Spelling suggestions: "subject:"5oftware - tests"" "subject:"5oftware - pests""
1 |
Aplicação de analise de mutantes a geração de dados de teste para detecção de vulnerabilidade do tipo Buffer Overflow / Application of mutation analysis to the generation of test data to detect buffer overflow vulnerabilityGuidetti, Suseley Aparecida 23 February 2005 (has links)
Orientadores: Mario Jino, Plinio Roberto Souza Vilela / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de
Computação / Made available in DSpace on 2018-08-04T02:43:07Z (GMT). No. of bitstreams: 1
Guidetti_SuseleyAparecida_M.pdf: 1642127 bytes, checksum: 4a844d1875b1f47b619109f2968fc7c5 (MD5)
Previous issue date: 2005 / Resumo: O crescimento acentuado da Internet e a conseqüente demanda por novos serviços levam ao desenvolvimento de aplicações cada vez mais complexas. Devido a esta complexidade e às pressões para o cumprimento de cronogramas cada vez mais restritivos, muitas vezes a segurança desses sistemas acaba sendo negligenciada, originando aplicações com mais vulnerabilidades e portanto sujeitas a um maior número de ataques. Um dos ataques mais freqüentes é o do tipo buffer overflow. Permite que um atacante insira códigos maliciosos em um programa, alterando seu fluxo de controle original, com o objetivo de conseguir acesso a um sistema ou aumentar seus privilégios. Neste trabalho foi utilizada a técnica denominada Teste de Vulnerabilidade de Segurança proposta para detectar vulnerabilidade do tipo buffer overflow no software por meio da aplicação do Teste de Mutação. Uma ferramenta chamada
SEVMUT - Security Vulnerabilities Mutation Tool foi desenvolvida e sua aplicabilidade, escalabilidade e eficácia foram validadas / Abstract: The steep growth of the Internet and the associated demand for new products and services leads to the development of applications of increasing complexity. Due to this complexity and the pressure to meet squeezing schedules, security issues are left as an afterthought, increasing the number of vulnerabilities in the systems and making them susceptible to attacks. One of the most frequent attacks is the buffer overflow. It allows a hacker to insert malicious code in a program, changing its original flow of control with the goal of escalating privileges and gaining access into de system. In this work we present a technique called Testing for Security Vulnerabilities meant to detect buffer overflow vulnerabilities in software through the use of Mutation Testing. A tool called SEVMUT - Security Vulnerabilities Mutation Tool was developed and validated for its applicability, scalability and effectiveness / Mestrado / Engenharia de Computação / Mestre em Engenharia Elétrica
|
2 |
Imagetest: uma proposta de metodologia para aplicação de testes de software no domínio de transformações no espaço de cores / Imagestes: a methodology proposal to the application of software tests in the domain of the transformations in the colors spaceDalcin, Sabrina Borba 24 August 2007 (has links)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / This work is about the development of the ImageTest methodology which is dedicaded to applications that envelop transformations in the color space. This methodology describes the development and applications process of software tests, since the entrance of a participant in the team tests until the final application. This way, to emprove the test performances, the methodology aims the use of two techniques, both of them are in the bibliography, the structural and functional techniques. It has been used to the applications techniques the criterions all-of-us, equivalence partitioning, and boundary value analysis. Finally, the acceptance tests are done, which help the warranty that the software pleases the customer/user. So, the ImageTest can help the develoment and application of the cases of tests, aiming at the productivity increase and software quality, and the maintenance decrease. / Este trabalho propõe o desenvolvimento da metodologia ImageTest, a qual é dedicada a aplicações que envolvem transformações no espaço de cores. Essa metodologia descreve o processo de desenvolvimento e aplicação de testes de software, desde a entrada de um participante na equipe de testes até a finalização da aplicação. Sendo assim, para melhorar a execução dos testes, a metodologia visa a utilização de duas técnicas existentes na literatura, a técnica estrutural e funcional. Para a devida aplicação das técnicas, são utilizados os critérios todos-nós, particionamento de equivalência e análise de valor limite. Por fim, são realizados os testes de aceitação, os quais auxiliam na obtenção da garantia de que o software satisfaz o cliente/usuário. Dessa forma, a ImageTest serve de auxílio ao desenvolvimento e aplicação dos casos de testes, visando o aumento da produtividade e qualidade do software, e a redução de manutenção.
|
3 |
Tyst kunskap och produktdatasystem vid medicinteknisk tillverkning : Pilotstudie av system för produktdatahantering och kartläggning av den tysta kunskapen vid Nationellt respirationscetrum, NRC / Tacit knowledge and product data management system in medical technology production : Pilot study of a PDM system and survey of the tacit knowledge at National respiratory centre, NRCHedlund, Niclas January 2009 (has links)
<p>This thesis looks at two sides of the same coin: how to support the production and future development at a specialist medical technology department at Danderyd Hospital. The two sides are; a pilot study of a product management system (PDM) and an interview based study on the characteristics of the silent knowledge of the technicians. The department (National respiratory centre, NRC) is facing retirement of several key employees.</p><p>The technical study shows that the success of an implementation is largely dependent on the users’ prior knowledge and use of a 3D Computer aided design system (CAD).The system itself is shown to fulfill the Lifecycle requirement of tracking the products (mostly tracheostomy tubes) but without a CAD centered workflow, some substantial education and preferably some new recruits, an implementation of the PDM system will fail. The author recommends development of the current “low-tech” system of MS Excel and Access rather than redistribute the dependency from technician towards a complex, commercial software and its vendor.</p><p>The analysis of the technicians’ silent knowledge with the newly developed method, epithet for silent knowledge (ETK), shows that the longer employment time:</p><ul><li>the more differentiated technicians become in describing their work,</li><li>practical knowledge are regarded higher and</li><li>the social and collective problem solving factors of the work becomes more important.</li></ul><p>Typically, it is shown that a new employee should preferably enjoy problem solving, being pragmatic and social as well as having some prior education or work experience in a CAD and/or a PDM system.</p>
|
4 |
Tyst kunskap och produktdatasystem vid medicinteknisk tillverkning : Pilotstudie av system för produktdatahantering och kartläggning av den tysta kunskapen vid Nationellt respirationscetrum, NRC / Tacit knowledge and product data management system in medical technology production : Pilot study of a PDM system and survey of the tacit knowledge at National respiratory centre, NRCHedlund, Niclas January 2009 (has links)
This thesis looks at two sides of the same coin: how to support the production and future development at a specialist medical technology department at Danderyd Hospital. The two sides are; a pilot study of a product management system (PDM) and an interview based study on the characteristics of the silent knowledge of the technicians. The department (National respiratory centre, NRC) is facing retirement of several key employees. The technical study shows that the success of an implementation is largely dependent on the users’ prior knowledge and use of a 3D Computer aided design system (CAD).The system itself is shown to fulfill the Lifecycle requirement of tracking the products (mostly tracheostomy tubes) but without a CAD centered workflow, some substantial education and preferably some new recruits, an implementation of the PDM system will fail. The author recommends development of the current “low-tech” system of MS Excel and Access rather than redistribute the dependency from technician towards a complex, commercial software and its vendor. The analysis of the technicians’ silent knowledge with the newly developed method, epithet for silent knowledge (ETK), shows that the longer employment time: the more differentiated technicians become in describing their work, practical knowledge are regarded higher and the social and collective problem solving factors of the work becomes more important. Typically, it is shown that a new employee should preferably enjoy problem solving, being pragmatic and social as well as having some prior education or work experience in a CAD and/or a PDM system.
|
Page generated in 0.046 seconds