Fast Abstract Papers

ID   Fast Abstract Title
143   Minimally Invasive Data Concealment in NTFS
166   Operational Profile-based Test Suite Generation using a Genetic Algorithm
173   Software Reliability Assessment for a Gearbox Controller by Analysis of Operating Experience
179   EEstimation of Software Testing Effort: An Intelligent Approach
180   Business Rules Separation and Reuse Using MDA, OWL and AspectJ
181   Early Software Reliability Prediction Using ANN for Process Oriented Development at Prototype Level
188   Application of Virtual Machine in Embedded Software Simulation Testing
194   Verification of Safety-Critical Software Requirement Based on Petri-Net Model Checking
198   Random Testing with Dynamically Updated Test Profile
200   Comparative study on threat identification techniques for dependability requirements
207   Survivability Model for Voice over Internet Protocol using Markov Regenerative Process
213   A User Friendly Software Reliability Analysis Tool based on Development Process to Iteratively Manage Software Reliability
214   A Resource Allocation Framework for the Predictable Continuity of Mission-Critical Network Services
223   Software Testing Technique Based on an Extended Pushdown Automaton for Undo/Redo Functions
225   Control theoretic approach for the Reduction of RTT in a distributed system
226   Software Assurance Arguments vs. Formal Mathematical Arguments – A Complementary Role
229   Integrating the content security with the QoS in data networks
231   Data Network performance modeling and control through prediction feedback
233   OS Driver Test Effort Reduction via Operational Profiling
237   Impact of Error Models on OS Robustness Evaluations
238   A Test Generation Algorithm for 3-Way Software Testing
239   Using software health and quality indicators
251   Constrained Covering Arrays: Resolving invalid level combination constraints
261   Micro Process Adherence for Delivering Reliable Software
265   Effective Unit test Design and Automated Debugging
266   A Study on SFMEA method for UML-based Software

 

 

 
Paper ID: 143
Title: Minimally Invasive Data Concealment in NTFS
Track Name: Fast Abstracts
Abstract: Data protection is becoming increasingly important as electronic data permeates our society. Numerous techniques have been proposed to deal with this issue, but most such techniques suffer the drawbacks of low efficiency in time/space, algorithmic complexity, pervasive modification or even out right replacement of existing file systems. This paper describes a minimally invasive data concealment scheme that works on NTFS. The proposed scheme makes a tiny modification to existing NTFS structure and combines light-weight random data scrambling to provide secure data storage with high efficiency and easy operation.
Author Names: Xiashen Gu*, Shanghai Jiaotong University
Hengming Zou, Shanghai Jiaotong University
Author Emails : guxiashen AT gmail.com, zou AT sjtu.edu.cn
Subject Areas: Security*
Systems

Back to the top


Paper ID: 166
Title: Operational Profile-based Test Suite Generation using a Genetic Algorithm
Track Name: Fast Abstracts
Abstract: This paper shows that a test suite (a set of testcases) that enables software test engineers to rapidly and comprehensively execute software features of high use probability is generated from an operational profile by using a genetic algorithm. Test suites are represented as chromosomes, and genetic operations such as crossover, mutation and selection are applied to them. Usage distribution coverage (UDC) is used for evaluating the fitness of chromosomes. We have developed a tool for automating this method, and showed a simple example.
Author Names: Tomohiko Takagi*, Kagawa University
Author Emails : takagi AT eng.kagawa-u.ac.jp
Subject Areas: Validation, Verification and Testing*

Back to the top


Paper ID: 173
Title: Software Reliability Assessment for a Gearbox Controller by Analysis of Operating Experience
Track Name: Fast Abstracts
Abstract: This contribution summarizes the results of an

ongoing feasibility study based on the evaluation of

operational experience gained with a gearbox system for

the purpose of estimating software reliability.
Author Names: Sven Söhnlein*, University Erlangen-Nuremberg
Francesca Saglietti, University Erlangen-Nuremberg
Author Emails : soehnlein AT informatik.uni-erlangen.de
saglietti AT informatik.uni-erlangen.de
Subject Areas: Reliability, Analysis and Measurement*

