Part 2: Tools and FrameworksInternational audienceOne of the biggest challenges in hardware and software design is to ensure that a system is error-free. Small errors in reactive embedded systems can have disastrous and costly consequences for a project. Preventing such errors by identifying the most probable cases of erratic system behavior is quite challenging. In this paper, we introduce an automatic test set generator called AUTSEG. Its input is a generic model of the target system, generated using the synchronous approach. Our tool finds the optimal preconditions for restricting the state space of the model. It only works locally on significant subspaces. Our approach exhibits a simpler and efficient quasi-flattening algorithm than exi...
Due to the increasing complexity of reactive systems, testing has become an important technique in t...
International audienceThis paper addresses the problem of off-line selection of test cases for testi...
Insecure default values in software settings can be exploited by attackers to compromise the system ...
International audienceOne of the biggest challenges in hardware and software design is to ensure tha...
One of the biggest challenges in hardware and software design is to ensure that a system is error-fr...
Failures in reactive embedded systems are often unacceptable. Effective test-ing of embedded systems...
In this paper we describe a comprehensive approach for conformance testing of embedded reactive syst...
Embedded reactive systems are now invisible and everywhere, and are adopted, for instance, to monito...
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyrigh...
The emergence and development of systems of systems (SoSs) have expanded the complexity and adaptabi...
International audienceReactive Real-Time Systems require very high level of confidence. The validati...
Testing commercial software is expensive and time consuming. Automated testing methods promise to s...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
The amount and complexity of software developed during the last few years has increased tremendously...
International audienceIn this paper we describe Formal Specs Verifier Automatic Test Generation, a t...
Due to the increasing complexity of reactive systems, testing has become an important technique in t...
International audienceThis paper addresses the problem of off-line selection of test cases for testi...
Insecure default values in software settings can be exploited by attackers to compromise the system ...
International audienceOne of the biggest challenges in hardware and software design is to ensure tha...
One of the biggest challenges in hardware and software design is to ensure that a system is error-fr...
Failures in reactive embedded systems are often unacceptable. Effective test-ing of embedded systems...
In this paper we describe a comprehensive approach for conformance testing of embedded reactive syst...
Embedded reactive systems are now invisible and everywhere, and are adopted, for instance, to monito...
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyrigh...
The emergence and development of systems of systems (SoSs) have expanded the complexity and adaptabi...
International audienceReactive Real-Time Systems require very high level of confidence. The validati...
Testing commercial software is expensive and time consuming. Automated testing methods promise to s...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
The amount and complexity of software developed during the last few years has increased tremendously...
International audienceIn this paper we describe Formal Specs Verifier Automatic Test Generation, a t...
Due to the increasing complexity of reactive systems, testing has become an important technique in t...
International audienceThis paper addresses the problem of off-line selection of test cases for testi...
Insecure default values in software settings can be exploited by attackers to compromise the system ...