Large language models (LLMs) based on transformer architecture have revolutionized natural language processing (NLP), demonstrating excellent capabilities in understanding and generating human-like text. In software E...
详细信息
ISBN:
(纸本)9783031808883;9783031808890
Large language models (LLMs) based on transformer architecture have revolutionized natural language processing (NLP), demonstrating excellent capabilities in understanding and generating human-like text. In softwareengineering, LLMs have been applied in code generation, documentation, and report writing tasks, to support the developer and reduce the amount of manual work. In software Testing, one of the cornerstones of softwareengineering, LLMs have been explored for generating test code, test inputs, automating the oracle process or generating test scenarios. However, their application to high-level testing stages such as system testing, in which a deep knowledge of the business and the technological stack is needed, remains largely unexplored. This paper presents an exploratory study about how LLMs can support system test development. Given that LLM performance depends on input data quality, the study focuses on how to query general purpose LLMs to first obtain test scenarios and then derive test cases from them. The study evaluates two popular LLMs (GPT-4o and GPT-4o-mini), using as a benchmark a European project demonstrator. The study compares two different prompt strategies and employs well-established prompt patterns, showing promising results as well as room for improvement in the application of LLMs to support system testing.
As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. software engineers need to be aware of various security thr...
详细信息
ISBN:
(纸本)9783031783852;9783031783869
As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them. Currently, there is a lack of guidance for software engineers aiming to develop secure web applications. We conducted a design science research study, resulting in a set of guidelines to aid software engineers in developing secure web applications. The set of guidelines was constructed based on interview data with 10 industry practitioners. These guidelines were then evaluated using a survey with 28 respondents. Our results indicate that these proposed guidelines can be applied by software engineers to support the development and assessment of secure web applications in different stages of the software development lifecycle.
作者:
Yang, ShuoLi, HongruGuo, JianECNU
MoE Engn Res Ctr Software Hardware Codesign Technol & Applicat Shanghai Peoples R China ECNU
Shanghai Trusted Ind Internet Software Collaborat Shanghai Peoples R China ECNU
Xinjiang Teachers Coll Shanghai Peoples R China ECNU
Natl Trusted Embedded Software Engn Technol Res C Shanghai Peoples R China
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applicati...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applications, ROS2 is replacing ROS1 at a rapid pace, and its security issues have direct implications for the security of robot systems. This paper presents an exploration and study of the communication security issues of ROS2 by combining CIA triad with the ROS2 communication mechanism. We propose the fundamental security requirements of the ROS2 system under different communication mechanisms and provide formal modeling and definition. Moreover, we classify and analyze network attacks at the ROS2 level and implement a tool, ROS2Tester, to conduct modeling the ROS2 formal security modules, penetration testing and evaluating the security of ROS2 systems.
This paper develops a Smart Public Transportation System using RFID technology, IoT integration, and a MERN-based web application for increasing the efficiency, accessibility, and user experience of urban transit syst...
详细信息
Smart grid technologies can revolutionize power distribution. However, engineers can't write the software to realize this goal without large, publicly available datasets. Power companies are reluctant to share the...
详细信息
A rapid quantitative loading process using a rotating three bucket is proposed and software simulation of the loading process is conducted. Through software simulation, the feeding and unloading of three buckets and b...
详细信息
The main objective of this paper is to demonstrate the complexity and perils of communication patterns between all parties involved throughout the software development life phases. Such communication takes place from ...
详细信息
In traditional approaches to develop softwaresystems that do not have an Artificial Intelligence (AI) or Machine Learning (ML) component, requirements determination activities - also called Requirements engineering (...
详细信息
ISBN:
(纸本)9783031782541;9783031782558
In traditional approaches to develop softwaresystems that do not have an Artificial Intelligence (AI) or Machine Learning (ML) component, requirements determination activities - also called Requirements engineering (RE) - are well-established and researched. When it comes to building softwaresystems with one or more AI/ML components, the process is dependent heavily on data with limited or in some cases no insight into the non-functional requirements of the system's internal workings such as fairness, accountability and transparency, inter alia. In this paper, I review literature to probe how an emphasis on nonfunctional requirements during requirements determination can help address ethical requirements when implementing AI systems. The results show that currently technical experts often emphasize functional requirements more than non-functional requirements. Where they do, the emphasis is still on system-oriented non-functional requirements such as portability, maintainability, opacity, inter alia. However, AI being an interdisciplinary subject, encompassed in a bracket of sociotechnical systems, there is need to revisit this tendency by technical experts. I propose a framework for classifying ethical requirements under non-functional requirements in order to ensure equal emphasis on environment-oriented non-functional requirements such as privacy, fairness, eco-friendly among others. I also argue that the use of a value sensitive design (VSD) approach will help in the implementation of ethical AI systems in order to address ethical concerns from stakeholders. In addition, existing technical literature has focused more on using AI to manage RE activities (AI in RE), yet very limited research has been done on RE for AI systems (RE4AI). Requirements engineering is generally accepted as the most critical and complex process within the development of sociotechnical systems. The literature also confirms that during requirements determination for AI systems (RE4AI), a
Teaching software testing in computer science education faces challenges due to its abstract nature and students’ focus on approaches using paradigms based on rationalism. Exploratory testing, which uses a paradigm b...
详细信息
This paper examines the adoption of Problem-Based Learning (PBL) in the degree of computerengineering at the Faculty of engineering. The study presents the degree structure and the curriculum that integrates competen...
详细信息
暂无评论