Back to the top


Paper ID: 179
Title: EEstimation of Software Testing Effort: An Intelligent Approach
Track Name: Fast Abstracts
Abstract: Software Testing is an important process of software development that is performed to support and enhance reliability and quality of the software. Studies indicate that 40-50 percent of the cost of software development is devoted to testing, with the percentage for testing critical software being even higher. This poster makes an attempt to estimate reliable software testing effort using fuzzy logic.
Author Names: Praveen Srivastava*, Bits
Author Emails : praveenrsrivastava AT gmail.com
Subject Areas: Software Quality and Metrics*
Validation, Verification and Testing

Back to the top


>

Paper ID: 180
Title: Business Rules Separation and Reuse Using MDA, OWL and AspectJ
Track Name: Fast Abstracts
Abstract: Two important challenges for MDA designers are to make business rules independent of the specific platform model and to ensure the resulting implementation does not violate the specified properties in the application domain. In this paper we present an approach that allows developers to both describe and corroborate domain properties at run time. In our approach, an ontology specifies domain properties and translates it to aspectoriented code. The implementation code could be automatically merged. As a result, we will be able to perform approval tests at runtime and to create business rules reused in other MDA specific models. This novel approach shall be evaluates in a toolkit for reengineering an industrial furnace management application.
Author Names: Jaguaraci Silva*, Federal University of Bahia
Luciano Barreto, Federal University of Bahia
Author Emails : jaguarac AT ufba.br
lportoba AT ufba.br
Subject Areas: System Architecture
Validation, Verification and Testing
Modeling*

Back to the top


Paper ID: 181
Title: Early Software Reliability Prediction Using ANN for Process Oriented Development at Prototype Level
Track Name: Fast Abstracts
Abstract: It is important to take into account the proven processes like Rational Unified Process (RUP) to mitigate risks and increase the reliability of systems while building distributed based applications. This paper presents an algorithm using feed-forward neural network for early qualitative software reliability prediction. The inputs for neural networks consist of techno-complexity, practitioner’s level, creation effort, size and leakage defects. The number of defects detected in each cycle can be predicted by using Artificial Neural Network (ANN).
Author Names: Kovur Krishna Mohan*, IIT Bombay
Author Emails : kkm AT ee.iitb.ac.in
Subject Areas: Modeling
Reliability, Analysis and Measurement*

Back to the top


Paper ID: 188
Title: Application of Virtual Machine in Embedded Software Simulation Testing
Track Name: Fast Abstracts
Abstract: Testing embedded software is a hotpot in nowadays computer software testing field. Embedded software simulation testing environment (ESSTE) is recognized widely an effective approach to the system testing of embedded software, but there are some problems such as transportability and generality in the realization of ESSTE. In this paper, based on the design of embedded software simulation testing virtual machine (ESSTVM), an example of ESSTVM is designed, namely avionics system testing virtual machine (ASTVM), including architecture, testing development environment and testing execution system. The design and realization of ASTVM indicates that the ESSTVM proposed in this paper can overcome the limitations of the generality, transportability of ESSTE.
Author Names: Yongfeng Yin*, Beihang University
Author Emails : yyf AT buaa.edu.cn
Subject Areas: Software Quality and Metrics*
Validation, Verification and Testing

Back to the top


Paper ID: 194
Title: Verification of Safety-Critical Software Requirement Based on Petri-Net Model Checking
Track Name: Fast Abstracts
Abstract: Formal modeling and software requirement verification could improve dependability of safety-critical software. Model checking technology is widely recognized by industry. It has the advantage of a flexible input language, but its capabilities of debugging, graphical modeling and interpretation are limited. Petri net is a strictly defined formal modeling approach. In this paper, the semantics of Petri net can be extended and mapped to adapt to the modeling and verification of software requirements.
Author Names: Ma Ning*, Beihang University
Bao Xiaohong, BeiHang University
LI Zhen, Beihang University
Haifeng Li, Beihang University
Author Emails : maning AT dse.buaa.edu.cn
baoxh AT buaa.edu.cn
buaa011lz AT 163.com
lihaifeng AT dse.buaa.edu.cn
Subject Areas: Validation, Verification and Testing*
Modeling

