Test data generation is always a hot topic in software testing since efficient test data generation method can significantly increase the efficiency of software testing and decrease the cost. Method call relation and ...
详细信息
Test data generation is always a hot topic in software testing since efficient test data generation method can significantly increase the efficiency of software testing and decrease the cost. Method call relation and parameter list are seldom considered in existing test data generation methods for object-oriented programs. In this paper, we present the concept of complete testing chain which stipulates the order of methods to be followed when generating test data for object-oriented programs to guarantee the correctness of test data generation. Basing on this, a framework for test data generation of object-oriented programs is proposed. We discuss encoding paradigm of test data, updating of test data and design of fitness function. For updating of test data, particle swarm optimization is introduced to realize the update of parameter list with genetic algorithm used for method sequence updating. Last but not least, a method to improve the initial population by using generated test data is presented for programs whose branch statements consist of method calls. The results show that the proposed methods can greatly increase the success rate and efficiency of test data generation for object-oriented programs.
To solve the Oracle problem of methods sequence in object-oriented software testing, a method of metamorphic relations constructing for object-oriented software testing based on algebraic specification was proposed. F...
详细信息
To solve the Oracle problem of methods sequence in object-oriented software testing, a method of metamorphic relations constructing for object-oriented software testing based on algebraic specification was proposed. Firstly, metamorphic relations constructing criteria for object-oriented testing was defined based on the characteristics of object-oriented software program. Then metamorphic relations were constructed based on GFT algorithm (Generating a Finite Number of Test Case). Finally the metamorphic relations were improved according to these criteria. The improved method was verified through constructing IntStrack class and SavAcc class metamorphic relations. The experiment results show that the metamorphic relations redundancy is decreased significantly. So the new method has a low metamorphic relations redundancy and improves the efficiency of software testing.
In distributed systems, the smart card based password authentication, as one of the most convenient and efficienttwo-factor authentication mechanisms, is widely used toensure that the protected services are not availa...
详细信息
In distributed systems, the smart card based password authentication, as one of the most convenient and efficienttwo-factor authentication mechanisms, is widely used toensure that the protected services are not available to unauthorized users. Recently, Li et al. demonstrated that the smart card ased password authentication schemeproposed by Chen et al. cannot provide perfect forward secrecy as they claimed. In addition, the password change phase of the scheme is unfriendly and inefficient. Subsequently, Li et al. presented an enhanced smart card based password authentication scheme to overcome the above aws existing in Chen et al.'s scheme. Further more, Kumari and Khan, and Jiang et al. demonstrated that Chen et al.'s scheme cannot resist off-line password guessing attacks, and also proposed an improved scheme, respectively. In this study, we first illustrate that Li et al.'s scheme, and Kumari and Khan's scheme both failto achieve the basicsecurity requirement of the smartcard based password authentication, namely, once the private information stored in the smart card has been extracted, the schemes would be vulnerable to off-line password guessing attacks. We also point out that Jiang etal.'s scheme, as well as Kumari and Khan's scheme cannot provide perfect forward secrecy. Then, we introducea new smart card based password authentication scheme. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot onlyresist various wellknown attacks, but also is more efficient than other related works, and thus is feasible forpractical applications.
The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmiss...
The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today’s anonymous service.
An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on iden...
详细信息
ISBN:
(纸本)9781509016969
An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on identifiable features is proposed, where the identifiable features are specific character sequences left in stego images by steganography tools. The stego and cover images are distinguished according to whether the identifiable features are found in the detected images. Meanwhile, for the case of that multiple identifiable features appeared on the same location of an image, the AC (Aho-Corasick) multi-features matching algorithm is applied to improve the detection speed. In experiments, the detection method is used to detect eight steganography tools such as Invisible Secrets, E-Show, BMP Secrets and so on. The results show that the proposed steganalysis method can achieve a nearly perfect detection precision, and the detection speed can be improved significantly comparing with traditional methods (matching bytes one by one).
An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on iden...
详细信息
Automatic return oriented programming (ROP) technology can effectively improve the efficiency of ROP constructed, but the existing research results still have some shortcomings including needing more address space, ...
详细信息
Automatic return oriented programming (ROP) technology can effectively improve the efficiency of ROP constructed, but the existing research results still have some shortcomings including needing more address space, poor generality. In order to solve these problems, this paper presents an improved ROP auto-constructor QExtd. Firstly, we design a Turing-complete language QExtdL and provide the basis of gadgets analysis. Secondly, we represent the MI instruction and realize precise process of side-effect instructions for improving the efficiency of automatic construction. At last, we establish a three-layer language conversion mechanism, making it convenient for users to construct ROP. Theoretical and experimental data show that the QExtd automatic construction method is much better than the ROPgadget based on syntax. In addition, the proposed method succeeds in constructing gadgets of ROP with the probability of 84% for programs whose sizes are more than 20 KB and whose directory is "/usr/bin" in Ubuntu, which proves that the construction capability improves significantly.
Port hopping is a typical technology in moving target defense which constantly changes communication port number to confuse potential attackers and protect target *** port hopping technology,time synchronization is th...
详细信息
Port hopping is a typical technology in moving target defense which constantly changes communication port number to confuse potential attackers and protect target *** port hopping technology,time synchronization is the key problem to be solved since time synchronization can ensure communication port matching and avoid data loss in port hopping ***,in software defined network(SDN),since its architecture differs from traditional network,port hopping technology hasn't been fully applied in *** on timestamp synchronization,this paper creates a port hopping model in software defined network according to its centralized control,data plane and control plane separation as well as programmable *** timestampbased port hopping model,we design a three-party port synchronization mode by utilizing SDN controller and solve the problems in time synchronization such as clock drift and *** theoretical analysis and experimental results show that this proposed timestamp-based port hopping method can effectively resist Do S attack without adding load on SDN controller in software defined network.
In recent years, many studies on optimization of energy consumption have focused on heterogeneous processor architectures. Heterogeneous computing model composed of CPU and GPU has developed from co-processing between...
详细信息
暂无评论