Search Results - "Kleine, Kristoffer"
-
1
Algorithmic methods for covering arrays of higher index
Published in Journal of combinatorial optimization (2023)“…Covering arrays are combinatorial objects used in testing large-scale systems to increase confidence in their correctness. To do so, each interaction of at…”
Get full text
Journal Article -
2
An Efficient Design and Implementation of the In-Parameter-Order Algorithm
Published in Mathematics in computer science (01-03-2018)“…The In-Parameter-Order-General algorithm is one of the most widely used algorithms for covering array generation. It has found wide adoption in the field of…”
Get full text
Journal Article -
3
Testing TLS using planning-based combinatorial methods and execution framework
Published in Software quality journal (01-06-2019)“…The TLS protocol is the standard for secure Internet communication between two parties. Unfortunately, there have been recently successful attacks like DROWN,…”
Get full text
Journal Article -
4
CAGEN: A fast combinatorial test generation tool with support for constraints and higher-index arrays
Published in 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-10-2020)“…In recent years, combinatorial testing methods have been successfully applied to test systems with a larger number of input parameters. Generating…”
Get full text
Conference Proceeding -
5
Coveringcerts: Combinatorial Methods for X.509 Certificate Testing
Published in 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST) (01-03-2017)“…Correct behaviour of X.509 certificate validation code in SSL/TLS implementations is crucial to ensure secure communication channels. Recently, there have been…”
Get full text
Conference Proceeding -
6
CAMETRICS: A Tool for Advanced Combinatorial Analysis and Measurement of Test Sets
Published in 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-04-2018)“…Combinatorial testing (CT) has established itself as an efficient and effective approach for generating test sets, guaranteeing that all interactions of…”
Get full text
Conference Proceeding -
7
Planning-Based Security Testing of the SSL/TLS Protocol
Published in 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-03-2017)“…With a growing amount of transferred data in an interconnected world, the insurance of a secure communication between two peers becomes a critical task in the…”
Get full text
Conference Proceeding -
8
TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach
Published in 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS) (01-08-2016)“…We present a coverage measurement for TLS cipher suites recommendations provided by various regulatory and intelligence organizations such as the IETF,…”
Get full text
Conference Proceeding