Security vulnerabilities in computer software testing technology and its application

Author(s):  
Jiang Lan
2011 ◽  
Vol 58-60 ◽  
pp. 1860-1865 ◽  
Author(s):  
Samuel Lukas ◽  
Arnold Aribowo ◽  
Steven Christian Halim

Shikaku is a logic puzzle published by Nikoli at 2005. Shikaku has a very simple rule. This puzzle is played on a rectangular grid. Some of the squares in the grid are numbered. The main objective is to create partitions inside the grid. Each partition must have exactly one number, and the number represents the area of the partition. Then the partition’s shape must be a rectangular or a square. The aim of this research is discussing how can computer software be able to solve the Shikaku problem by implementing heuristic technique and genetics algorithms. Initially the Shikaku problem is inputted into the system. Firstly, the software will solve the problem by applying heuristics methods with some logic rules. All logic rules are created and implemented into the software so that the software can minimize the partitions possibilities to the problem. If this heuristics method still can not solve the problem then genetic algorithms will be executed to find the solution. This paper elaborates from how the problem be modelled and also be implemented until software testing to ensure that the solver worked as expected. The implementation consists of a virtual puzzle board with three different size, genetic algorithms parameters, and ability to create, save, load, and solve puzzle. Software testing is conducted to find how fast the system can solve the problem.


Author(s):  
Anjani Tiwari ◽  
Prof. Jatin Patel ◽  
Dr. Priyanka Sharma

Cloud solutions provide a powerful computing platform that enables individuals and Cloud users to perform a wide range of tasks, such as using an online storage system, implementing business applications, developing customized computer software, and establishing a realistic network environment. The number of people using cloud services has increased dramatically in recent years, and a massive amount of data has been stored in cloud computing environments. As a result, data breaches in cloud services are increasing year after year as a result of hackers who are constantly attempting to exploit cloud architecture's security vulnerabilities. In this paper, we investigate and analyse real-world cloud attacks in order to demonstrate the techniques used by hackers against cloud computing systems and how to prevent such malicious activities.


2020 ◽  
Vol 2 (3) ◽  
Author(s):  
Yongfang Sun ◽  
Jianjun Li

Informationization plays an important role in modern life and production. And various software is one of the bases for it. Before it goes into service, software needs to go through many steps, including software development, design, etc. In software development, test is the key to identify and control bugs and errors in the software. Therefore, software companies often test the software to ensure that it is qualified. In recent years, more attention has been paid to a multi-platform computer software testing method, which can make up for defects in traditional testing methods to improve test accuracy. Firstly, this paper illustrates the connotation and features of software testing. Secondly, common software testing platforms and their requirements are analyzed. Finally, this paper proposes software testing method based on multiple platforms.


Author(s):  
Luca Pivano ◽  
Øyvind Smogeli

This paper summarizes experiences from independent HIL testing of DP system software on more than 80 DP drilling, shuttle tanker, supply, anchor handling, construction and special purpose vessels. The paper includes examples of typical findings and a comprehensive analysis of finding statistics. The analysis shows how errors and weaknesses in core software and system configuration are distributed on the different functions in the DP system, as well as the potential consequence these errors could have had if they had not been identified and solved through early testing. The presented experiences demonstrate that independent testing of control systems using HIL testing technology is an important and effective service to ensure safe and reliable operation of offshore vessels. Paper published with permission.


2014 ◽  
Vol 687-691 ◽  
pp. 1958-1961
Author(s):  
Wei Mei Zou ◽  
Xin Liu

This article briefly describes the background and the advantages of the automatic software testing technology research, summarizes the development, the features, and the research directions of the automatic software testing technology, and then example of analyses the testing process and factors of automatic software testing technology based on the C-ATFM automatic test model.


2021 ◽  
Vol 30 (1) ◽  
pp. 592-603
Author(s):  
Liwei Wang ◽  
Robert Abbas ◽  
Fahad M. Almansour ◽  
Gurjot Singh Gaba ◽  
Roobaea Alroobaea ◽  
...  

Abstract With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given to security. By improving their network security, network administrators have often tried their best. To attempt penetration testing, it is the best way of ensuring the system security. With the development of information technology, the security requirement of information system is increasing day by day. The use of penetration testing technology is conducive to the realization of accurate positioning, accurate detection, and active alarm of security vulnerabilities, and the optimization of monitoring and rectification of the combination of network security management control system. Taking penetration testing technology as one of the core elements of management and control, the risk index model is optimized to make network security management controllable and efficient, and effectively achieve management and control objectives.


Sign in / Sign up

Export Citation Format

Share Document