At a time where software are omnipresent in our daily life, verifying their safety and security present an important challenge for the industry. The most used technique to ensure that a software meets certain requirements is testing, where we run the program with some controlled input sets. A major issue is then to ensure that these input sets cover enough different situations. Many proposals have been made, called coverage criteria, which define test objectives through which at least one execution must pass during tests. In this thesis, we examine different possibilities to combine formal methods (mathematical techniques) and testing in order to improve the efficiency of the testing process. We focused our efforts on dataflow criteria, which obse...
Le test est une approche efficace pour détecter des bogues d'implémentation ayant un impact sur la s...
The security of a software can be taken into account right from the design stage. This approach, cal...
This work deals with the problem of the synchronous software validation against his safety propertie...
At a time where software are omnipresent in our daily life, verifying their safety and security pres...
La vérification de logiciels représente un défi important à l’heure où ces derniers sont présents part...
Currently, industrial-strength software development usually relies on unit testing or unit proof in ...
Actuellement, le développement d’un logiciel de taille industriel repose généralement surdes tests o...
Le frelatage (ou fuzzing) est l'une des approches les plus efficaces pour la détection de vulnérabil...
The research summarized in this report focuses on the dependability of computer systems. It adresses...
One of the biggest challenges in hardware and software design is to ensure that a system is error-fr...
Automated software testing is increasingly being seen as an important means of improving the quality...
Along with the increasing importance of software systems for our daily life, attacks on these system...
La vérification de logiciels repose le plus souvent sur une spécification formelle encodant les prop...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
This PhD Thesis reports the results of experiments conducted to investigate the effectiveness and re...
Le test est une approche efficace pour détecter des bogues d'implémentation ayant un impact sur la s...
The security of a software can be taken into account right from the design stage. This approach, cal...
This work deals with the problem of the synchronous software validation against his safety propertie...
At a time where software are omnipresent in our daily life, verifying their safety and security pres...
La vérification de logiciels représente un défi important à l’heure où ces derniers sont présents part...
Currently, industrial-strength software development usually relies on unit testing or unit proof in ...
Actuellement, le développement d’un logiciel de taille industriel repose généralement surdes tests o...
Le frelatage (ou fuzzing) est l'une des approches les plus efficaces pour la détection de vulnérabil...
The research summarized in this report focuses on the dependability of computer systems. It adresses...
One of the biggest challenges in hardware and software design is to ensure that a system is error-fr...
Automated software testing is increasingly being seen as an important means of improving the quality...
Along with the increasing importance of software systems for our daily life, attacks on these system...
La vérification de logiciels repose le plus souvent sur une spécification formelle encodant les prop...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
This PhD Thesis reports the results of experiments conducted to investigate the effectiveness and re...
Le test est une approche efficace pour détecter des bogues d'implémentation ayant un impact sur la s...
The security of a software can be taken into account right from the design stage. This approach, cal...
This work deals with the problem of the synchronous software validation against his safety propertie...