A Technique for Risk-Based Test Procedure Identification, Prioritization and Selection | SpringerLink
Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8803))

  • 1481 Accesses

Abstract

We present a technique for risk-based test procedure identification, prioritization, and selection. The technique takes a risk model in the form of a risk graph as input, and produces a list of prioritized selected test procedures as output. The technique is general in the sense that it can be used with many existing risk documentation languages and many kinds of likelihood and risk types.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bach, J.: Heuristic risk-based testing. Software Testing and Quality Engineering Magazine 11, 9 (1999)

    Google Scholar 

  2. Bai, X., Kenett, R.S.: Risk-based adaptive group testing of semantic web services. In: Proc. of the 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC), pp. 485–490. IEEE Computer Society (2009)

    Google Scholar 

  3. Brændeland, G., Refsdal, A., Stølen, K.: Modular analysis and modelling of risk scenarios with dependencies. Journal of Systems and Software 83(10), 1995–2013 (2010)

    Article  Google Scholar 

  4. Casado, R., Tuya, J., Younas, M.: Testing long-lived web services transactions using a risk-based approach. In: Proc. 10th International Conference on Quality Software (QSIC), pp. 337–340. IEEE Computer Society (2010)

    Google Scholar 

  5. Charniac, E.: Bayesian networks without tears: making bayesian networks more accessible to the probabilistically unsophisticated. AI Magazine 12(4), 50–63 (1991)

    Google Scholar 

  6. Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: Proc. of the 2002 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 2002, p. 1. IBM Press (2002)

    Google Scholar 

  7. Felderer, M., Haisjackl, C., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing. In: Biffl, S., Winkler, D., Bergsmann, J. (eds.) SWQD 2012. LNBIP, vol. 94, pp. 159–180. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. Gleirscher, M.: Hazard-based selection of test cases. In: Proc. of the 6th International Workshop on Automation of Software Test, pp. 64–70. ACM (2011)

    Google Scholar 

  9. International Electrotechnical Commission. Event Tree Analysis in Dependability Management - Part 3: Application Guide - Section 9: Risk Analysis of Technological Systems. IEC 60300 (1990)

    Google Scholar 

  10. International Electrotechnical Commission. IEC 61025 Fault Tree Analysis, FTA (1990)

    Google Scholar 

  11. Kloos, J., Hussain, T., Eschbach, R.: Risk-based testing of safety-critical embedded systems driven by fault tree analysis. In: Proc. of IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 26–33. IEEE (2011)

    Google Scholar 

  12. Kumar, N., Sosale, D., Konuganti, S.N., Rathi, A.: Enabling the adoption of aspects - testing aspects: A risk model, fault model and patterns. In: Proc. of the 8th ACM International Conference on Aspect-oriented Software Development, AOSD 2009, pp. 197–206. ACM (2009)

    Google Scholar 

  13. Lund, M.S., Solhaug, B., Stølen, K.: Model Driven Risk Analysis - The CORAS Approach. Springer (2011)

    Google Scholar 

  14. Murthy, K.K., Thakkar, K.R., Laxminarayan, S.: Leveraging risk based testing in enterprise systems security validation. In: Proc. of the First International Conference on Emerging Network Intelligence, pp. 111–116. IEEE Computer Society (2009)

    Google Scholar 

  15. Redmill, F.: Exploring risk-based testing and its implications: Research articles. Softw. Test. Verif. Reliab. 14(1), 3–15 (2004)

    Article  Google Scholar 

  16. Redmill, F.: Theory and practice of risk-based testing. Software Testing, Verification and Reliability 15(1), 3–20 (2005)

    Article  Google Scholar 

  17. Redmill, F., Chudleigh, M.F., Catmur, J.R.: Principles underlying a guideline for applying HAZOP to programmable electronic systems. Reliability Engineering and System Safety 55(3), 283–293 (1997)

    Article  Google Scholar 

  18. Rosenberg, L., Stapko, R., Gallo, A.: Risk-based object oriented testing. In: Proc. of the 24th Annual Software Engineering Workshop. NASA (1999)

    Google Scholar 

  19. Schneider, B.: Attack trees: modeling security threats. Dr. Dobb’s Journal of Software Tools 24(12), 21–29 (1999)

    Google Scholar 

  20. Souza, E., Gusmão, C., Venancio, J.: Risk-based testing: A case study. In: Proc. of ITNG, pp. 1032–1037. IEEE Computer Society (2010)

    Google Scholar 

  21. Souza, E., Gusmão, C., Venancio, J., Alves, K., Melo, R.: Measurement and control for risk-based test cases and activities. In: Proc. of Test Workshop (LATW 2009), pp. 1–6. IEEE (2009)

    Google Scholar 

  22. Stallbaum, H., Metzger, A., Pohl, K.: An automated technique for risk-based test case generation and prioritization. In: Proc. of the 3rd International Workshop on Automation of Software Test, pp. 67–70. ACM (2008)

    Google Scholar 

  23. Wong, W.E., Qi, Y., Cooper, K.: Source code-based software risk assessing. In: Proc. of the 2005 ACM Symposium on Applied Computing, SAC 2005, pp. 1485–1490. ACM (2005)

    Google Scholar 

  24. Zech, P., Felderer, M., Breu, R.: Towards a model based security testing approach of cloud computing environments. In: 2012 IEEE Sixth International Conference on Software Security and Reliability Companion (SERE-C), pp. 47–56. IEEE (2012)

    Google Scholar 

  25. Zech, P., Felderer, M., Breu, R.: Towards risk - driven security testing of service centric systems. In: QSIC, pp. 140–143. IEEE (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seehusen, F. (2014). A Technique for Risk-Based Test Procedure Identification, Prioritization and Selection. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications. ISoLA 2014. Lecture Notes in Computer Science, vol 8803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45231-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45231-8_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45230-1

  • Online ISBN: 978-3-662-45231-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics