skip to main content
10.1145/2578128.2578234acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdasccaConference Proceedingsconference-collections
research-article

Runtime verification of state machines and defect localization applying model-based testing

Published:07 April 2014Publication History

ABSTRACT

In this paper we introduce a method for runtime verification of the behavior of a system against state machines models in order to identify inconsistencies between the two. This is achieved by tracking states and transitions at runtime and comparing with the expected behavior of the system captured in the form of state machine models. The goal is to increase our confidence that the order of states at runtime matches what is specified by the models. The method also provides for defect localization by identifying that in the transition between which states a deviation from the expected behavior has occurred. The necessity and importance of the method lies in the fact that in model-based development, models are also used to perform analysis. Therefore, if there is any discrepancy between the behavior of the system at runtime and the models, then the result of model-based analyses which are performed may also be invalid and not applicable for the system anymore. For this purpose, in our method we create executable test cases from state machine models to test the runtime behavior of the system.

References

  1. M. Utting and B. Legeard, Practical Model-Based Testing: A Tools Approach. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Zander, I. Schieferdecker, and P. Mosterman, Model-Based Testing for Embedded Systems, ser. Computational Analysis, Synthesis, and Design of Dynamic Systems. Taylor & Francis, 2011. {Online}. Available: http://books.google.se/books?id=fzgzNW_alD0C Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Saadatmand, A. Cicchetti, and M. Sjödin, "Design of adaptive security mechanisms for real-time embedded systems," in Procs of ESSoS'12. Springer-Verlag, 2012, pp. 121--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Utting, A. Pretschner, and B. Legeard, "A taxonomy of model-based testing approaches," Journal of Software Testing, Verification and Reliability, vol. 22, no. 5, pp. 297--312, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Peleska, "Industrial-strength model-based testing - state of the art and current challenges," in Proceedings of the Eighth Workshop on Model-Based Testing, March 2013, pp. 3--28.Google ScholarGoogle Scholar
  6. MBAT Project: Combined Model-based Analysis and Testing of Embedded Systems, http://www.mbat-artemis.eu/home/, Accessed: November 2013.Google ScholarGoogle Scholar
  7. M. Saadatmand and M. Sjödin, "On combining model-based analysis and testing," in Tenth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, USA, 2013, pp. 260--266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Anwar, "An anti-lock braking control system for a hybrid electromagnetic/electrohydraulic brake-by-wire system," in American Control Conference, 2004. Proceedings of the 2004, vol. 3, 2004, pp. 2699--2704 vol.3.Google ScholarGoogle Scholar
  9. Enea, "The Architectural Advantages of Enea OSE in Telecom Applications," http://www.enea.com/software/solutions/rtos/, Last Accessed: November 2013.Google ScholarGoogle Scholar
  10. R. Marinescu, M. Saadatmand, A. Bucaioni, C. Seceleanu, and P. Pettersson, "East-adl tailored testing: From system models to executable test cases," Mälardalen University, Technical Report ISSN 1404-3041 ISRN MDH-MRTC-278/2013-1-SE, August 2013. {Online}. Available: http://www.mrtc.mdh.se/index.php?choice=publications&id=3373Google ScholarGoogle Scholar
  11. "EAST-ADL," http://www.east-adl.info/Specification.html, Last Accessed: November 2013.Google ScholarGoogle Scholar
  12. R. Alur and D. L. Dill, "A theory of timed automata," Theoretical Computer Science, vol. 126, no. 2, pp. 183--235, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Bengtsson and W. Yi, "Timed automata: Semantics, algorithms and tools," in In Lecture Notes on Concurrency and Petri Nets, ser. Lecture Notes in Computer Science vol 3098, W. Reisig and G. Rozenberg, Eds. Springer--Verlag, 2004.Google ScholarGoogle Scholar
  14. J. Håkansson, J. Carlson, A. Monot, P. Pettersson, and D. Slutej, "Component-based design and analysis of embedded systems with uppaal port," in Automated Technology for Verification and Analysis. Springer, 2008, pp. 252--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Behrmann, R. David, and K. G. Larsen, "A tutorial on Uppaal 4.0," http://www.it.uu.se/research/group/darts/papers/texts/new-tutorial.pdf, November 2006.Google ScholarGoogle Scholar
  16. Uppaal for Testing Real-Time Systems Online (TRON), http://people.cs.aau.dk/~marius/tron/, Accessed: November 2013.Google ScholarGoogle Scholar
  17. K. G. Larsen, M. Mikucionis, B. Nielsen, and A. Skou, "Testing real-time embedded software using uppaal-tron: an industrial case study," in Proceedings of the 5th ACM international conference on Embedded software, ser. EMSOFT '05. New York, NY, USA: ACM, 2005, pp. 299--306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Saadatmand and M. Sjödin, "Testing of timing properties in real-time systems: Verifying clock constraints," in 20th Asia-Pacific Software Engineering Conference (APSEC), Bangkok, Thailand, December 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. W. Eric Wong and Vidroha Debroy, "A survey of software fault localization," Technical Report UTDCS-45-09, The University of Texas at Dallas, November 2009.Google ScholarGoogle Scholar
  20. M. A. Alipour, "Automated fault localization techniques; a survey," Technical report, Oregon State University, 2012.Google ScholarGoogle Scholar
  21. J. A. Jones and M. J. Harrold, "Empirical evaluation of the tarantula automatic fault-localization technique," in Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, ser. ASE '05. New York, NY, USA: ACM, 2005, pp. 273--282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Liu, X. Yan, L. Fei, J. Han, and S. P. Midkiff, "Sober: Statistical model-based bug localization," SIGSOFT Softw. Eng. Notes, vol. 30, no. 5, pp. 286--295, Sep. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Ge, S. Nakajima, and M. Pantel, "Hidden markov model based automated fault localization for integration testing," in Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on, 2013, pp. 184--187.Google ScholarGoogle Scholar
  24. M. Research, "Abstract state machine language (asml)," http://research.microsoft.com/en-us/projects/asml/, Accessed: January 2014.Google ScholarGoogle Scholar
  25. H. Pei-Breivold, I. Crnkovic, and M. Larsson, "A systematic review of software architecture evolution research," Journal of Information and Software Technology, July 2011.Google ScholarGoogle Scholar
  26. Alten/Xdin AB, http://www.alten.se/en/om-alten/nyheter/the-acquisition-of-enea-experts-is-now-complete/, Accessed: January 2014.Google ScholarGoogle Scholar
  27. ITS-EASY post graduate industrial research school for embedded software and systems, http://www.mrtc.mdh.se/projects/itseasy/, Accessed: November 2013.Google ScholarGoogle Scholar
  28. VINNOVA: Swedish Governmental Agency for Innovation Systems, http://www.vinnova.se/en/, Accessed: November 2013.Google ScholarGoogle Scholar

Index Terms

  1. Runtime verification of state machines and defect localization applying model-based testing

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Other conferences
                  WICSA '14 Companion: Proceedings of the WICSA 2014 Companion Volume
                  April 2014
                  103 pages
                  ISBN:9781450325233
                  DOI:10.1145/2578128
                  • General Chair:
                  • Anna Liu,
                  • Program Chairs:
                  • John Klein,
                  • Antony Tang

                  Copyright © 2014 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 7 April 2014

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader