How To Test A Web Based Application Automatically
|
|
|
- Sherman Clarke
- 5 years ago
- Views:
Transcription
1 A General Framework for Testing Web-Based Applications Saeed Abrishami, Mohsen Kahani Computer Engineering Department, Ferdowsi University of Mashhad r, Abstract Software testing is a difficult task for web based applications due to their special features like multi-tier structure and emergence of new technologies (e.g. Ajax). In recent years, automatic testing of web based applications has been emerged as a promising technique to tackle the difficulties of testing these types of applications and several frameworks have been proposed for this purpose. But the most important problem of these frameworks is the lack of generality for different types of tests and programming environments. In this paper, we proposed a general framework for automatic testing of web based applications that covers all aspects of different types of testing, in an arbitrary web based application. 1. Introduction Frequent use of the internet for crucial tasks, creates serious concern for the quality of web-based software systems. Web based system tends to change rapidly, due to emergence of new technologies (like Ajax) and the demands of users. In such a highly variable environment, manual testing of softwares is a hard and time consuming task, since automated software testing is an inevitable choice for testing the web-based software. Software testing methods are traditionally divided into black box testing and white box testing. Black box testing treats the software as a black-box without any understanding of internal behavior. It aims to test the functionality according to the requirements. Thus, the tester inputs data and only sees the output from the test object. White box testing, however, is when the tester has access to the internal data structures, code, and algorithms. White box testing methods include creating tests to satisfy some code coverage criteria, and also can be used to evaluate the completeness of a test suite that was created with black box testing methods. In recent years the term grey box testing has come into common usage. This involves having access to internal data structures and algorithms for purposes of designing the test cases, but testing at the user, or black-box level. Several techniques have been proposed for the testing of web-based applications as both, research proposals and commercial tools. It is roughly possible to categorize such techniques into three groups[1]: (1)functional testing techniques, supporting requirement-base testing; (2) structural techniques, supporting some form of white box testing based upon the analysis and instrumentation of source code; and (3) model-based techniques, which exploit a navigation model of the application. Different frameworks aim to construct an infrastructure for automatic testing of webbased applications. Sampth et. al. [2] proposed a framework that uses user session logs to generate test cases and then a replay tool sends these generated test cases to the server and collects the results. These results send to a test oracle that compares them to the expected results. This framework also uses a Coverage Analysis Tool measure the adequacy of the test suit, using statement and method coverage testing. Zhu [3] proposed a framework for testing of web services. In this framework, each web service should be accompanied by a testing service. In addition to these testing services, testing tool vendors and companies have independent testing services to perform various kinds of test tasks like to generate test cases, to measure test adequacy, to
2 extract various types of diagrams from source code and so on. The trusted independent test services can call the testing services belong to a web service, to access the internal information (such as source code). Chu et. al [4] presented a testing framework called FAST (Framework for Automating Statistics-based Testing) based on a method called statistical testing. Statistical testing techniques involve exercising a piece of software by supplying it with test data that are randomly drawn according to a single, unconditional probability distribution on the software s input domain. This distribution represents the best estimate of the operational frequency for the use for each input. One of the most important parts of this framework is Automated Test Data Generator that is responsible for generating test cases. The approach adopted in this paper is specification of the input domain of a software by means of a SIAD (symbolic input attributed decomposition) tree which is a syntactic structure representing the input domain of a piece of software in a form that facilitates construction of random test data for producing random output for quality inspection. In a similar manner, the specification of each product unit (output) is addressed by the SOAD (symbolic output attributed decomposition) tree. A SOAD tree can be used as a tool for describing the expected result which satisfies the user s requirement and as a basis for analyzing the product unit automatically, without a test oracle. The Quality Analysis module analyzes the product units and finds the Defective Outputs. At the end, the defect rate has been computed using a binomial distribution. MDWATP (Model Driven Web Application Testing Program) is a framework proposed by Li et. al. [5] for testing web application based on model driven testing. It uses 4 principal models based on UML2.0 standard. The first model is System Under Test (SUT) View that presents the model of the system being tested. So the navigation is a basic characteristic of web applications, they used a navigation model proposed by Lucca et. al. and also by Ricca and Tunella, named Web Application Navigation Model (WANM). WANM depicts the navigation relations among the client pages, and hyperlinks and forms in each client page. Based-on the SUT View, test cases are automatically or semiautomatically generated. The generated test cases are described in the Test Case View, that is a model extends UML sequence diagram. Each test case is a sequence of client pages to be accessed. After that, the process and environment of test execution are modeled in the Test Execution View. In the test execution view, two kinds of models are defined: the test deployment model that extends the deployment diagram of UML2, and the test control model that extends the UML activity diagram. After the execution engine automatically executes test cases based-on models described in the Test Execution View, Finally test results are represented in the Test Result View. Test result model is defined to save and present test results. And besides being shown in reports, test results would be associated with test case models. But current frameworks have two major problems: (1) they concentrate on special aspects of testing and there is no general framework that contains all elements and types of testing for web-based applications, and (2) application developers don t like to share their internal information, models and source codes with others (including external application testers) and this makes white box testing so difficult or even impossible. In this paper we have proposed a framework that solves these two problems. This framework has been explained in section 2.
3 Framework Test Executer Test Oracle Test Case Generator Recorder Web Application Ontology Wrapper Web Application User Sessions Uses Figure 1. Architecture of the proposed framework 3. The General Framework In this section we review our proposed framework for software testing. The general framework and its components have been shown in figure 1. STOL language: As the components of the framework has to exchange information with each other (and with the external world), we require a common language for this purpose. We define STOL (Software Testing Ontology Language), an XMLbased language with the required terms and relations (ontology) for software testing. It has been used for explaining program models, test case input ranges, etc. Testers: various testers included in the framework for different purposes. Before we examine these testers in detail, note that these testers belong to different strategies: Black Box, White Box and Grey Box testing. In the case of Black Box testing, the tester directly communicates with the application itself. But in the other two cases, additional information needed that must be provided by the programmer or directly extracted from the source code. In this situation, the tester communicates with the wrapper of application to obtain the required information (e.g. the application model). The wrapper and its usages will be explained in the following. Here is a nonexhaustive list of testers: - Functional Tester: This is a Black Box tester that checks if the application behaves as expected. This tester simply applies test
4 cases to the application directly, and passes the generated results to the oracle to compare them with the expected behavior. - Code Coverage Tester: this is a White Box tester that determines the adequacy of test cases by assessing the level of coverage of the structure they reach. Two common forms of code coverage are function coverage, which reports on functions executed and statement coverage, which reports on the number of lines executed to complete the test. Besides standard coverage measures, other coverage criteria can be defined for web-based applications that we discuss them in Model-Based tester. As this tester requires an instrumented version of application, it must communicate with the wrapper interface, asking for enabling the instrumented code (see Wrapper below). In some programming languages like java, the instrumentation can be done directly on the object code, hence there is no need to the source code (or the wrapper in our case). - Model-Based Tester: a model describes some aspects of the system under test. The model is usually an abstract presentation of the application s designed behavior. Models have two usages in testing of web applications: automatic generation of test cases (see Test Case Generator below), and structural testing of application. In the latter, a high level representation of application, like the navigation model is used. Navigation model describes a web application using its composing pages (static and dynamic) and navigation links. Using this model, some coverage criteria such as page coverage and hyperlink coverage can be tested, in order to determine the adequacy of test cases. But how the tester acquires the model? The models can be built manually by the application programmer, or created automatically from the application (source) by running a special program. In each case, this is the responsibility of the wrapper to provide this model to the tester (see Wrapper below) via an appropriate interface, using STOL language. - Stress Tester: this is a Black Box testing which checks for the stress the applications can withstand. The idea is to create an environment more demanding than the application would experience under normal work loads, and to see how application responds to this extreme load. - Load Tester: this is a Black Box Testing in which the application is tested against heavy loads or inputs such as testing of web sites in order to find out at what point the application fails or at what point its performance degrades. Load testing operates at a predefined load level, usually the highest load that the system can accept while still functioning properly. - Security Tester: security testing is carried out in order to find out how well the system can protect itself from unauthorized access, hacking, cracking, any code damage etc. In the case of web applications, the application must be tested under familiar attacks like SQL injection, session hijacking, XSS attacks and so on. Test Case Generator: this component generates the inputs to the desired testers. In the case of a web application, test cases consist of URLs, name-value pairs (input data) and user actions (like clicking on a button). This component is a critical part for automating the test process, since we have anticipated four independent modules for this component in the framework. 1. The first module provides record and playback features that allow testers to record interactively user actions and replay it back any number of times (using Executer component), and comparing actual results to those expected (using Oracle component). 2. The second module exploits the user session logs of a web server as a means of generating test cases in a large scale. Each user request logged in the web
