Eliane Martins
State University of Campinas
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Eliane Martins.
dependable systems and networks | 2002
Eliane Martins; Cecília M. F. Rubira; Nelson G. M. Leme
Jaca is a software fault injection tool that validates OO applications written in Java. Jacas major goal is to inject faults using high-level programming features during runtime by corrupting attribute values, methods parameters or return values. Jacas design was based on a set of patterns-the fault injection pattern system. This pattern describes a generic architecture defined from recurrent design aspects present in most fault injection tools. The objective was to reduce tool development time while enhancing qualities such as portability, extensibility, reusability, efficiency and robustness. The paper presents the pattern set and its use in Jacas development. An extension of Jaca to consider injection at the assembly level is also presented to show how easy it is to add new features to the tool.
european dependable computing conference | 2006
Regina Lúcia de Oliveira Moraes; Ricardo Barbosa; João Durães; Naaliel Mendes; Eliane Martins; Henrique Madeira
The injection of interface faults through API parameter corruption is a technique commonly used in experimental dependability evaluation. Although the interface faults injected by this approach can be considered as a possible consequence of actual software faults in real applications, the question of whether the typical exceptional inputs and invalid parameters used in these techniques do represent the consequences of software bugs is largely an open issue. This question may not be an issue in the context of robustness testing aimed at the identification of weaknesses in software components. However, the use of interface faults by API parameter corruption as a general approach for dependability evaluation in component-based systems requires an in depth study of interface faults and a close observation of the way internal component faults propagate to the component interfaces. In this paper we present the results of experimental evaluation of realistic component-based applications developed in Java and C using the injection of interface faults by API parameter corruption and the injection of software faults inside the components by modification of the target code. The faults injected inside software components emulate typical programming errors and are based on an extensive field data study previously published. The results show the consequences of internal component faults in several operational scenarios and provide empirical evidences that interface faults and software component faults cause different impact in the system
computer software and applications conference | 2006
Valdivino Santiago; A.S.M. do Amaral; Nandamudi Lankalapalli Vijaykumar; Md.F. Mattiello-Francisco; Eliane Martins; O.C. Lopes
This paper presents an approach for automated test case generation using a software specification modeled in statecharts. The steps defined in such approach involve: translation of statecharts modeling into an XML-based language; and the PerformCharts tool generates FSMs based on control flow. These FSMs are the inputs for the Condado tool which generates test cases. The idea is to demonstrate that by using a higher-level technique, such as Statecharts, complex software can be represented with clarity and rich details. A case study was on an implementation of a protocol specified for communication between a scientific experiment and the on-board data handling computer of a satellite under development at National Institute for Space Research (INPE)
dependable systems and networks | 2007
Regina Lúcia de Oliveira Moraes; João Durães; Ricardo Barbosa; Eliane Martins; Henrique Madeira
One important question in component-based software development is how to estimate the risk of using COTS components, as the components may have hidden faults and no source code available. This question is particularly relevant in scenarios where it is necessary to choose the most reliable COTS when several alternative components of equivalent functionality are available. This paper proposes a practical approach to assess the risk of using a given software component (COTS or non-COTS). Although we focus on comparing components, the methodology can be useful to assess the risk in individual modules. The proposed approach uses the injection of realistic software faults to assess the impact of possible component failures and uses software complexity metrics to estimate the probability of residual defects in software components. The proposed approach is demonstrated and evaluated in a comparison scenario using two real off-the-shelf components (the RTEMS and the RTLinux real-time operating system) in a realistic application of a satellite data handling application used by the European Space Agency.
hawaii international conference on system sciences | 2000
Eliane Martins; Selma B. Sabião; Ana Maria Ambrosio
This paper describes a tool called ConData used as test generation for communication protocols specified as extended finite state machines. The strategy for test generation combines different specification-based test methods: (i) transition testing for the control part of a protocol and (ii) syntax and equivalence partitioning for the data part. The tool uses a representation of the protocol in PSL (Protocol Specification Language), which is transformed into a format readable by a Prolog program. This implements the test strategies mentioned above. The text also presents some results obtained in the test generation for the protocol of the Tele-command Communication System of the SACI-1 satellite.
