csrc.nist.gov Open in urlscan Pro
2600:1f18:268d:1ddd:fd96:dcaa:cf17:f2b2  Public Scan

Submitted URL: http://csrc.nist.gov/groups/SNS/acts/documents/kuhn-kacker-lei-hunter09.pdf
Effective URL: https://csrc.nist.gov/publications/detail/journal-article/2009/combinatorial-software-testing
Submission: On February 27 via api from CH — Scanned from DE

Form analysis 2 forms found in the DOM

Name: site-searchGET /search

<form name="site-search" id="site-search-form" action="/search" method="GET">
  <label for="search-csrc-query" class="element-invisible">Search</label>
  <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC">
  <input type="hidden" name="ipp" value="25">
  <input type="hidden" name="sortBy" value="relevance">
  <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics">
  <input type="hidden" name="topicsMatch" value="ANY">
  <input type="hidden" name="status" value="Final,Draft">
  <input type="hidden" name="series" value="FIPS,SP,NISTIR,ITL Bulletin,White Paper,Building Block,Use Case,Journal Article,Conference Paper,Book">
  <button type="submit" id="search-csrc-submit-btn" class="form-submit">
    <span class="element-invisible">Search</span>
    <i class="fa fa-search"></i>
  </button>
</form>

Name: site-search-mobileGET /search

<form name="site-search-mobile" id="site-search-form-mobile" action="/search" method="GET">
  <label for="search-csrc-query-mobile" class="element-invisible">Search</label>
  <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC">
  <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit">
    <span class="element-invisible">Search</span>
    <i class="fa fa-search"></i>
  </button>
</form>

Text Content

You are viewing this page in an unauthorized frame window.

This is a potential security issue, you are being redirected to
https://csrc.nist.gov.

You have JavaScript disabled. This site requires JavaScript to be enabled for
complete site functionality.

  An official website of the United States government Here's how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share
sensitive information only on official, secure websites.

Search Search
CSRC MENU
Search Search
 * Projects
 * Publications Expand or Collapse
   
   Drafts for Public Comment
   
   All Public Drafts
   
   Final Pubs
   
   FIPS
   
   Special Publications (SPs)
   
   NISTIRs
   
   ITL Bulletins
   
   White Papers
   
   Journal Articles
   
   Conference Papers
   
   Books

 * Topics Expand or Collapse
   
   Security & Privacy
   
   Applications
   
   Technologies
   
   Sectors
   
   Laws & Regulations
   
   Activities & Products

 * News & Updates
 * Events
 * Glossary
 * About CSRC Expand or Collapse
   
   Computer Security Division
   
   
    * Cryptographic Technology
    * Secure Systems and Applications
    * Security Components and Mechanisms
    * Security Engineering and Risk Management
    * Security Testing, Validation, and Measurement
   
   
   
   Applied Cybersecurity Division
   
   
    * Cybersecurity and Privacy Applications
    * National Cybersecurity Center of Excellence (NCCoE)
    * National Initiative for Cybersecurity Education (NICE)
   
   
   
   Contact Us

Information Technology Laboratory
Computer Security Resource Center

Publications


JOURNAL ARTICLE


COMBINATORIAL SOFTWARE TESTING

Share to Facebook Share to Twitter

    Documentation     Topics

Published: August 07, 2009
Citation: Computer (IEEE Computer) vol. 42, no. 8, (August 2009) pp. 94-96


AUTHOR(S)

Richard Kuhn (NIST), Raghu Kacker (NIST), Yu Lei (UTA), Justin Hunter (Hexawise)

ANNOUNCEMENT



ABSTRACT

Developers of large data-intensive software often notice an interesting – though
not surprising – phenomenon: when usage of an application jumps dramatically,
components that have operated for months without trouble suddenly develop
previously undetected errors. For example, newly added customers may have
account records with an oddball combination of values that have not been seen
before. Some of these rare combinations trigger faults that have escaped
previous testing and extensive use. Or, the application may have been installed
on a different OS-hardware-DBMS-networking platform. Combinatorial testing,
which exercises all t-way combinations up to a pre-specified level of t, can
help find problems like this early in the testing life-cycle.

Developers of large data-intensive software often notice an interesting – though
not surprising – phenomenon: when usage of an application jumps dramatically,
components that have operated for months without trouble suddenly develop
previously undetected errors. For example, newly added customers... See full
abstract

Developers of large data-intensive software often notice an interesting – though
not surprising – phenomenon: when usage of an application jumps dramatically,
components that have operated for months without trouble suddenly develop
previously undetected errors. For example, newly added customers may have
account records with an oddball combination of values that have not been seen
before. Some of these rare combinations trigger faults that have escaped
previous testing and extensive use. Or, the application may have been installed
on a different OS-hardware-DBMS-networking platform. Combinatorial testing,
which exercises all t-way combinations up to a pre-specified level of t, can
help find problems like this early in the testing life-cycle.


Hide full abstract

KEYWORDS

combinatorial methods; combinatorial testing; software assurance; software
testing

CONTROL FAMILIES

None selected

DOCUMENTATION

Publication:
Journal Article (DOI)


Supplemental Material:
None available


Document History:
08/07/09: Journal Article (Final)


TOPICS

Security and Privacy
assurance; testing & validation

Technologies
software & firmware


HEADQUARTERS
100 Bureau Drive
Gaithersburg, MD 20899
 * twitter (link is external)
 * facebook (link is external)
 * linkedin (link is external)
 * instagram (link is external)
 * youtube (link is external)
 * rss
 * govdelivery (link is external)

Want updates about CSRC and our publications? Subscribe



Contact Us | Our Other Offices

Send inquiries to csrc-inquiry@nist.gov
 * Site Privacy
 * Accessibility
 * Privacy Program
 * Copyrights
 * Vulnerability Disclosure
 * No Fear Act Policy
 * FOIA
 * Environmental Policy
 * Scientific Integrity
 * Information Quality Standards
 * Commerce.gov
 * Science.gov
 * USA.gov
 * Vote.gov