Back to the top


Paper ID: 198
Title: Random Testing with Dynamically Updated Test Profile
Track Name: Fast Abstracts
Abstract: Random testing is popular in the area of software testing and often serves as a benchmark technique in comparison with other software testing techniques. Suppose that the input domain of the software under test is divided into classes. Random testing often assumes that the underlying test profile is defined as {p1,p2,...,pm}, which may be a uniform or non-uniform probability distribution. That is, a test case is selected from class i with a constant probability pi during software testing. In this paper, we follow the idea of software cybernetics and propose a concise yet effective technique of dynamic random testing (DRT). The test profile is dynamically updated during software testing by using feedback information. Case studies with two subject programs show that the proposed technique is encouraging in comparison with random testing technique and an adaptive testing technique.
Author Names: Kai-Yuan Cai, Beijing University of Aeronautics and Astronautics China
Hai Hu*, Beijing University of Aeronautics and Astronautics
Changhai Jiang, Beijing University of Aeronautics and Astronautics
Feng Ye, BUAA
Author Emails : kycai AT buaa.edu.cn
huhai.orion AT gmail.com
changhai.jiang AT gmail.com
yefeng850115 AT gmail.com
Subject Areas: Validation, Verification and Testing*

Back to the top


Paper ID: 200
Title: Comparative study on threat identification techniques for dependability requirements
Track Name: Fast Abstracts
Abstract: The elicitation of dependability requirements for dependable software systems is traditionally performed with a variety of mostly unrelated analysis techniques from distinct domains. The techniques should offer both a structured way to identify important dependability attributes of the system, and enabling creativity among the participants on identifying as many of these attributes as possible. In this paper we compare two identification techniques from the safety domain and one technique from the security domain. The aim is to look at the advantages and disadvantages of the techniques up against the preliminary identification of threats and means to sustain dependability. Another aspect is to emphasize what the safety and security domains can learn from each other with respect to identifying dependability issues for requirements elicitation.
Author Names: Christian Raspotnig*, Institute for energy technolog
Author Emails : christian.raspotnig AT hrp.no
Subject Areas: Modeling
Reliability, Analysis and Measurement
Security*
Systems

Back to the top


Paper ID: 207
Title: Survivability Model for Voice over Internet Protocol using Markov Regenerative Process
Track Name: Fast Abstracts
Abstract: This draft is for fast abstact. hence no abstract.
Author Names: Resham Vinayak, IIT Delhi
Dharmaraja Selvamuthu*, IIT Delhi
Author Emails : resham.iitd AT gmail.com
dharmar AT maths.iitd.ac.in
Subject Areas: Reliability, Analysis and Measurement
Modeling*

Back to the top


Paper ID: 213
Title: A User Friendly Software Reliability Analysis Tool based on Development Process to Iteratively Manage Software Reliability
Track Name: Fast Abstracts
Abstract: Software Reliability has been regarded as one of the important quality attributes because low reliable software systems have high possibilities of causing serious problems such as the loss of human life, catastrophic mission failures, and the waste of valuable resource investments. In order to improve software reliability, the degree of current software reliability needs to be measured and managed by using an automated evaluation tool in a convenient way throughout the whole SDLC (Software Development Life Cycle). However, general open tools such as CASRE (Computer Aided Software Reliability Estimation) and SMERFS (Statistical Modeling and Estimation of Reliability Functions for Software) cannot be used within the early SDLC phases. In order to improve the drawbacks of the open tools, we developed the SRTpro (Software Reliability Tool professional) which can predict and estimate software reliability throughout the whole SDLC in a convenient way.
Author Names: Myungmuk Kang*, KAIST
Taewan Gu,
Jongmoon Baik,
Author Emails : mmkang AT kaist.ac.kr
gutaewan AT kaist.ac.kr
jbaik AT kaist.ac.kr
Subject Areas: None of the above*
Reliability, Analysis and Measurement

Back to the top


Paper ID: 214
Title: A Resource Allocation Framework for the Predictable Continuity of Mission-Critical Network Services
Track Name: Fast Abstracts
Abstract: User of mission-critical (MC) network services such as telesurgery demands high degree of predictability as the seamless transportation of information in real time is necessitated. This paper introduces a resource allocation framework considering network reliability as a measure of the system’s ability to provide deterministic and accurate delivery of information as per McCabe [2]. Proposed framework is able to support the uninterrupted delivery of information from the source to the destination end.
Author Names: Rajiv Kumar*, Jaypee Uni. of Inf. Tech., Wkn
Author Emails : rjv.ece AT gmail.com
Subject Areas: None of the above*

