Black Box Software Testing Fall 2004

Slides:



Advertisements
Similar presentations
Black Box Software Testing Copyright © Cem Kaner & James Bach 1 Black Box Software Testing Spring 2005 Part 4 -- QUALITY COST ANALYSIS by Cem Kaner,
Advertisements

Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Fall 2004 PART PAIRED EXPLORATORY TESTING by Cem.
09/18/06 1 Software Security Vulnerability Testing in Hostile Environment Herbert H. Thompson James A. Whittaker Florence E. Mottay.
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Fall 2004 Part RECRUITING TESTERS by Cem Kaner, J.D.,
ET Workshop v Opening©2002 Amland Consulting0-1 Exploratory Testing v Workshop in Risk-Based Agile Testing Parts of this class have been.
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Fall 2004 Part Exercises by Cem Kaner, J.D., Ph.D.
Copyright (c) Cem Kaner Black Box Software Testing (Academic Course - Fall 2001) Cem Kaner, J.D., Ph.D. Florida Institute of Technology Section:
Copyright (c) Cem Kaner Black Box Software Testing (Academic Course - Fall 2001) Cem Kaner, J.D., Ph.D. Florida Institute of Technology Section:
Simulink SubSystems and Masking April 22, Copyright , Andy Packard. This work is licensed under the.
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing 2004 Academic Edition PART SCRIPTING: AN INDUSTRY.
Black Box Software Testing Copyright © Cem Kaner & James Bach 1 Black Box Software Testing Spring 2005 by Cem Kaner, J.D., Ph.D. Professor of.
Black Box Software Testing Copyright © Cem Kaner & James Bach 1 Black Box Software Testing Fall 2005 Overview—Part 2 (Mission of Testing) Cem Kaner,
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Fall 2004 PART USER TESTING by Cem Kaner, J.D., Ph.D.
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Spring 2005 PART 7 -- FUNCTION TESTING by Cem Kaner, J.D.,
Black Box Software Testing Copyright © Cem Kaner & James Bach 1 Black Box Software Testing Fall 2005 Overview for Students Cem Kaner, J.D., Ph.D.
Copyright (c) Cem Kaner. All Rights Reserved. 1 Black Box Software Testing (Professional Seminar) Cem Kaner, J.D., Ph.D. Professor of Computer.
Copyright (c) Cem Kaner. All Rights Reserved. 1 Black Box Software Testing (Professional Seminar) Cem Kaner, J.D., Ph.D. Professor of Computer.
Black Box Software Testing Copyright © Cem Kaner & James Bach 1 Black Box Software Testing Fall 2005 Overview—Part 3 (Test oracles) Cem Kaner,
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Fall 2004 PART 7 -- TEST DESIGN by Cem Kaner, J.D., Ph.D.
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Fall 2004 PART 6 -- SCENARIO TESTING by Cem Kaner, J.D.,
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Fall 2004 PART STOCHASTIC TESTING by Cem Kaner, J.D.,
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing 2004 Academic Edition Part EDITING BUGS by Cem Kaner,
Session # Rational User Conference 2002 Author Note: To edit Session # go to: View/Master/Title Master ©1998, 1999, 2000, 2001, 2002 Rational Software.
Copyright (c) Cem Kaner Black Box Software Testing (Academic Course - Fall 2001) Cem Kaner, J.D., Ph.D. Florida Institute of Technology Section:
Black Box Software Testing Copyright © Cem Kaner & James Bach 1 Black Box Software Testing Spring 2005 REGRESSION TESTING by Cem Kaner, J.D., Ph.D.
You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1.
Copyright (c) Cem Kaner Black Box Software Testing (Academic Course - Fall 2001) Cem Kaner, J.D., Ph.D. Florida Institute of Technology Section:
Copyright (c) Cem Kaner. All Rights Reserved. 1 Black Box Software Testing (Professional Seminar) Cem Kaner, J.D., Ph.D. Professor of Computer.
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Fall 2004 PART REGRESSION TESTING by Cem Kaner, J.D.,
Copyright (c) Cem Kaner. All Rights Reserved. 1 Black Box Software Testing (Professional Seminar) Cem Kaner, J.D., Ph.D. Professor of Computer.
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Copyright Crash Course Laura Rivera EDTC
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Spring 2005 PART 8 -- TEST DESIGN by Cem Kaner, J.D., Ph.D.
Black Box Software Testing Copyright © Cem Kaner & James Bach 1 Black Box Software Testing Fall 2004 by Cem Kaner, J.D., Ph.D. Professor of Software.
Copyright (c) Cem Kaner. All Rights Reserved. 1 Black Box Software Testing (Professional Seminar) Cem Kaner, J.D., Ph.D. Professor of Computer.
Lesson Title: RFID Nominal Read Range in Far Field Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Black Box Software Testing (Professional Seminar)
Black Box Software Testing Spring 2005
CSCE 548 Secure Software Development Risk-Based Security Testing
Security Testing Methods
Black Box Software Testing 2004 Academic Edition
Black Box Software Testing Spring 2005
Black Box Software Testing (Academic Course - Fall 2001)
Black Box Software Testing Fall 2004
For/Switch/While/Try UC Berkeley Fall 2004, E77 me
Features Catalyst is the releng building tool It's used to build official releases Is being used to build weekly releases for > 2 years Supports many arches.
Discussion and Conclusion
Class Info E177 January 22, me. berkeley
Critical - thinking Assessment Test (CAT)
Lesson Title: Reader Architecture and Antenna Configurations
Title of Poster Site Visit 2017 Introduction Results
Title of session For Event Plus Presenters 12/5/2018.
Black Box Software Testing Fall 2005 Overview – Part 1 of 3
Black Box Software Testing 2004 Academic Edition
Copyright © 2008 by Dale R. Thompson Dale R. Thompson
Black Box Software Testing (Academic Course - Fall 2001)
Efficient Memory Safety for TinyOS 2.1
Black Box Software Testing (Academic Course - Fall 2001)
Black Box Software Testing (Academic Course - Fall 2001)
Class Intro/TDD Intro 8/23/2005
Function Handles UC Berkeley Fall 2004, E Copyright 2005, Andy Packard
Black Box Software Testing Fall 2005 Overview—Part 3 (Test oracles) Cem Kaner, J.D., Ph.D. Professor of Software Engineering Florida Institute of Technology.
Black Box Software Testing (Professional Seminar)
Title of Poster Site Visit 2018 Introduction Results
Code vulnerabilities Vulnerabilities are mistakes, errors or weaknesses in a piece of software’s source code that can be directly used by a hacker to perform.
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Black Box Software Testing (Professional Seminar)
Exploring Exploratory Testing
Basics of Matlab UC Berkeley Fall 2004, E Copyright 2005, Andy Packard
Presentation transcript:

