stage, and a model for predicting the man-hours for each development stage was derived. As a result of testing the model, it showed an accuracy of 92% compared to the collected airborne effort. The man-hour prediction model proposed in this study is expected to be a tool that can be used simply for estimating man-hours and costs.

A Case Study on Block Coding and Physical Computing Education for University of Education Students (교육대학생을 대상으로 한 블록 코딩 및 피지컬 컴퓨팅 교육 사례)

  • Han, Kyujung
    • Journal of Creative Information Culture
    • /
    • v.5 no.3
    • /
    • pp.307-317
    • /
    • 2019
  • This study is an example of the education of block coding and physical computing teaching tool for preservice teachers at the college of education. The students were familiar with coding and improved their coding skills in solving various problems through 'Entry' that support block coding. In addition, the students configured the computing system with various input / output devices of the physical computing teaching tool and controlled things through programming and produced the educational portfolio to experience the whole process of problem analysis, design, implementation, and testing in coding. We applied Flow based coding and Pair programming as the teaching methods, and the results of the survey to measure the effectiveness of the study show that students have a good understanding of the entry and physical computing teaching tool and using the combination of the entry and physical computing teaching tool were more effective in learning than the Entry-only coding. In addition, it was confirmed that the effect of Pair programming applied in the physical computing teaching tool.

Implementation and Testing of the WTP Protocol using SDL Tools (SDL 도구를 이용한 WTP 프로토콜의 구현 및 시험)

  • Lee, Hae-Dong;Jung, Ho-Won;Won, Yoo-Jae;Lim, Kyung-Shik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.297-308
    • /
    • 2001
  • In this paper, we design, validate and implement WTP(Wireless Transaction Protocol) using SDT(SDL Design Tool). We do modeling WTP protocol by SDL(Specification and Description Language), design and implement the environment function for the interface between the SDL system and the UDP platform and design APIs(Application Programming Interface). And we do conformance testing for WTP protocol software using ITEX(Interactive TTCN Editor and eXecutor). We write ATS(Abstract Test Suite) by TTCN(Tree and Tabular Combined Notation) and make ETS(Executable Test Suite) by the TTCN compiler supplied by ITEX.

  • PDF

RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing

  • Wang, Zhiqiang;Zhang, Yuqing;Liu, Qixu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1989-2009
    • /
    • 2013
  • How to discover router vulnerabilities effectively and automatically is a critical problem to ensure network and information security. Previous research on router security is mostly about the technology of exploiting known flaws of routers. Fuzzing is a famous automated vulnerability finding technology; however, traditional Fuzzing tools are designed for testing network applications or other software. These tools are not or partly not suitable for testing routers. This paper designs a framework of discovering router protocol vulnerabilities, and proposes a mathematical model Two-stage Fuzzing Test Cases Generator(TFTCG) that improves previous methods to generate test cases. We have developed a tool called RPFuzzer based on TFTCG. RPFuzzer monitors routers by sending normal packets, keeping watch on CPU utilization and checking system logs, which can detect DoS, router reboot and so on. RPFuzzer' debugger based on modified Dynamips, which can record register values when an exception occurs. Finally, we experiment on the SNMP protocol, find 8 vulnerabilities, of which there are five unreleased vulnerabilities. The experiment has proved the effectiveness of RPFuzzer.