Back to the top


Paper ID: 223
Title: Software Testing Technique Based on an Extended Pushdown Automaton for Undo/Redo Functions
Track Name: Fast Abstracts
Abstract: We propose a new testing technique for undo/redo functions (UR functions) that play an important role in realizing the usability of software. In this technique, an extended pushdown automaton (ePDA) that is a state machine with two stacks for UR functions is used for defining software specifications and generating testcases. This paper shows the overview of UR functions, the definitions of an ePDA and coverage criteria, a simple example, and so on.
Author Names: Tomohiko Takagi*, Kagawa University
Author Emails : takagi AT eng.kagawa-u.ac.jp
Subject Areas: Validation, Verification and Testing*

Back to the top


Paper ID: 225
Title: Control theoretic approach for the Reduction of RTT in a distributed system
Track Name: Fast Abstracts
Abstract: In a distributed system, the demand for live content over the network has increased multifold, throwing open the challenge of meeting the stringent quality of service(QoS) parameters such as delay, loss rate etc. In interactive applications, the in-time response is very important to render a pleasant user experience. In such scenarios, the round trip time (RTT) represents the lower bound on the response time and directly affects the performance of the system. RTT plays a crucial role in shaping the network traffic as it encompasses all the parameters such as buffer dynamics and transmission window. The traffic shaper essentially controls this parameter directly or indirectly. In this paper, a method has been described to reduce the RTT.
Author Names: Manjunath Iyer*, Philips
Shyam VasudevRao, Philips
Author Emails : manjunath.ramachandra AT philips.com
shyam.vasudev AT philips.com
Subject Areas: Systems
System Architecture
Modeling*

Back to the top


Paper ID: 226
Title: Software Assurance Arguments vs. Formal Mathematical Arguments – A Complementary Role
Track Name: Fast Abstracts
Abstract: This paper discusses the complementary role of software assurance arguments and formal mathematical arguments in justifying the achievement of safety and reliability properties within critical applications. This paper reviews the theoretical foundation of this area and proposes a way forward for combining the use of these two forms of arguments in systems and software engineering.
Author Names: Ibrahim Habli*, University of York
Zoe Stephenson, University of York
Author Emails : ihabli AT cs.york.ac.uk
zoe AT cs.york.ac.uk
Subject Areas: Formal Methods
Empirical Studies
Software Quality and Metrics*
Reliability, Analysis and Measurement

Back to the top


Paper ID: 229
Title: Integrating the content security with the QoS in data networks
Track Name: Fast Abstracts
Abstract: In a traffic flow, it is important to maintain the end to end data security. An attack on the network results in poor user experience. Security of the data in a flow to a greater extent depends up on the vulnerability and availability of the data for the hackers or attacks. By reducing the data or the stranded time at every hop, it is possible to provide a better security for the data. In this paper, security is treated as a service parameter. The goal of this parameter is to reduce the stranded time in each hop and the number of hops in the path; while the delay parameter aims at the reduction of the overall delay in the path. To enhance the security, the data to be transferred is divided in to multiple independent flows. Such an organization of the data would be extremely useful in peer to peer or mesh networks. The different flows are expected to follow independent paths. In this paper, a method is explored to reduce the vulnerability of a packet for hacking by reducing the available duration of the packet in the network.
Author Names: Manjunath Iyer*, Philips
Selva Palaniyappan,
Narendranath Udupa,
Author Emails : manjunath.ramachandra AT philips.com
selvakkumar.palaniyappan AT philips.com
narendranath.udupa AT philips.com
Subject Areas: Modeling
Security*
Systems

Back to the top


Paper ID:   231
Title:   Data Network performance modeling and control through prediction feedback
Track Name:   Fast Abstracts
Abstract:   Performance modeling of a network is challenging especially when it involves multimedia traffic. The present day networks extensively make uses of the internet for the content transfer in real time. In such a communication system, reliability and in time data transfer is critical. The system has to support the streaming of the content data from the mobile to infrastructure and vice versa. In this paper, a modeling method for the network and its traffic shaping is introduced and simulation model is provided. The performance with this model is analyzed.
Author Names:   Manjunath Iyer*, Philips
Shyam VasudevRao, Philips
Author Emails :   manjunath.ramachandra AT philips.com
shyam.vasudev AT philips.com
Subject Areas:   Systems
Reliability, Analysis and Measurement
Modeling*

