A Model-Based Testing Approach Combining Passive Conformance Testing and Runtime Verification: Application to Web Service Compositions Deployed in Clouds

Part of the Studies in Computational Intelligence book series (SCI, volume 496)

Abstract

This paper proposes a model-based testing approach which combines two monitoring methods, runtime verification and passive testing. Starting from ioSTS (input output Symbolic Transition System) models, this approach generates monitors to check whether an implementation is conforming to its specification and meets safety properties. This paper also tackles the trace extraction problem by reusing the notion of proxy to collect traces from environments whose access rights are restricted. Instead of using a classical proxy to collect traces, we propose to generate a formal model from the specification, called Proxy-monitor, which acts as a proxy and which can directly detect implementation errors. We apply and specialise this approach on Web service compositions deployed in PaaS environments.

Keywords

Passive Testing Runtime Verification Proxy ioco Web services Clouds 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Andrés, C., Cambronero, M.E., Núñez, M.: Passive testing of web services. In: Bravetti, M. (ed.) WS-FM 2010. LNCS, vol. 6551, pp. 56–70. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  3. 3.
    Arthoa, C., Barringerb, H., Goldbergc, A., Havelundc, K., Khurshidd, S., Lowrye, M., Pasareanuf, C., Rosug, G., Seng, K., Visserh, W., Washingtonh, R.: Combining test case generation and runtime verification. Theoretical Computer Science 336(2-3), 209–234 (2005)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Barringer, H., Gabbay, D., Rydeheard, D.: From runtime verification to evolvable systems. In: Sokolsky, O., Taşıran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 97–110. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Cavalli, A., Benameur, A., Mallouli, W., Li, K.: A Passive Testing Approach for Security Checking and its Practical Usage for Web Services Monitoring. In: NOTERE 2009 (2009)Google Scholar
  6. 6.
    Constant, C., Jéron, T., Marchand, H., Rusu, V.: Integrating formal verification and conformance testing for reactive systems. IEEE Trans. Softw. Eng. 33(8), 558–574 (2007), doi:10.1109/TSE.2007.70707CrossRefGoogle Scholar
  7. 7.
    d’Amorim, M., Havelund, K.: Event-based runtime verification of java programs. In: Proceedings of the Third International Workshop on Dynamic Analysis, WODA 2005, pp. 1–7. ACM, New York (2005), doi:10.1145/1082983.1083249CrossRefGoogle Scholar
  8. 8.
    Falcone, Y., Jaber, M., Nguyen, T.-H., Bozga, M., Bensalem, S.: Runtime verification of component-based systems. In: Barthe, G., Pardo, A., Schneider, G. (eds.) SEFM 2011. LNCS, vol. 7041, pp. 204–220. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  9. 9.
    Frantzen, L., Tretmans, J., Willemse, T.A.C.: Test Generation Based on Symbolic Specifications. In: Grabowski, J., Nielsen, B. (eds.) FATES 2004. LNCS, vol. 3395, pp. 1–15. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Jéron, T., Marchand, H., Rusu, V.: Symbolic determinisation of extended automata. In: Navarro, G., Bertossi, L., Kohayakawa, Y. (eds.) TCS 2006. IFIP, vol. 209, pp. 197–212. Springer, Boston (2006)Google Scholar
  11. 11.
    Lee, D., Chen, D., Hao, R., Miller, R.E., Wu, J., Yin, X.: Network protocol system monitoring: a formal approach with passive testing. IEEE/ACM Trans. Netw. 14, 424–437 (2006)CrossRefGoogle Scholar
  12. 12.
    Nguyen, H.N., Poizat, P., Zaidi, F.: Online verification of value-passing choreographies through property-oriented passive testing. In: Ninth IEEE International Symposium on High-Assurance Systems Engineering, pp. 106–113 (2012)Google Scholar
  13. 13.
    Salva, S.: Passive testing with proxy-testers. International Journal of Software Engineering and Its Applications (IJSEIA). Science & Engineering Research Support Society (SERSC) 5 (2011)Google Scholar
  14. 14.
    Salva, S.: A model-based testing approach combining passive testing and runtime verification. Tech. rep., LIMOS, LIMOS Research report RR13-04 (2013), http://sebastien.salva.free.fr/useruploads/files/RR-13-04.pdf
  15. 15.
    Tretmans, J.: Test generation with inputs, outputs and repetitive quiescence. Software - Concepts and Tools 17(3), 103–120 (1996)MATHGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.LIMOS CNRS UMR 6158University of AuvergneClermont-FerrandFrance
  2. 2.School of EngineeringTan Tao UniversityHo Chi MinhVietnam

Personalised recommendations