Responsive image
博碩士論文 etd-0727106-132535 詳細資訊
Title page for etd-0727106-132535
論文名稱
Title
針對資源測試的自動化方法
An Automated Method for Resource Testing
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
52
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2006-07-25
繳交日期
Date of Submission
2006-07-27
關鍵字
Keywords
基因演算法、記憶體洩漏、軟體測試、資源測試
Genetic Algorithm, Resource Testing, Software Testing, Memory Leak
統計
Statistics
本論文已被瀏覽 5905 次,被下載 3246
The thesis/dissertation has been browsed 5905 times, has been downloaded 3246 times.
中文摘要
這篇論文介紹一個自動化測試資料產生技術的方法,結合大量測試輔以資源監控來找出較難發現之資源耗用相關的軟體弱點。大量測試重覆產生測試案例許多次用來模擬測試長時期的執行區間,這項測試技術已經被發現在對於找出元件協調之間的錯誤及記憶體耗用(e.g. memory leaks)十分有用。藉由程式碼插裝監控資源使用趨勢,可更快速的產生有效的測試資料。結合使用大量測試及資源監控觀點的自動化測試資料產生能夠使得本方法在這領域當中更實用且有效。
Abstract
This thesis introduces a method that combines automated test data generation techniques with high volume testing and resource monitoring. High volume testing repeats test cases many times, simulating extended execution intervals. These testing techniques have been found useful for uncovering errors resulting from component coordination problems, as well as system resource consumption (e.g. memory leaks) or corruption. Coupling automated test data generation with high volume testing and resource monitoring could make this approach more scalable and effective in the field.
目次 Table of Contents
致謝 i
中文摘要 ii
英文摘要 iii
目錄 iv
圖表目錄 v
第一章 緒論 1
1.1 研究動機 1
1.2 背景說明 2
1.3 論文架構 4
第二章 文獻探討 5
2.1 資源消耗相關問題 5
2.2 軟體測試(Software Testing) 7
2.3 基因演算法(Genetic Algorithm, GA) 12
第三章 自動化資源測試方法 18
3.1 問題描述 18
3.2 先前作法 18
3.3 發展自動化資源測試方法的動機 19
3.4 自動化資源測試方法 22
3.5 使用工具 30
第四章 實驗結果與討論 32
4.1 實驗案例說明 32
4.2 參數設定與限制 33
4.3 資源需求趨勢 34
4.4 結果比較與討論 36
第五章 結論與未來研究方向 39
5.1 結論 39
5.2 研究限制 39
5.3 未來研究方向 40
參考文獻 41
附錄一、實驗結果比較表 45
參考文獻 References
1. Hetzel, B., The Complete Guide to Software Testing, QED Information Sciences, Wellesley, Mass. 1988.
2. Beizer, B. 1990 Software Testing Techniques. John Wiley & Sons, Inc.
3. Hetzel, B., "Software Testing: Some Troubling Issues and Opportunities", BCS Special Interest Group in Software Testing, Dec 6, 1991.ression clustering to Reverse Engineering. Bioinformatics, 2000. 16(8): p. 707-726.
4. D. Alberts, “The economics of software quality assurance,” in AFIPS Conf. Proc. 1976 Nar. Computer Conf., vol. 45. Montvale, NJ: AFIPS Press, pp. 433-442.
5. G. Myers, The Art of Sofrware Testing. New York: Wiley, 1979.
6. Hoglund, G. and McGraw, G. 2004 Exploiting Software: How to Break Code. Pearson Higher Education.
7. McGraw, G. and Potter, B. 2004. Software Security Testing. IEEE Security and Privacy 2, 5 (Sep. 2004), 81-85.
8. Huang, Y., Yu, F., Hang, C., Tsai, C., Lee, D., and Kuo, S. 2004. Securing web application code by static analysis and runtime protection. In Proceedings of the 13th international Conference on World Wide Web (New York, NY, USA, May 17 - 20, 2004). WWW '04. ACM Press, New York, NY, 40-52.
9. Berndt, D. J. and Watkins, A. 2005. High Volume Software Testing using Genetic Algorithms. In Proceedings of the Proceedings of the 38th Annual Hawaii international Conference on System Sciences (Hicss'05) - Track 9 - Volume 09 (January 03 - 06, 2005). HICSS. IEEE Computer Society, Washington, DC, 318.2.