Back to the top


Paper ID: 233
Title: OS Driver Test Effort Reduction via Operational Profiling
Track Name: Fast Abstracts
Abstract: Operating Systems (OS’s) constitute the operational core for computing devices, and consequently, the OS’s ability to sustain operations determines the dependability level of the provided system services. In order to facilitate their applicability to a variety of hardware platforms, OS’s have evolved into complex, componentized software entities whose key function is to provide applications access to the system’s hardware resources. Within the OS, the key components dominating the cause of OS failures are the device drivers (DDs), precisely the OS parts designed to enhance the OS’s support for hardware. Unfortunately, despite intensive efforts to elevate DD’s robustness levels by employing varied test paradigms, the existing DDs still exhibit very high failure rates. Obviously, testing the complete state space of a DD is neither technically or economically viable. Based on our empirical DD evaluations, we conjecture that the testing deficiencies are the consequence of missing key parts of the DD’s operational states in the process of testing.
Author Names: Constantin Sarbu*, TU Darmstadt
Stefan Winter, TU Darmstadt
Nachiappan Nagappan, Microsoft Research
Neeraj Suri, TU Darmstadt
Author Emails : cs AT cs.tu-darmstadt.de
sw AT cs.tu-darmstadt.de
nachin AT microsoft.com
suri AT cs.tu-darmstadt.de
Subject Areas: Validation, Verification and Testing
Reliability, Analysis and Measurement
Empirical Studies*

Back to the top


Paper ID: 237
Title: Impact of Error Models on OS Robustness Evaluations
Track Name: Fast Abstracts
Abstract: Operating Systems (OSs) are mediators between application specific software (SW) and general purpose hardware (HW). For the operational delivery of OS services, device drivers (DDs) have increasingly been identified as a prominent cause of OS failures. Multiple research efforts, including ours, have targeted the robustness evaluation of commercial OSs's DD interfaces, for which robustness evidence is usually difficult to obtain due to the limited amount of available information about the OS's internal structure or its development process. A widely used approach for robustness evaluation is the application of experimental software implemented fault injection (SWIFI) techniques to expose the DD interface to operational conditions which explicitly violate its specification. A key factor determining the effectiveness of SWIFI is the selection of the most relevant error model.
The goal of our research is to investigate how the choice of an error model can influence the outcome of robustness evaluations. The results of such an investigation are useful in several ways. If, for instance, one error model can be shown to detect more vulnerabilities with less effort, it is advisable to choose this model over less efficient models for systematic vulnerability detection. If, on the other hand, the evaluations of two distinct models are highly similar, the less costly model (in terms of implementation, setup, and run time effort) can be justifiably substituted for the more expensive one. Furthermore, a comparative evaluation of error models provides guidance on error model selection for evaluation efficiency optimization to system engineers.
Author Names: Stefan Winter*, TU Darmstadt
Constantin Sarbu, TU Darmstadt
Andréas Johansson, Volvo Technology Corporation
Neeraj Suri, TU Darmstadt
Author Emails : sw AT cs.tu-darmstadt.de
cs AT cs.tu-darmstadt.de
andreas.olof.johansson AT volvo.com
suri AT cs.tu-darmstadt.de
Subject Areas: Empirical Studies
Reliability, Analysis and Measurement*
Validation, Verification and Testing

Back to the top


Paper ID: 238
Title: A Test Generation Algorithm for 3-Way Software Testing
Track Name: Fast Abstracts
Abstract: In the 21 st century our society is becoming more and more dependent on software systems. The safety of these systems and the quality of our lives is increasingly dependent on the quality of such systems. A key element in the manufacture and quality assurance process in software engineering is the testing of software systems. Empirical results show that 2-way or pair-wise testing is efficient for various types of software systems. But software failures may be caused by interactions of more than two parameters. In this paper, we propose recursive technique to generate test cases for 3-way testing when all parameters can take the same number of values. 3-way testing requires that for a given number of input parameters to the system, each possible combination of values for any three parameters be covered by at least one test case.
Author Names: Soumen Maity*, Indian Institute of Science ER
Author Emails : soumen AT iiserpune.ac.in
Subject Areas: Validation, Verification and Testing*