5 server usually consists of IP address, time stamp, the requested URL, cookies, name-value pairs in GET/POST requests and the referrer URL. By following the subsequent requests in a predetermined time interval from a particular IP address, a complete user session can be extracted and used as a new test case. 3. The third module uses different models and specifications of the application, like UML models, navigation model, Z- specifications and etc. to generate the test cases. The models or specifications can be obtained from the proper interface of Wrapper, using STOL. 4. And finally, the fourth module uses ontology-based test case generation approach, in which the ontology of the application domain is utilized to generate test data. For instance, in a web forum application, a light-weight ontology can be developed which describes the users, and then, different parts of the application, e.g. form input fields, can be annotated with concepts of this ontology. In such case, test-cases for those parts can be generated automatically based on the ontology. Test Oracle: generates the desired outputs for the test cases and compares the actual results of tests, to the desired ones to determine the degree of success. In the case of web applications, the desired outputs mainly consist of HTTP responses returned from the web server. Generation of the desired outputs depends on the method selected for test case generation. Executer: this component sends the test cases to the web server and receives the responses, and finally sends them to the Oracle to be evaluated. Wrapper: An important problem in whitebox or gray-box testing of an application is the lack of knowledge about internal structure of that application. Most programmers don t share their valuable source codes with other, and this is a problem for tests that require the source code. Because we want to present a framework to provide testing service for external application, we need to tackle with this problem. Our solution is simple: external applications should provide required wrappers to provide enough information for the framework to perform the test. Each time a tester requires a service that is beyond the functional services of the application (i.e. requires the source code), calls the appropriate API of the wrapper and receives that service. Some of theses services are: - Activate the instrumented mode: some testers likes Code Coverage Tester require an instrumented version of application that includes instrumentation codes measure the coverage obtained during test. These testers have to activate the instrumented mode, before starting the test. - Getting various application models: testers like Model-Based Tester require application models (e.g. navigation model) and they can obtain these models by calling this service with the name of their desired model. This service has an API that returns the list of models represented by this service. To produce the wrapper, an application is distributed for each web programming platform (e.g. PHP, Java ). Developers can produce the wrapper by running this application on their source code, and add the resulting codes to their programs. 3. Conclusion and Future Works In this paper a general framework for automatic testing of web-based application has been proposed. This framework contains different testing techniques, including blackbox and white-box testing, which make it a comprehensive testing framework. Also we proposed a Wrapper for each application
6 that provides the required internal information to the testers. This Wrapper solves the problem of lack of trust between application developers and the external testers. Furthermore, we define a language and ontology called STOL (Software Testing Ontology Language) for communication between different parts of the framework. For the future, we plan to (1) Define the details of different components of the framework and connections between them then, (2) implement and test the performance of the framework using current open source tools and programs written by team members. [5] Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu, A Framework of Model- Driven Web Application Testing, Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006 Acknowledgement This work has been supported by a grant by Iran s Telecommunication Research Center (ITRC), which is hereby acknowledged. The authors also appreciate the support of WTLab at FUM. References [1] Filippo Ricca, Paolo Tonella, "Web Testing: a Roadmap for the Empirical Research," wse, pp , Seventh IEEE International Symposium on Web Site Evolution, 2005 [2] Sreedevi Sampath, Valentin Mihaylov, Amie Souter, Lori Pollock, "Composing a Framework to Automate Testing of Operational Web-Based Software," icsm, pp , 20th IEEE International Conference on Software Maintenance (ICSM'04), 2004 [3] Hong Zhu, "A Framework for Service- Oriented Testing of Web Services," compsac, pp , 30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006 [4] P. Dhavachelvan, G.V. Uma, Multiagent-based integrated framework for intraclass Testing of object-oriented software, Applied Soft Computing 5, pp , 2005.
