VERIFICATION OF PROTOCOL CONFORMANCE TEST CASES USING REACHABILITY ANALYSIS

被引:1
|
作者
NAIK, K
SARIKAYA, B
机构
[1] CONCORDIA UNIV,DEPT ELECT & COMP ENGN,MONTREAL H3G 1M8,QUEBEC,CANADA
[2] BILKENT UNIV,DEPT COMP ENGN & INFORMAT SCI,ANKARA 06533,TURKEY
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1016/0164-1212(92)90018-F
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A methodology is presented to verify manually written test cases against the formal specification of a protocol. Initially, a protocol and a test case are modeled as nondeterministic finite state machines and test case verification is viewed as a reachability analysis problem. An existing reachability analysis algorithm, based on the well-known perturbation technique, is modified to take nondeterminism in protocols and special test case features (timeouts and OTHERWISE events) into account. Correctness aspects of the reachability algorithm are proved. The notion of a synchronization error manifesting in a test case due to the nondeterministic nature of a protocol specification is studied. To verify data flow aspects of test cases, we extend our technique by modeling the test case and protocol specification as extended finite state machines. A test case from a proprietary test suite for the transport protocol Class 2 is taken as an example and is shown to contain several design errors.
引用
收藏
页码:41 / 57
页数:17
相关论文
共 50 条
  • [31] Statistical verification of process conformance based on log equality test
    Bae, Hyerim
    Sim, Sung-hyun
    Choi, Yulim
    Liu, Ling
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 229 - 235
  • [32] PROTOCOL CONFORMANCE TEST-GENERATION USING A GRAPH REWRITING SYSTEM - POSITION STATEMENT
    CAVALLI, A
    KIM, SU
    IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1992, 3 : 285 - 288
  • [33] Development of verification and conformance testing tools for a railway signaling communication protocol
    Lee, Jae-Ho
    Hwang, Jong-Gyu
    Shin, Ducko
    Lee, Kang-Mi
    Kim, Sung-Un
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 362 - 371
  • [34] Protocol validation by simultaneous reachability analysis
    Ozdemir, K
    Ural, H
    COMPUTER COMMUNICATIONS, 1997, 20 (09) : 772 - 788
  • [35] AN IMPROVED PROTOCOL REACHABILITY ANALYSIS TECHNIQUE
    HOLZMANN, GJ
    SOFTWARE-PRACTICE & EXPERIENCE, 1988, 18 (02): : 137 - 161
  • [36] Residual Runtime Verification via Reachability Analysis
    Soueidi, Chukri
    Falcon, Ylies
    VERIFIED SOFTWARE. THEORIES, TOOLS AND EXPERIMENTS, VSTTE 2022, 2023, 13800 : 148 - 166
  • [37] Residual Runtime Verification via Reachability Analysis
    Soueidi, Chukri
    Falcone, Yliès
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2023, 13800 LNCS : 148 - 166
  • [38] Safety verification and reachability analysis for hybrid systems
    Gueguen, Herve
    Lefebvre, Marie-Anne
    Zaytoon, Janan
    Nasri, Othman
    ANNUAL REVIEWS IN CONTROL, 2009, 33 (01) : 25 - 36
  • [39] Parallel Hierarchical Reachability Analysis for Analog Verification
    Lin, Honghuang
    Li, Peng
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [40] Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols
    Meseguer, Jose
    Thati, Prasanna
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 117 : 153 - 182