Affiliation:
1. Institut Mines-Telecom, France
Abstract
Testing embedded systems to find errors and to validate that the implemented system as per the specifications and requirements has become an important part of the system design. The research community has proposed several formal approaches these last years, but most of them only consider the control portion of the protocol, neglecting the data portions, or are confronted with an overloaded amount of data values to consider. In this chapter, the authors present a novel approach to model protocol properties of embedded application in terms of Input-Output Symbolic Transition Systems (IOSTS) and show how they can be tested on real execution traces taking into account the data and control portions. These properties can be designed to test the conformance of a protocol as well as security aspects. A parametric trace slicing approach is presented to match trace and property. This chapter is illustrated by an application to a set of real execution traces extracted from a real automotive Bluetooth framework with functional and security properties.
Reference22 articles.
1. Alcalde, B., Cavalli, A.R., Chen, D., Khuu, D., & Lee, D. (2004). Network Protocol System Passive Testing for Fault Management: A Backward Checking Approach. In Formal Techniques for Networked and Distributed Systems (pp. 150-166). Academic Press.
2. Avgustinov, P., Tibble, J., & de Moor, O. (2007). Making trace monitoring feasible. In R. P. Gabriel (Ed.), ACM Conference on Object-Oriented Programming, Systems and Languages (pp. 589-608). ACM Press.
3. Bentakouk, L., Poizat, P., & Zaidi, F. (2011). Checking the behavioral conformance of web services with Symbolic Testing and an SMT solver. In Proceedings of the 5th International Conference on Tests and Proofs (pp. 33-50). Academic Press.
4. Bluetooth specification, version 2.1 + edr [vol 0] 1999.
5. Bodden, E. (2005). J-lo, a tool for runtime-checking temporal assertions. (Unpublished Master’s thesis). RWTH Aachen University.