TTCN-3 Bibliography |
Johansson, W., Svensson, M., E. Larson, U., Almgren, M., & Gulisano, V. (2014). T-fuzz: model-based fuzzing for robustness testing of telecommunication protocols. Cleveland, OH, USA: IEEE Seventh International Conference on Software Testing, Verification and Validation (ICST). Added by: TET group (23/06/2015, 14:39) Last edited by: TET group (23/06/2015, 16:00) |
Resource type: Book DOI: doi:10.1109/ICST.2014.45 ID no. (ISBN etc.): ISBN:978-1-4799-2255-0 BibTeX citation key: Johansson2014 View all bibliographic details |
Categories: General Keywords: fuzz testing, security, telecommunications, Titan, TTCN-3 Creators: Almgren, Gulisano, Johansson, E. Larson, Svensson Publisher: IEEE Seventh International Conference on Software Testing, Verification and Validation (ICST) (Cleveland, OH, USA) Collection: |
Views: 47/2252
|
Abstract |
Telecommunication networks are crucial in today's society since critical socio-economical and governmental functions depend upon them. High availability requirements, such as the "five nines" uptime availability, permeate the development of telecommunication applications from their design to their deployment. In this context, robustness testing plays a fundamental role in software quality assurance. We present T-Fuzz - a novel fuzzing framework that integrates with existing conformance testing environment. Automated model extraction of telecommunication protocols is provided to enable better code testing coverage. The T-Fuzz prototype has been fully implemented and tested on the implementation of a common LTE protocol within existing testing facilities. We provide an evaluation of our framework from both a technical and a qualitative point of view based on feedback from key testers. T-Fuzz has shown to enhance the existing development already in place by finding previously unseen unexpected behaviour in the system. Furthermore, according to the testers, T-Fuzz is easy to use and would likely result in time savings as well as more robust code.
|
Notes |
pp: 323-332
See also: http://www.computer.org/csdl/proceedings/icst/2014/2255/00/5185a323-abs.html |