Black Box Software Testing Fall 2004 PART 13 -- STRESS TESTING by Cem Kaner, J.D., Ph.D. Professor of Software Engineering Florida Institute of Technology and James Bach Principal, Satisfice Inc. Copyright (c) Cem Kaner & James Bach, 2000-2004 This work is licensed under the Creative Commons Attribution-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. These notes are partially based on research that was supported by NSF Grant EIA-0113539 ITR/SY+PE: "Improving the Education of Software Testers." Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Stress Testing: Readings Schneier, Cryptogram Whittaker & Jorgenson, How to Break Software

Stress Testing Tag line “Overwhelm the product.” Fundamental question or goal Learn about the capabilities and weaknesses of the product by driving it through failure and beyond. What does failure at extremes tell us about changes needed in the program’s handling of normal cases? Paradigmatic case(s) Buffer overflow bugs High volumes of data, device connections, long transaction chains Low memory conditions, device failures, viruses, other crises. Strengths Expose weaknesses that will arise in the field. Expose security risks. Perhaps good for assessing performance, reliability, or efficiency. Blind spots Weaknesses that are not made more visible by stress. Tandem: db operation, take out a disk drive; one day rocked the system until it fell over and then checked for errors “Earthquakes happen…” [“Guy pulled the wings off software”] Used in security testing Extrapolate from the extreme cases to see if there are lessons to apply to normal cases. Looking for things the programmer missed.

Stress testing Look for functions or sub-systems of the product that may be vulnerable to failure due to challenging input or constrained resources. Identify input or resources related to those functions or sub-systems. Select or generate challenging data and platform configurations to test with: e.g., large or complex data structures, high loads, long test runs, many test cases, limited memory, etc. Force the program to fail, watch how it fails, report the vulnerability