1999
DOI: 10.1007/3-540-49059-0_22
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Testing Using a Communication Protocol Conformance Testing Tool

Abstract: We present an experiment which has demonstrated that methods and tools developed in the context of black box conformance testing of communication protocols can be efficiently used for testing the cache coherency protocol of a hardware multi-processor architecture. We have used the automatic conformance tests generator tgv developed by IN-RIA to generate abstract tests and we have developed a software in order to make them executable in the real test environment of Bull. The tgv approach has been considered by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2001
2001
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Among the case studies listed on the CADP web site, the tools are most frequently used for the formal specification and modeling of a system, which are then verified by model checking temporal logic properties and/or equivalence checking against a reference model (e.g., the expected service of a protocol). Some case studies additionally take advantage of more specific tools, e.g., for performance evaluation [18,3,11,7,9,14,45,55], (conformance) test generation [33,12,28,51,54,8,29,41,35,5], or generation of an executable prototype from the formal model [12,28,53,27,41,52,26].…”
Section: αFm: How Can the Approach Be Applied In Practice?mentioning
confidence: 99%
See 1 more Smart Citation
“…Among the case studies listed on the CADP web site, the tools are most frequently used for the formal specification and modeling of a system, which are then verified by model checking temporal logic properties and/or equivalence checking against a reference model (e.g., the expected service of a protocol). Some case studies additionally take advantage of more specific tools, e.g., for performance evaluation [18,3,11,7,9,14,45,55], (conformance) test generation [33,12,28,51,54,8,29,41,35,5], or generation of an executable prototype from the formal model [12,28,53,27,41,52,26].…”
Section: αFm: How Can the Approach Be Applied In Practice?mentioning
confidence: 99%
“…This approach permitted to detect 5 bugs." [33] The capability to generate counterexamples and witnesses, common to all enumerative techniques, is also judged an interesting asset. "Another important advantage of using CADP is that, when a property does not hold, the model checking algorithm generates a counter-example, i.e., an execution trace leading to a state in which the property is violated.…”
Section: Usefulness αFm: How Is Usefulness Achieved? Is the Approach ...mentioning
confidence: 99%
“…Also a part of the TTCN test suite produced by ATM Forum has been checked with VTS (for soundness and laxity) [17] and some errors due to asynchronism were detected. Lotos: Several experiments [20], [21] consisted in using TGV on specifications of a multiprocessor architecture of Bull. Produced test cases have been executed by Bull on a simulator of the architecture.…”
Section: Case Studiesmentioning
confidence: 99%
“…and a sound underlying theory (Tretmans, 1996) suggest the application of such formal methods for black box testing in industrial projects. Existing case studies (Fernandez et al, 1997;Kahlouche et al, 1998Kahlouche et al, , 1999Laurencot and Salva, 2005;Philipps et al, 2003;Kovács et al, 2003), report on the application of formal testing techniques to different sized applications. Basically, they report on the application of a particular test generation technique to certain problems.…”
Section: Introductionmentioning
confidence: 99%