csrc.nist.gov
Open in
urlscan Pro
2600:1f18:268d:1ddd:fd96:dcaa:cf17:f2b2
Public Scan
Submitted URL: http://csrc.nist.gov/groups/SNS/acts/documents/kuhn-kacker-lei-hunter09.pdf
Effective URL: https://csrc.nist.gov/publications/detail/journal-article/2009/combinatorial-software-testing
Submission: On February 27 via api from CH — Scanned from DE
Effective URL: https://csrc.nist.gov/publications/detail/journal-article/2009/combinatorial-software-testing
Submission: On February 27 via api from CH — Scanned from DE
Form analysis
2 forms found in the DOMName: site-search — GET /search
<form name="site-search" id="site-search-form" action="/search" method="GET">
<label for="search-csrc-query" class="element-invisible">Search</label>
<input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC">
<input type="hidden" name="ipp" value="25">
<input type="hidden" name="sortBy" value="relevance">
<input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics">
<input type="hidden" name="topicsMatch" value="ANY">
<input type="hidden" name="status" value="Final,Draft">
<input type="hidden" name="series" value="FIPS,SP,NISTIR,ITL Bulletin,White Paper,Building Block,Use Case,Journal Article,Conference Paper,Book">
<button type="submit" id="search-csrc-submit-btn" class="form-submit">
<span class="element-invisible">Search</span>
<i class="fa fa-search"></i>
</button>
</form>
Name: site-search-mobile — GET /search
<form name="site-search-mobile" id="site-search-form-mobile" action="/search" method="GET">
<label for="search-csrc-query-mobile" class="element-invisible">Search</label>
<input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC">
<button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit">
<span class="element-invisible">Search</span>
<i class="fa fa-search"></i>
</button>
</form>
Text Content
You are viewing this page in an unauthorized frame window. This is a potential security issue, you are being redirected to https://csrc.nist.gov. You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality. An official website of the United States government Here's how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. Search Search CSRC MENU Search Search * Projects * Publications Expand or Collapse Drafts for Public Comment All Public Drafts Final Pubs FIPS Special Publications (SPs) NISTIRs ITL Bulletins White Papers Journal Articles Conference Papers Books * Topics Expand or Collapse Security & Privacy Applications Technologies Sectors Laws & Regulations Activities & Products * News & Updates * Events * Glossary * About CSRC Expand or Collapse Computer Security Division * Cryptographic Technology * Secure Systems and Applications * Security Components and Mechanisms * Security Engineering and Risk Management * Security Testing, Validation, and Measurement Applied Cybersecurity Division * Cybersecurity and Privacy Applications * National Cybersecurity Center of Excellence (NCCoE) * National Initiative for Cybersecurity Education (NICE) Contact Us Information Technology Laboratory Computer Security Resource Center Publications JOURNAL ARTICLE COMBINATORIAL SOFTWARE TESTING Share to Facebook Share to Twitter Documentation Topics Published: August 07, 2009 Citation: Computer (IEEE Computer) vol. 42, no. 8, (August 2009) pp. 94-96 AUTHOR(S) Richard Kuhn (NIST), Raghu Kacker (NIST), Yu Lei (UTA), Justin Hunter (Hexawise) ANNOUNCEMENT ABSTRACT Developers of large data-intensive software often notice an interesting – though not surprising – phenomenon: when usage of an application jumps dramatically, components that have operated for months without trouble suddenly develop previously undetected errors. For example, newly added customers may have account records with an oddball combination of values that have not been seen before. Some of these rare combinations trigger faults that have escaped previous testing and extensive use. Or, the application may have been installed on a different OS-hardware-DBMS-networking platform. Combinatorial testing, which exercises all t-way combinations up to a pre-specified level of t, can help find problems like this early in the testing life-cycle. Developers of large data-intensive software often notice an interesting – though not surprising – phenomenon: when usage of an application jumps dramatically, components that have operated for months without trouble suddenly develop previously undetected errors. For example, newly added customers... See full abstract Developers of large data-intensive software often notice an interesting – though not surprising – phenomenon: when usage of an application jumps dramatically, components that have operated for months without trouble suddenly develop previously undetected errors. For example, newly added customers may have account records with an oddball combination of values that have not been seen before. Some of these rare combinations trigger faults that have escaped previous testing and extensive use. Or, the application may have been installed on a different OS-hardware-DBMS-networking platform. Combinatorial testing, which exercises all t-way combinations up to a pre-specified level of t, can help find problems like this early in the testing life-cycle. Hide full abstract KEYWORDS combinatorial methods; combinatorial testing; software assurance; software testing CONTROL FAMILIES None selected DOCUMENTATION Publication: Journal Article (DOI) Supplemental Material: None available Document History: 08/07/09: Journal Article (Final) TOPICS Security and Privacy assurance; testing & validation Technologies software & firmware HEADQUARTERS 100 Bureau Drive Gaithersburg, MD 20899 * twitter (link is external) * facebook (link is external) * linkedin (link is external) * instagram (link is external) * youtube (link is external) * rss * govdelivery (link is external) Want updates about CSRC and our publications? Subscribe Contact Us | Our Other Offices Send inquiries to csrc-inquiry@nist.gov * Site Privacy * Accessibility * Privacy Program * Copyrights * Vulnerability Disclosure * No Fear Act Policy * FOIA * Environmental Policy * Scientific Integrity * Information Quality Standards * Commerce.gov * Science.gov * USA.gov * Vote.gov