dc.contributor.author |
Patrikakis, C |
en |
dc.contributor.author |
Kalamaris, T |
en |
dc.contributor.author |
Kakavas, V |
en |
dc.date.accessioned |
2014-03-01T02:42:19Z |
|
dc.date.available |
2014-03-01T02:42:19Z |
|
dc.date.issued |
2003 |
en |
dc.identifier.issn |
15710661 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/30939 |
|
dc.subject |
Component testing |
en |
dc.subject |
COTS |
en |
dc.subject |
Integrated system testing |
en |
dc.subject |
Regression testing |
en |
dc.subject.other |
Fault tolerant computer systems |
en |
dc.subject.other |
Regression analysis |
en |
dc.subject.other |
Specifications |
en |
dc.subject.other |
Component testing |
en |
dc.subject.other |
COTS |
en |
dc.subject.other |
Integrated system testing |
en |
dc.subject.other |
Regression testing |
en |
dc.subject.other |
Testing |
en |
dc.title |
Performing integrated system tests using malicious component insertion |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1016/S1571-0661(04)81021-1 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1016/S1571-0661(04)81021-1 |
en |
heal.publicationDate |
2003 |
en |
heal.abstract |
In this paper, a testing method suitable for strengthening fault tolerance in the event of unexpected situations within a software system is presented. It is based on the idea of testing an integrated system, by substituting system components with other, similar in design and functionality that operate in an erroneous and even malicious manner. The approach adopted, is similar to the concept of inserting a virus within an organization so that the defense mechanisms of the latter can be tested and the necessary lines of defense are formed, so that the virus cannot affect any of the organization critical parts. The focal point is to ensure that in case of a module malfunction, the integrated system will continue to operate, isolating the malfunctioning software at the greatest possible extend, preventing the erroneous behavior from affecting other (and sometimes critical) modules. The testing method proposed is based first on isolated components testing adopting and enhancing the Component Off The Self method, and second on integrated system testing using malicious components that emulate erroneous operation. © 2003 Published by Elsevier B.V. |
en |
heal.journalName |
Electronic Notes in Theoretical Computer Science |
en |
dc.identifier.doi |
10.1016/S1571-0661(04)81021-1 |
en |
dc.identifier.volume |
82 |
en |
dc.identifier.issue |
6 |
en |
dc.identifier.spage |
13 |
en |
dc.identifier.epage |
23 |
en |