A Framework of Model-Driven Web Application Testing
A Framework of Model-Driven Web Application Testing Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu Software Engineering Institute, School of Computer Science and Engineering, Beihang University, China
Efficient Agent Based Testing Framework for Web Applications
International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Efficient Agent Based Testing Framework for Web Applications Ms.Neha Saluja Prof.Amit Kanskar Abstract- Now
A Platform Independent Testing Tool for Automated Testing of Web Applications
A Platform Independent Testing Tool for Automated Testing of Web Applications December 10, 2009 Abstract Increasing complexity of web applications and their dependency on numerous web technologies has
An Automated Model Based Approach to Test Web Application Using Ontology
An Automated Model Based Approach to Test Web Application Using Ontology Hamideh Hajiabadi, Mohsen Kahani [email protected], [email protected] Computer Engineering Department, Ferdowsi
Ontology-Based Web Application Testing
Ontology-Based Web Application Testing Samad Paydar, Mohsen Kahani Computer Engineering Department, Ferdowsi University of Mashhad [email protected], [email protected] Abstract- Testing Web applications
Testing Techniques applied to AJAX Web Applications
Testing Techniques applied to AJAX Web Applications Alessandro Marchetto 1, Paolo Tonella 1, and Filippo Ricca 2 1 Fondazione Bruno Kessler - IRST, 38050 Povo, Trento, Italy marchetto [email protected] 2
Introduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
Zoomer: An Automated Web Application Change Localization Tool
Journal of Communication and Computer 9 (2012) 913-919 D DAVID PUBLISHING Zoomer: An Automated Web Application Change Localization Tool Wenhua Wang 1 and Yu Lei 2 1. Marin Software Company, San Francisco,
Chapter 5. Regression Testing of Web-Components
Chapter 5 Regression Testing of Web-Components With emergence of services and information over the internet and intranet, Web sites have become complex. Web components and their underlying parts are evolving
Web Application Regression Testing: A Session Based Test Case Prioritization Approach
Web Application Regression Testing: A Session Based Test Case Prioritization Approach Mojtaba Raeisi Nejad Dobuneh 1, Dayang Norhayati Abang Jawawi 2, Mohammad V. Malakooti 3 Faculty and Head of Department
WEB TESTING APPLICATION WITH PHP AUTOMATED TOOL
WEB TESTING APPLICATION WITH PHP AUTOMATED TOOL Iulia Ștefan and Ioan Ivan Department of Automation, Technical University, Cluj-Napoca, Romania [email protected], [email protected] ABSTRACT
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
Benefits of Test Automation for Agile Testing
Benefits of Test Automation for Agile Testing Manu GV 1, Namratha M 2, Pradeep 3 1 Technical Lead-Testing Calsoft Labs, Bangalore, India 2 Assistant Professor, BMSCE, Bangalore, India 3 Software Engineer,
Log Analysis Software Architecture
Log Analysis Software Architecture Contents 1 Introduction 1 2 Definitions 2 3 Software goals 2 4 Requirements 2 4.1 User interaction.......................................... 3 4.2 Log file reading..........................................
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008
Security Testing Eileen Donlon CMSC 737 Spring 2008 Testing for Security Functional tests Testing that role based security functions correctly Vulnerability scanning and penetration tests Testing whether
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Software Engineering. Software Testing. Based on Software Engineering, 7 th Edition by Ian Sommerville
Software Engineering Software Testing Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To discuss the distinctions between validation testing and defect t testing To describe the
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
Quality Assurance Training Program
Quality Assurance Training Program Introduction/Summary: This 5-day course focuses on understanding and developing various skills required by QA Developer, preparing to use various tools and techniques
International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] ISSN: 2349-6495
International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] Survey on Automation Testing Tools for Mobile Applications Dr.S.Gunasekaran 1, V. Bargavi 2 1 Department
TOGAF usage in outsourcing of software development
Acta Informatica Pragensia 2(2), 2013, 68 76, DOI: 10.18267/j.aip.25 Section: Online: aip.vse.cz Peer-reviewed papers TOGAF usage in outsourcing of software development Aziz Ahmad Rais 1, Rudolf Pecinovsky
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING
A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING Ahmet Selman BOZKIR Hacettepe University Computer Engineering Department, Ankara, Turkey [email protected] Ebru Akcapinar
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Delegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
UML-based Test Generation and Execution
UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA [email protected] ABSTRACT
Web and Enterprise Applications Developer Track
Ministry of Communications and Information Technology Information Technology Institute Web and Enterprise Applications Developer Track Intake 35 Historical Background As part of the ITI, the Java TM Education
WebMate: Generating Test Cases for Web 2.0
WebMate: Generating Test Cases for Web 2.0 Valentin Dallmeier, Martin Burger, Tobias Orth, and Andreas Zeller Saarland University, Computer Science Department, Saarbrücken, Germany {dallmeier,mburger,orth,zeller}@st.cs.uni-saarland.de
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Going Faster: Testing The Web Application. By Adithya N. Analysis and Testing of Web Applications Filippo Ricca and Paolo Tonella
Testing Web Applications Testing Web Applications By Adithya N. Going Faster: Testing The Web Application Edward Hieatt and Robert Mee (IEEE Software) Analysis and Testing of Web Applications Filippo Ricca
A Brief Overview of Software Testing Techniques and Metrics
A Brief Overview of Software Techniques and Metrics Anitha.A Programmer, School of Computer Studies (PG), RVS college of Arts & science, Coimbatore, India. Abstract: Software is the process of executing
Finding Execution Faults in Dynamic Web Application
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 445-452 International Research Publications House http://www. irphouse.com /ijict.htm Finding
HP OO 10.X - SiteScope Monitoring Templates
HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,
Test case design techniques II: Blackbox testing CISS
Test case design techniques II: Blackbox testing Overview Black-box testing (or functional testing): Equivalence partitioning Boundary value analysis Domain analysis Cause-effect graphing Behavioural testing
Performing a Web Application Security Assessment
IBM Software Group Performing a Web Application Security Assessment 2007 IBM Corporation Coordinate the Time of the Audit Set up a time window with the application owner Inform your security team Inform
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
K@ A collaborative platform for knowledge management
White Paper K@ A collaborative platform for knowledge management Quinary SpA www.quinary.com via Pietrasanta 14 20141 Milano Italia t +39 02 3090 1500 f +39 02 3090 1501 Copyright 2004 Quinary SpA Index
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
SOFTWARE TESTING TRAINING COURSES CONTENTS
SOFTWARE TESTING TRAINING COURSES CONTENTS 1 Unit I Description Objectves Duration Contents Software Testing Fundamentals and Best Practices This training course will give basic understanding on software
Business Application Services Testing
Business Application Services Testing Curriculum Structure Course name Duration(days) Express 2 Testing Concept and methodologies 3 Introduction to Performance Testing 3 Web Testing 2 QTP 5 SQL 5 Load
Survey of Web Testing Techniques
Survey of Web Testing Techniques Sonal Anand M.Tech (Computer Science) USIT, GGSIPU New Delhi, India Anju Saha Assistant Professor USIT, GGSIPU New Delhi, India ABSTRACT This paper presents a survey of
Oracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
Mobile and Web Applications Developer Track
Ministry of Communications and Information Technology Information Technology Institute Mobile and Web Applications Developer Track Intake 35 Historical Description First Intake was in 2012 (Intake 33)
