Andrew F. Tappenden's research while affiliated with The King’s University and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (19)


Automated policy generation for testing access control software
  • Article

February 2017

·

35 Reads

Information Security Journal A Global Perspective

Alejandro Felix

·

Andrew F. Tappenden

·

·

James Miller

Access control systems (ACS) are a critical component of modern information technology systems and require rigorous testing. If the ACS has defects, then the deployment is not secure and is a threat to system security. Firewalls are an important example of an ACS, and formally verifying firewall systems has recently attracted attention. We present an automated software-testing tool, PG, for the production of firewall policies for use in firewall policy enforcement testing. PG utilizes a number of heuristic techniques to improve space coverage over traditional systems based on randomly generated firewall policies. An empirical study is presented demonstrating that PG generates firewall policies with superior coverage compared to traditional policy-generation techniques. The extension of PG beyond firewall systems to other ACS situations is outlined.

Share

2016 Spring ConfChem: citizen science and international collaboration through environmental monitoring with simple chemical sensors

January 2016

·

22 Reads

·

2 Citations

Pure and Applied Chemistry

Pure and Applied Chemistry

·

Brian Martin

·

·

[...]

·

Building capacity for carrying out and understanding responsible science that is relevant to local challenges is a key ingredient in the OPCW’s strategy for achieving and maintaining a world free of chemical weapons. Two important contexts for building that capacity for responsible science are (1) the global attention being drawn to the rapidly increasing human chemical footprint on our planet and (2) the pervasive use of digital technologies. We describe an effort coordinated by the Organisation for the Prohibition of Chemical Weapons to build capacity among young people around the world to harness the power of small mobile chemical sensors to develop data literacy in complex chemical analysis based on measuring analytes that are relevant to their lives and local contexts. This new type of data literacy is an emergent element in educational programs and is key to developing the capacity for decision-making on chemical measurement data. The project brings together student and faculty collaborators from the fields of chemistry, social sciences and informatics, to provide proof of concept in four areas that support the overall goal of building a collective effort for scientific analysis; the development of low cost environmental sensors for air and water samples; the collection of representative test data sets on priority contaminants; the assessment and visualization of data; and education about the effect of priority pollutants on human and environmental health. We report on the project goals and preliminary steps taken to achieve them.



A Web Service Test Generator

December 2014

·

24 Reads

·

4 Citations

An automated process for generating test inputs for web services from a WSDL is presented. A grammatical representation of the web service is extracted from the WSDL and used to produce test cases. A context-free grammar (CFG) is generated from the XSD that is stored in the WSDL. The CFG is provided as input into a constraint-satisfaction problem solver to automatically generate a diverse set of structurally correct XML documents. Testing data is then inserted into the XML templates in accordance with any constraints specified in the XSD. Web service-specific testing can be performed with the inclusion of external datasets and service-specific configurations.


Automated Cookie Collection Testing

February 2014

·

51 Reads

·

13 Citations

ACM Transactions on Software Engineering and Methodology

Cookies are used by over 80% of Web applications utilizing dynamic Web application frameworks. Applications deploying cookies must be rigorously verified to ensure that the application is robust and secure. Given the intense time-to-market pressures faced by modern Web applications, testing strategies that are low cost and automatable are required. Automated Cookie Collection Testing (CCT) is presented, and is empirically demonstrated to be a low-cost and highly effective automated testing solution for modern Web applications. Automatable test oracles and evaluation metrics specifically designed for Web applications are presented, and are shown to be significant diagnostic tests. Automated CCT is shown to detect faults within five real-world Web applications. A case study of over 580 test results for a single application is presented demonstrating that automated CCT is an effective testing strategy. Moreover, CCT is found to detect security bugs in a Web application released into full production.


Centroidal Voronoi Tessellations- A New Approach to Random Testing

February 2013

·

87 Reads

·

64 Citations

IEEE Transactions on Software Engineering

Although Random Testing (RT) is low cost and straightforward, its effectiveness is not satisfactory. To increase the effectiveness of RT, researchers have developed Adaptive Random Testing (ART) and Quasi-Random Testing (QRT) methods which attempt to maximize the test case coverage of the input domain. This paper proposes the use of Centroidal Voronoi Tessellations (CVT) to address this problem. Accordingly, a test case generation method, namely, Random Border CVT (RBCVT), is proposed which can enhance the previous RT methods to improve their coverage of the input space. The generated test cases by the other methods act as the input to the RBCVT algorithm and the output is an improved set of test cases. Therefore, RBCVT is not an independent method and is considered as an add-on to the previous methods. An extensive simulation study and a mutant-based software testing investigation have been performed to demonstrate the effectiveness of RBCVT against the ART and QRT methods. Results from the experimental frameworks demonstrate that RBCVT outperforms previous methods. In addition, a novel search algorithm has been incorporated into RBCVT reducing the order of computational complexity of the new approach. To further analyze the RBCVT method, randomness analysis was undertaken demonstrating that RBCVT has the same characteristics as ART methods in this regard.