10. McGee, P. and Kaner, C. 2004. Experiments with high volume test automation. SIGSOFT Softw. Eng. Notes 29, 5 (Sep. 2004), 1-3.
11. Beizer, B. 1990 Software Testing Techniques. John Wiley & Sons, Inc.
12. Ntafos, S. C. 1988. A Comparison of Some Structural Testing Strategies. IEEE Trans. Softw. Eng. 14, 6 (Jun. 1988), 868-874.
13. M. Roper, Software Testing. London: McGraw-Hill Book Company, 1994.
14. A. H.Watson, “Structured testing: Analysis and extensions,” Tech. Rep. TR-528-96, Princeton University, 1996.
15. Tikir, M. M. and Hollingsworth, J. K. 2002. Efficient instrumentation for code coverage testing. In Proceedings of the 2002 ACM SIGSOFT international Symposium on Software Testing and Analysis (Roma, Italy, July 22 - 24, 2002). ISSTA '02. ACM Press, New York, NY, 86-96.
16. Gallagher, M. J. and Narasimhan, V. L. 1997. ADTEST: A Test Data Generation Suite for Ada Software Systems. IEEE Trans. Softw. Eng. 23, 8 (Aug. 1997), 473-484.
17. Holland, J. H. 1992 Adaptation in natural and artificial systems. MIT Press.
18. Michalewicz Z. (1992). Genetic Algorithms + Data Structures = Evolution Programs. Springer-Verlag, New York.
19. Haupt R. L. and Haupt S. E., Practical Genetic Algorithms 2nd Edition, John Wiley & Sons, Inc., 2004.
20. Lozano M., Herrera F., Krasnogor N., and Molina D. Real-coded memetic algorithms with crossover hill-climbing. Evolutionary Computation 12 (3):273-302, 2004.
21. Herrera F., Lozano M., and Verdegay J. L., Tackling real-coded genetic algorithms: operators and tools for the behavioral analysis. Artificial Intelligence Reviews 12 (4):265-319, 1998.
22. Puchkov, F. M. and Shapchenko, K. A. 2005. Static Analysis Method for Detecting Buffer Overflow Vulnerabilities. Program. Comput. Softw. 31, 4 (Jul. 2005), 179-189.
23. Lammermann, F. and Wappler, S. 2005. Benefits of software measures for evolutionary white-box testing. In Proceedings of the 2005 Conference on Genetic and Evolutionary Computation (Washington DC, USA, June 25 - 29, 2005). H. Beyer, Ed. GECCO '05. ACM Press, New York, NY, 1083-1084.
24. N. Tracey. A search-based automated test-data generation framework for safety critical software. PhD thesis, University of York, 2000.
25. P. McMinn. Search-based software test data generation: a survey. Software Testing, Verification and Reliability, 14:105--156, June 2004.
26. Amit Kulkarni, Stephen Bush, Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics, Journal of Network and Systems Management, Volume 14, Issue 1, Mar 2006, Pages 69 - 80
27. David Larson, Keith Miller, "Silver Bullets for Little Monsters: Making Software More Trustworthy," IT Professional, vol. 07, no. 2, pp. 9-13, Mar/Apr, 2005.
28. Scholz, B., Blieberger, J., and Fahringer, T. 1999. Symbolic pointer analysis for detecting memory leaks. SIGPLAN Not. 34, 11 (Nov. 1999), 104-113.
29. Heine, D. L. and Lam, M. S. 2003. A practical flow-sensitive and context-sensitive C and C++ memory leak detector. In Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (San Diego, California, USA, June 09 - 11, 2003). PLDI '03. ACM Press, New York, NY, 168-181.
30. R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proceedings of the Winter USENIX Conference, pages 125–136, December 1992.
31. W. R. Bush, J. D. Pincus, and D. J. Sielaff. A static analyzer for finding dynamic programming errors. Software–Practice and Experience, 30(7):775–802, June 2000.
32. S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language for building system-specific, static analyses. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, pages 69–82, June 2002.
33. Chris Wilkinson, "對 Web 服務進行壓力測試", http://www-128.ibm.com/developerworks/tw/library/ws-tip-strstest/
34. Xie, Y. and Aiken, A. 2005. Context- and path-sensitive memory leak detection. SIGSOFT Softw. Eng. Notes 30, 5 (Sep. 2005), 115-125.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內立即公開,校外一年後公開 off campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code