international conference on software testing, verification and validation workshops | 2010
Thaise Yano; Eliane Martins; Fabiano Luis de Sousa
Search-based testing techniques using meta-heuristics, like evolutionary algorithms, has been largely used for test data generation, but most approaches were proposed for white-box testing. In this paper we present an evolutionary approach for test sequence generation from a behavior model, in particular, Extended Finite State Machine. An open problem is the production of infeasible paths, as these should be detected and discarded manually. To circumvent this problem, we use an executable model to obtain feasible paths dynamically. An evolutionary algorithm is used to search for solutions that cover a given test purpose, which is a transition of interest. The target transition is used as a criterion to get slicing information, in this way, helping to identify the parts of the model that affect the test purpose. We also present a multi-objective search: the test purpose coverage and the sequence size minimization, as longer sequences require more effort to be executed.
Electronic Notes in Theoretical Computer Science | 2014
Marcelo Invert Palma Salas; Eliane Martins
Due to its distributed and open nature, Web Services give rise to new security challenges. This technology is susceptible to Cross-site Scripting (XSS) attack, which takes advantage of existing vulnerabilities. The proposed approach makes use of two Security Testing techniques, namely Penetration Testing and Fault Injection, in order to emulate XSS attack against Web Services. This technology, combined with WS-Security (WSS) and Security Tokens, can identify the sender and guarantee the legitimate access control to the SOAP messages exchanged. We use the vulnerability scanner soapUI that is one of the most recognized tools of Penetration Testing. In contrast, WSInject is a new fault injection tool, which introduces faults or errors on Web Services to analyze the behavior in an environment not robust. The results show that the use of WSInject, in comparison to soapUI, improves the detection of vulnerability allows to emulate XSS attack and generates new types of them.
computational science and engineering | 2009
Anderson Nunes Paiva Morais; Eliane Martins; Ana R. Cavalli; Willy Jimenez
In this paper we present an attack injectionapproach for security protocol testing aiming atvulnerability detection. We use attack tree model todescribe known attacks and derive injection testscenarios to test the security properties of the protocolunder evaluation. The test scenarios are converted to aspecific fault injector script after performing sometransformations. The attacker is emulated using a faultinjector. This model based approach facilitates thereusability and maintainability of the generatedinjection attacks as well as the generation of faultinjectors scripts. The approach is applied to anexisting mobile security protocol. We performedexperiments with truncation and DoS attacks; resultsshow good precision and efficiency in the injectionmethod.
latin american symposium on dependable computing | 2005
Patrick H. S. Brito; Camila Ribeiro Rocha; Fernando Castor Filho; Eliane Martins; Cecília M. F. Rubira
The design, implementation and testing of the exceptional activity of a software system are complex tasks that usually do not receive the necessary attention from existing development methodologies. This work presents a systematic way to deal with exception handling, from the requirement specification phase to the implementation and testing phases, in component-based software development. Testing activities are performed since the early stages of development, promoting an increase in the quality of the produced system. Our solution refines the Methodology for the Definition of Exception Behavior, MDCE, in the architectural design, implementation, and testing phases. Moreover, the proposed method was adapted to the UML Components process.
international conference on web services | 2010
Ana R. Cavalli; Tien-Dung Cao; Wissam Mallouli; Eliane Martins; Andrey Sadovykh; Sébastien Salva; Fatiha Zaïdi
This paper presents a methodology and a set of tools for the modelling, validation and testing of Web service composition, conceived and developed within the French national project WebMov. This methodology includes several modelling techniques, based mainly on some variations of Timed Extended Finite State Machines (TEFSM) formalism, which provide a formal model of the BPEL description of Web services composition. These models are used as a reference for the application of different test generation and passive testing techniques for conformance and robustness checking. The whole WebMov methodology is integrated within a dedicated framework, composed by a set of tools that implement the model representation, the test generation and passive testing algorithms. This framework also permits the interaction of these tools to achieve specific modelling and testing activities in a complementary way. A case study based on a real service, a Travel Reservation Web Service, is presented as well as the results of the application of the proposed WebMov methodology and tools.