Implementing a secure high visited web site by using of Open Source softwares. S.Dawood Sajjadi Maryam Tanha. University Putra Malaysia (UPM)
Implementing of an open source high visited web site 1 Implementing a secure high visited web site by using of Open Source softwares S.Dawood Sajjadi Maryam Tanha University Putra Malaysia (UPM) March
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode Haojiang Gao 1 Beijing Northking Technology Co.,Ltd Zhongguancun Haidian Science Park Postdoctoral
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box
Penetration Testing Penetration Testing Types Black Box oless productive, more difficult White Box oopen, team supported, typically internal osource available Gray Box (Grey Box) omixture of the two Methods
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice
Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
SECTION 4 TESTING & QUALITY CONTROL
Page 1 SECTION 4 TESTING & QUALITY CONTROL TESTING METHODOLOGY & THE TESTING LIFECYCLE The stages of the Testing Life Cycle are: Requirements Analysis, Planning, Test Case Development, Test Environment
Model Driven Testing of Web Applications Using Domain Specific Language
Model Driven Testing of Web Applications Using Domain Specific Language Viet-Cuong Nguyen Department of Computer Science and Engineering Faculty of Electrical Engineering Czech Technical University in
Regression Testing of Web Services Using Parsing and Test case Prioritization Approach
Regression Testing of Web Services Using Parsing and Test case Prioritization Approach Shaveta Sehgal Desh Bhagat University,Mandi Gobindgarh Abstract- Web services are the basic building blocks for every
Case Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB
September Case Studies of Running the Platform NetBeans UML Servlet JSP GlassFish EJB In this project we display in the browser the Hello World, Everyone! message created in the session bean with servlets
Model-based approach to design web application testing tool
American Journal of Software Engineering and Applications 2014; 3(5): 63-67 Published online November 20, 2014 (http://www.sciencepublishinggroup.com/j/ajsea) doi: 10.11648/j.ajsea.20140305.12 ISSN: 2327-2473
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
Using Social Networking Sites as a Platform for E-Learning
Using Social Networking Sites as a Platform for E-Learning Mohammed Al-Zoube and Samir Abou El-Seoud Princess Sumaya University for Technology Key words: Social networks, Web-based learning, OpenSocial,
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
WEB APPLICATION VULNERABILITY STATISTICS (2013)
WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most
Web Applications Testing
Web Applications Testing Automated testing and verification JP Galeotti, Alessandra Gorla Why are Web applications different Web 1.0: Static content Client and Server side execution Different components
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers Seyed Ali Mirheidari 1, Sajjad Arshad 2, Saeidreza Khoshkdahan 3, Rasool Jalili 4 1 Computer Engineering Department, Sharif
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Design of automatic testing tool for railway signalling systems software safety assessment
Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research
COURSE RECOMMENDER SYSTEM IN E-LEARNING
International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
Software Architecture Document
Software Architecture Document Natural Language Processing Cell Version 1.0 Natural Language Processing Cell Software Architecture Document Version 1.0 1 1. Table of Contents 1. Table of Contents... 2
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
GUI Test Automation How-To Tips
www. routinebot.com AKS-Labs - Page 2 - It s often said that First Impression is the last impression and software applications are no exception to that rule. There is little doubt that the user interface
The preliminary design of a wearable computer for supporting Construction Progress Monitoring
The preliminary design of a wearable computer for supporting Construction Progress Monitoring 1 Introduction Jan Reinhardt, TU - Dresden Prof. James H. Garrett,Jr., Carnegie Mellon University Prof. Raimar
AUTOMATE CRAWLER TOWARDS VULNERABILITY SCAN REPORT GENERATOR
AUTOMATE CRAWLER TOWARDS VULNERABILITY SCAN REPORT GENERATOR Pragya Singh Baghel United College of Engineering & Research, Gautama Buddha Technical University, Allahabad, Utter Pradesh, India ABSTRACT
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
An Automated Testing Tool Using UI Structure
, March 12-14, 2014, Hong Kong An Automated Testing Tool Using UI Structure Nutharat Harnvorawong, Taratip Suwannasart, Member, IAENG Abstract Testers usually run a new version of software against existing
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Software testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
PHP FRAMEWORK FOR DATABASE MANAGEMENT BASED ON MVC PATTERN
PHP FRAMEWORK FOR DATABASE MANAGEMENT BASED ON MVC PATTERN Chanchai Supaartagorn Department of Mathematics Statistics and Computer, Faculty of Science, Ubon Ratchathani University, Thailand [email protected]
