Computer Engineering / Bilgisayar Mühendisliği

Permanent URI for this collectionhttps://hdl.handle.net/11147/10

Browse

Search Results

Now showing 1 - 7 of 7
  • Conference Object
    Citation - WoS: 7
    Citation - Scopus: 8
    Models in Graphical User Interface Testing: Study Design
    (Institute of Electrical and Electronics Engineers, 2020) Silistre, Alper; Kılınççeker, Onur; Belli, Fevzi; Challenger, Moharram; Kardaş, Geylani
    Model-based GUI testing is an important concept in Software GUI testing. Manual testing is a time-consuming labor and heavily error-prone. It has several well-accepted models that Software Testing community has been working and contributing to them for many years. This paper reviews different models used in model-based GUI testing and presents a case study with a proposed approach for how to convert several well-accepted models to ESG (Event Sequence Graphs) to generate test cases and execute them with an aim to consolidate past and future works in a single model. © 2020 IEEE.
  • Article
    Citation - WoS: 7
    Citation - Scopus: 9
    Input Contract Testing of Graphical User Interfaces
    (World Scientific Publishing Co. Pte Ltd, 2016) Tuğlular, Tuğkan; Belli, Fevzi; Linschulte, Michael
    User inputs are critical for the security, safety, and reliability of software systems. This paper proposes a new concept called user input contracts, which is an integral part of a design-by-contract supplemented development process, and a model-based testing approach to detect violations of user input contracts. The approach generates test cases from an input contract integrated with graph-based model of user interface specification and applies them to the system under consideration. The paper presents a proof-of-concept tool that has been developed and used to validate the approach by experiments. The experiments are conducted on a web-based system for marketing tourist services to analyze input robustness of system under consideration with respect to user input contracts.
  • Conference Object
    Citation - Scopus: 3
    Grafiksel Kullanıcı Arayüzleri için Düzenli İfade Bazlı Test Kapsama Kriterleri
    (CEUR Workshop Proceedings, 2017) Kılınççeker, Onur; Belli, Fevzi
    Grafiksel Kullanıcı Arayüzleri (GKA), insan-bilgisayar etkileşimi açışından, bilgisayar tabanlı sistemlerin ana bileşenleridir. Bu çalışma, GKA’ların düzenli ifadeler (Dİ; regular expression) ile modellenmesi ve dahası test kapsama (coverage) kriterleri elde edilmesi için yeni bir yaklaşım öne sürmektedir. Verilen GKA, ya doğrudan bir Dİ ile, ya da (pratikte daha çok yapıldığı şekilde) olay bazlı bir yönlü çizge (YÇ; digraph) ile modellenir ve bu YÇ bir Dİ’ye dönüştürülür. Ne var ki bu Dİ semantik bakımından yalnızca olay bazlıdır. Modeli durum açısından zenginleştirmek için Dİ özel bir teknik ile endekslenir. Önerilen yaklaşım, bu endekslenmiş Dİ’yi analiz ederek durum ve olay bazlı test kapsama kriterleri üretir. Ön araştırmalar göstermektedir ki, önerilen yaklaşım, diğerleri ile karşılaştırıldığında, daha özlü (compact) test takımı üretimine olanak sağlamaktadır.
  • Article
    Citation - WoS: 3
    Citation - Scopus: 3
    Model-Based Contract Testing of Graphical User Interfaces
    (Institute of Electronics, Information and Communication Engineers, 2015) Tuğlular, Tuğkan; Linschulte, Michael; Belli, Fevzi; Müftüoğlu, Arda
    Graphical User Interfaces (GUIs) are critical for the security, safety and reliability of software systems. Injection attacks, for instance via SQL, succeed due to insufficient input validation and can be avoided if contract-based approaches, such as Design by Contract, are followed in the software development lifecycle of GUIs. This paper proposes a model-based testing approach for detecting GUI data contract violations, which may result in serious failures such as system crash. A contract-based model of GUI data specifications is used to develop test scenarios and to serve as test oracle. The technique introduced uses multi terminal binary decision diagrams, which are designed as an integral part of decision tableaugmented event sequence graphs, to implement a GUI testing process. A case study, which validates the presented approach on a port scanner written in Java programming language, is presented. Copyright © 2015 The Institute of Electronics, Information and Communication Engineers.
  • Conference Object
    Citation - WoS: 8
    Citation - Scopus: 10
    Model-Based Higher-Order Mutation Analysis
    (Springer Verlag, 2010) Belli, Fevzi; Güler, Nevin; Hollmann, Axel; Suna, Gökhan; Yıldız, Esra
    Mutation analysis is widely used as an implementation-oriented method for software testing and test adequacy assessment. It is based on creating different versions of the software by seeding faults into its source code and constructing test cases to reveal these changes. However, in case that source code of software is not available, mutation analysis is not applicable. In such cases, the approach introduced in this paper suggests the alternative use of a model of the software under test. The objectives of this approach are (i) introduction of a new technique for first-order and higher-order mutation analysis using two basic mutation operators on graph-based models, (ii) comparison of the fault detection ability of first-order and higher-order mutants, and (iii) validity assessment of the coupling effect. © 2010 Springer-Verlag Berlin Heidelberg.
  • Conference Object
    Citation - WoS: 5
    Citation - Scopus: 6
    The 1st Workshop on Model-Based Verification & Validation: Directed Acyclic Graph Modeling of Security Policies for Firewall Testing
    (Institute of Electrical and Electronics Engineers Inc., 2009) Tuğlular, Tuğkan; Kaya, Özgür; Müftüoğlu, Can Arda; Belli, Fevzi
    Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of rules where each rule is represented as a predicate and an action. This paper proposes modeling of firewall rules via directed acyclic graphs (DAG), from which test cases can be automatically generated for firewall testing. The approach proposed follows test case generation algorithm developed for event sequence graphs. Under a local area network setup with the aid of a specifically developed software for this purpose, generated test cases are converted to network test packets, test packets are sent to the firewall under test (FUT), and sent packets are compared with passed packets to determine test result.
  • Conference Object
    Citation - Scopus: 9
    Event-Based Input Validation Using Design-By Patterns
    (Institute of Electrical and Electronics Engineers Inc., 2009) Tuğlular, Tuğkan; Müftüoğlu, Can Arda; Belli, Fevzi; Linschulte, M.
    This paper proposes an approach for validation of numerical inputs based on graphical user interfaces (GUI) that are modeled and specified by event sequence graphs (ESG). For considering complex structures of input data, ESGs are augmented by decision tables and patterns of design by contract (DbC). The approach is evaluated by experiments on boundary overflows, which occur when input values violate the range of specified values. Furthermore, a tool is presented that implements our approach enabling a semiautomatically detection of boundary overflow errors and suggesting correction steps based on DbC.