Back to the top


Paper ID: 239
Title: Using software health and quality indicators
Track Name: Fast Abstracts
Abstract: We describe our present and ongong research work on software reliability and quality evaluation. It is based on monitoring various facets of the system operation. In particular we use event, application and performance logs. This approach has been sucessfuly used in transaction oriented applications operating in a distributed environment. The paper addresses the problem of selecting the most sensitive indicators and predicting operational problems taking into account software errors, configuration inconsistences and environment changes in time.
Author Names: Janusz Sosnowski*, Institute of Computer Science
Author Emails : jss AT ii.pw.edu.pl
Subject Areas: Reliability, Analysis and Measurement*
Empirical Studies

Back to the top


Paper ID: 251
Title: Constrained Covering Arrays: Resolving invalid level combination constraints
Track Name: Fast Abstracts
Abstract: Covering arrays have been widely advocated as a mechanism to derive suites of test cases that ensure a pre-determined level of coverage at minimal cost. Although these constructs have been extensively studied for over twenty years, relatively little of this effort has addressed the issue of resolving input parameter constraints. This paper addresses that issue by extending the replace strategy presented by Grindal et al.

Author Names: Joseph Morgan*, SAS Institute Inc
Author Emails : Joseph.Morgan AT sas.com
Subject Areas: Modeling
Validation, Verification and Testing*

Back to the top


Paper ID: 261
Title: Micro Process Adherence for Delivering Reliable Software
Track Name: Fast Abstracts
Abstract: With quality and timely delivery of software becoming ever more vital, ensuring that development processes for building high quality code are adhered to has become important. However the problem project managers face is in verifying if developers are actually adhering to the recommended processes pertaining to activities they perform at their workstations, which can be termed as micro processes. This lack of insight often leads to developers bypassing the development micro processes thereby reducing the quality and reliability of the checked-in code.
We present an approach to provide enhanced visibility to the project manager based on capturing the occurrence of relevant activities performed in the developer IDEs and related tools and then analysing the set of events to identify the deviation of the pattern of these set of events from a defined model of micro-processes. We discuss our current prototype implementation and the benefits that we foresee from this work.
Author Names: Vibhu Sharma*, Accenture
Vikrant Kaulgud, Accenture
Author Emails : vibhu.sharma AT accenture.com
vikrant.kaulgud AT accenture.com
Subject Areas: Software Quality and Metrics*
Modeling
Empirical Studies

Back to the top


Paper ID: 265
Title: Effective Unit test Design and Automated Debugging
Track Name: Fast Abstracts
Abstract: There exist several unit test tools such as JUnit, however, besides the suggestion that assertions can be specified to reflect properties that must be satisfied at different program points, there is no guidance to testers and developers about how to design tests effectively that can be used with such tools. This paper provides a systematic basis for testing a component or a function by defining each test to be a partitioned < pre-condition, postcondition > pair. Automated debugging is also possible by computing the actual program states in the forward direction and the hypothesized program states in the backward direction and identifying the statement where an error is present.
Author Names: PVR Murthy*, Siemens Corporate Technology
Author Emails : pvr.murthy AT siemens.com
Subject Areas: Formal Methods
Validation, Verification and Testing*
Program Analysis

Back to the top


Paper ID: 266
Title: A Study on SFMEA method for UML-based Software
Track Name: Fast Abstracts
Abstract: As one of the most important methods used to improve software reliability and safety, Software Failure Modes and Effects Analysis (SFMEA) has been increasingly applied to many fields. Meanwhile, the Unified Modeling Language (UML) has become the main design language for Object-Oriented software, with Rational Unified Process(RUP) as the most often used development process model. While traditional methods of SFMEA are not suitable for software developed in UML. In this paper, we present a method of SFMEA applicable to UML-based software, covering the main workflows in RUP, e.g. requirement, analysis and design workflow.
Author Names: Hong Zhang*, Beihang University
Author Emails : zh AT buaa.edu.cn
Subject Areas: Reliability, Analysis and Measurement*

Back to the top