System Under Test

Author(s):  
Francois Raab
Keyword(s):  
2021 ◽  
Vol 24 (5) ◽  
pp. 902-922
Author(s):  
Алексей Вячеславович Никешин ◽  
Виктор Зиновьевич Шнитман

This paper presents the experience of verifying server implementations of the TLS cryptographic protocol version 1.3. TLS is a widely used cryptographic protocol designed to create secure data transmission channels and provides the necessary functionality for this: confidentiality of the transmitted data, data integrity, and authentication of the parties. The new version 1.3 of the TLS protocol was introduced in August 2018 and has a number of significant differences compared to the previous version 1.2. A number of TLS developers have already included support for the latest version in their implementations. These circumstances make it relevant to do research in the field of verification and security of the new TLS protocol implementations. We used a new test suite for verifying implementations of the TLS 1.3 for compliance with Internet specifications, developed on the basis of the RFC8446, using UniTESK technology and mutation testing methods. The current work is part of the TLS 1.3 protocol verification project and covers some of the additional functionality and optional protocol extensions. To test implementations for compliance with formal specifications, UniTESK technology is used, which provides testing automation tools based on the use of finite state machines. The states of the system under test define the states of the state machine, and the test effects are the transitions of this machine. When performing a transition, the specified impact is passed to the implementation under test, after which the implementation's reactions are recorded and a verdict is automatically made on the compliance of the observed behavior with the specification. Mutational testing methods are used to detect non-standard behavior of the system under test by transmitting incorrect data. Some changes are made to the protocol exchange flow created in accordance with the specification: either the values of the message fields formed on the basis of the developed protocol model are changed, or the order of messages in the exchange flow is changed. The protocol model allows one to make changes to the data flow at any stage of the network exchange, which allows the test scenario to pass through all the significant states of the protocol and in each such state to test the implementation in accordance with the specified program. So far, several implementations have been found to deviate from the specification. The presented approach has proven effective in several of our projects when testing network protocols, providing detection of various deviations from the specification and other errors.


2015 ◽  
Vol 10 (2) ◽  
pp. 145-153
Author(s):  
Yin Chen ◽  
Zhizhong Ding ◽  
Dingliang Wang ◽  
Teng Huang

2018 ◽  
Vol 9 (8) ◽  
pp. 1579-1582
Author(s):  
Abhinandan H. Patil ◽  
Neena Goveas ◽  
Krishnan Rangarajan

Combinatorial testing is a practical method to test software with multiple input parameters. National Institute of Standards and Technology has developed tools which aid combinatorial testing. ACTS is one such tool which is freely available to users. In spite of this, very few software being developed are being tested systematically. In this paper we explore the effectiveness and suitability of ACTS tool to test software which has a m ultiparameter input. We chose a Java based software, College Time Table, a software which involves multiparameter input, as system under test. We could achieve 90% coverage of instructions, line, method and 100% class coverage with practical time and effort with ACTS tool. The process involved in getting above mentioned results is documented in this paper. Empirical data generated with the code coverage confirms the effectiveness of ACTS generated test suite for a simple project.


Energies ◽  
2021 ◽  
Vol 14 (8) ◽  
pp. 2113
Author(s):  
Jacopo Colussi ◽  
Alessandro La Ganga ◽  
Roberto Re ◽  
Paolo Guglielmi ◽  
Eric Armando

This paper presents the experimental validation, using the opposition method, of a high-power three-phase Wireless-Power-Transfer (WPT) system for automotive applications. The system under test consists of three coils with circular sector shape overlapped to minimize the mutual cross-coupling, a three-phase inverter at primary side and a three-phase rectifier at receiver side. In fact thanks to the delta configuration used to connect the coils of the electromagnetic structure, a three-phase Silicon Carbide (SiC) inverter is driving the transmitter side. The resonance tank capacitors are placed outside of the delta configuration reducing in this way their voltage sizing. This WPT system is used as a 100 kW–85 kHz ultrafast battery charger for light delivery vehicle directly supplied by the power grid of tramways. The adopted test-bench for the WPT charger consists of adding circulating boost converter to the system under test to perform the opposition method technique. The experimental results prove the effectiveness of the proposed structure together with the validation of fully exploited simulation analysis. This is demonstrated by transferring 100 kW with more than 94% DC-to-DC efficiency over 50 mm air gap in aligned conditions. Furthermore, testing of Zero-Current and Zero-Voltage commutations are performed to test the performance of SiC technology employed.


2021 ◽  
Author(s):  
Alexei Viacheslavovich Nikeshin ◽  
Victor Zinovievich Shnitman

This paper presents the experience of verifying server implementations of the TLS cryptographic protocol version 1.3. TLS is a widely used cryptographic protocol designed to create secure data transmission channels and provides the necessary functionality for this: confidentiality of the transmitted data, data integrity, and authentication of the parties. The new version 1.3 of the TLS protocol was introduced in August 2018 and has a number of significant differences compared to the previous version 1.2. A number of TLS developers have already included support for the latest version in their implementations. These circumstances make it relevant to do research in the field of verification and security of the new TLS protocol implementations. We used a new test suite for verifying implementations of the TLS 1.3 for compliance with Internet specifications, developed on the basis of the RFC8446, using UniTESK technology and mutation testing methods. The current work is part of the TLS 1.3 protocol verification project and covers some of the additional functionality and optional protocol extensions. To test implementations for compliance with formal specifications, UniTESK technology is used, which provides testing automation tools based on the use of finite state machines. The states of the system under test define the states of the state machine, and the test effects are the transitions of this machine. When performing a transition, the specified impact is passed to the implementation under test, after which the implementation's reactions are recorded and a verdict is automatically made on the compliance of the observed behavior with the specification. Mutational testing methods are used to detect non-standard behavior of the system under test by transmitting incorrect data. Some changes are made to the protocol exchange flow created in accordance with the specification: either the values of the message fields formed on the basis of the developed protocol model are changed, or the order of messages in the exchange flow is changed. The protocol model allows one to make changes to the data flow at any stage of the network exchange, which allows the test scenario to pass through all the significant states of the protocol and in each such state to test the implementation in accordance with the specified program. So far, several implementations have been found to deviate from the specification. The presented approach has proven effective in several of our projects when testing network protocols, providing detection of various deviations from the specification and other errors.


Sign in / Sign up

Export Citation Format

Share Document