The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents User Interface Test Automation of Silverlight and Moonlight web applications. Silverlight is a new technology in Dot Net 3.5 framework developed by Microsoft. Moonlight is an equivalent technology for Linux operating system. Now a day most of the interactive and attractive web pages are developed using Silverlight and Moonlight. So in is paper we initially concentrating on user...
Web 2.0 applications are increasing in popularity. However, they are also prone to errors because of their dynamic nature. This paper presents DoDOM, an automated system for testing the robustness of Web 2.0 applications based on their Document Object Models (DOMs). DoDOM repeatedly executes the application under a trace of recorded user actions and observes the client-side behavior of the application...
Cross-browser (and cross-platform) issues are prevalent in modern web based applications and range from minor cosmetic bugs to critical functional failures. In spite of the relevance of these issues, cross-browser testing of web applications is still a fairly immature field. Existing tools and techniques require a considerable manual effort to identify such issues and provide limited support to developers...
Virtual users with high quality are the preconditions to ensure the effect of load testing for Web applications. The existed tools for load testing usually generate virtual users with randomly choosing user sessions, manually generating user sessions or mining Log files, which causing such problems as non-real workload, subjectivity or difficult to update. Therefore we set each virtual user with a...
As the quantity and breadth of Web-based software systems continue to grow rapidly, it is becoming critical to assure the quality and reliability of a Web application. Web application testing is a challenging work owing to its dynamic behaviors and complex dependencies. Test case generation, in general, is costly and labor-intensive processes. How to automatically generate effective test case is important...
This paper proposes a new model checking-based test generation approach for Web applications. The Kripke structure is reconstructed to model the Web application from the end users' perspective. Test coverage criterion is expressed as trap properties in CTL so that counterexamples can be instantiated to construct test cases. But a counterexample for each trap property is generated will result in too...
Phishing is a web-based attack where users are allured to visit fake websites and provide their personal information. Traditional anti-phishing tools are successful to mitigate the attack partially. Most of the tools are focused on protecting users. However, there exists lack of efforts to help anti-phishing professionals who manually verify a reported phishing site and take further actions. Moreover,...
As our awareness of the complexities inherent in web applications grows, we find an increasing need for more sophisticated ways to test them. Many web application faults are a result of how web software components interact; sometimes client-server and sometimes server-server. This paper presents a novel solution to the problem of integration testing of web applications by using mutation analysis....
The rapid and growing diffusion of Rich Internet Applications (RIAs) with their enhanced interactivity, responsiveness and dynamicity is sharpening the distance between Web applications and desktop applications, making the Web experience more and more appealing and user-friendly. This paper presents a technique for testing RIAs that generates test cases from application execution traces, and obtains...
This work proposes an on-the-fly testing approach for Web applications based on automaton theory. Web applications and test directives which are used to select test cases are modeled by FSM (Finite State Machine). Synchronous product is used to combine these two kinds of FSMs in order to check whether the SUT (System Under Test) includes the behavior expressed by the test directive. Test cases are...
With conventional regression test tools for Web applications, it is difficult to specify the values to be verified that are repeatedly output inside loop statements. This paper presents a method that automates a regression test of a Web application on the server side. This method makes it easy to specify values to be verified when we develop Web applications, and enables us to directly check the verification...
A testing approach based on FSM and UML for Web applications is proposed in this paper in order to generate test cases automatically. Web applications are modeled using FSM and the test purpose which is a partial behavior of the SUT (system under testing) are specified by UML sequence diagrams, which can be converted automatically into FSM. Synchronous product is used to combine these two kinds of...
As more and more services and information are made available over the Internet and Intranet, Web sites have become extraordinarily complex, while their correctness and reliability are often crucial to the success of businesses and organizations. Additionally, the behavior of the Web browsers may have impact on the correctness of the Web applications: a Web application providing all correct functionality...
Web testing is a promising technique to ensure the high quality of Web applications. This work regards a Web application as the composition of different interacting components. A composite component consists of several other components. A Component Interaction Diagram (CID) is constructed from the specification of the Web application under test. The CID is described in XML fashion. For each component,...
The paper proposes a new test model, Call-For-Testing (CFT), and applies it to User Acceptance Testing (UAT) of Web Applications. Different from traditional approaches, UAT in the context of CFT only means beta-testing on the site or field, i.e., by customers or end-users, and does not include alpha-testing which is supervised or performed by the system provider. CFT model leverages open community...
Any model-based evaluation of the dependability of a system requires validation and verification to justify that its results are meaningful. Modern modeling frameworks enable us to create and evaluate models of great complexity. However, we believe that much more can be done to support a modeler in ensuring that the dynamic behavior of an executable simulation model is consistent with the modeler's...
Database has been widely used in Web applications and database interactions influence the navigations of Web applications. Besides, database interactions are among the most essential functional features in current Web applications. In this paper, special care is taken on database interactions in modeling and testing Web applications. GFSMs (Guarded Finite State Machines), which are augmented FSMs...
Web applications become more and more complex. Thus, systematic approaches for Web application testing are needed. Existing methods take into consideration only those actions provided by the application itself and do not involve actions provided by the browser, such as the usage of backward and forward buttons. Base on existing testing techniques, this paper addresses an approach to discovering possible...
In this paper, we describe our experience with automated testing of a mission-critical internal Voice-over-IP (VoIP) conferencing application which presents a web interface as well as a voice interface. We document the challenges that we had to overcome when testing this application and then present our solution using open source testing tools. The lessons learned from this experience may be applicable...
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application. Identifying the input vectors of a Web application and checking the results of an attack are important parts of penetration testing, as they indicate where an attack could be introduced and whether an attempted attack was...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.