Token-based graphical password authentication

November 2011

·

264 Reads

·

13 Citations

International Journal of Information Security

Given that phishing is an ever-increasing problem, a better authentication system is required. We propose a system that uses a graphical password deployed from a Trojan and virus-resistant embedded device. The graphical password utilizes a personal image to construct an image hash, which is provided as input into a cryptosystem that returns a password. The graphical password requires the user to select a small number of points on the image. The embedded device will then stretch these points into a long alphanumeric password. With one graphical password, the user can generate many passwords from their unique embedded device. The image hash algorithm employed by the device is demonstrated to produce random and unique 256-bit message digests and was found to be responsive to subtle changes in the underlying image. Furthermore, the device was found to generate passwords with entropy significantly larger than that of users passwords currently employed today.


A Novel Evolutionary Approach for Adaptive Random Testing

January 2010

·

63 Reads

·

61 Citations

IEEE Transactions on Reliability

Random testing is a low cost strategy that can be applied to a wide range of testing problems. While the cost and straightforward application of random testing are appealing, these benefits must be evaluated against the reduced effectiveness due to the generality of the approach. Recently, a number of novel techniques, coined Adaptive Random Testing, have sought to increase the effectiveness of random testing by attempting to maximize the testing coverage of the input domain. This paper presents the novel application of an evolutionary search algorithm to this problem. The results of an extensive simulation study are presented in which the evolutionary approach is compared against the Fixed Size Candidate Set (FSCS), Restricted Random Testing (RRT), quasi-random testing using the Sobol sequence (Sobol), and random testing (RT) methods. The evolutionary approach was found to be superior to FSCS, RRT, Sobol, and RT amongst block patterns, the arena in which FSCS, and RRT have demonstrated the most appreciable gains in testing effectiveness. The results among fault patterns with increased complexity were shown to be similar to those of FSCS, and RRT; and showed a modest improvement over Sobol, and RT. A comparison of the asymptotic and empirical runtimes of the evolutionary search algorithm, and the other testing approaches, was also considered, providing further evidence that the application of an evolutionary search algorithm is feasible, and within the same order of time complexity as the other adaptive random testing approaches.


A Survey of Cookie Technology Adoption Amongst Nations.

September 2009

·

60 Reads

·

2 Citations

Journal of Web Engineering

This paper presents the results of a novel survey probing the use of cookies with respect to country of origin and related web technologies. A number of significant relationships are established between the origin of the web application and cookie deployment. Cookie usage amongst five popular dynamic web application frameworks is analyzed providing a per-country breakdown of platform adoption and the establishment of a link between dynamic web technologies and first-party and sessional cookies. The prevalence of vendor-specific third-party technologies both globally and within specific countries is studied. Although global leaders emerged, a number of country-specific market leaders were discovered, suggesting that country-specific niche technologies are competing with the globally dominant technologies within specific markets. A large association is identified between third-party persistent cookie usage and a country's e-business environment--the strongest evidence that cookies are an integral part of the global e-commerce environment.


Cookies

June 2009

·

95 Reads

·

12 Citations

ACM Transactions on the Web

The results of an extensive investigation of cookie deployment amongst 100,000 Internet sites are presented. Cookie deployment is found to be approaching universal levels and hence there exists an associated need for relevant Web and software engineering processes, specifically testing strategies which actively consider cookies. The semi-automated investigation demonstrates that over two-thirds of the sites studied deploy cookies. The investigation specifically examines the use of first-party, third-party, sessional, and persistent cookies within Web-based applications, identifying the presence of a P3P policy and dynamic Web technologies as major predictors of cookie usage. The results are juxtaposed with the lack of testing strategies present in the literature. A number of real-world examples, including two case studies are presented, further accentuating the need for comprehensive testing strategies for Web-based applications. The use of antirandom test case generation is explored with respect to the testing issues discussed. Finally, a number of seeding vectors are presented, providing a basis for testing cookies within Web-based applications.


Citations (16)


... Collaboration through Environmental Monitoring with Simple Chemical Sensors". The premise behind the report was "to build capacity among young people… [and] to develop data literacy…that [is] relevant to their lives and local contexts" (Forman et al. 2016, p.1) The report goes on to describe how they hope to utilize low-cost chemical sensors to construct "a lasting database that can be used by multiple groups to bring many types of chemical data together" (Forman et al. 2016, p.6), with the resulting data presented being easily understandable for someone "who [has] an interest in the topic but limited knowledge about data analytics" (Forman et al. 2016, p.6). ...

Reference:

The Challenge of Verifying State Compliance with Arms Control and Disarmament Treaties
2016 Spring ConfChem: citizen science and international collaboration through environmental monitoring with simple chemical sensors
  • Citing Article
  • January 2016

Pure and Applied Chemistry

Pure and Applied Chemistry

... However, the coverage of test cases in this paper depends on the accuracy of network protocol classification tree construction. Felix et al. [23] introduced a novel fuzzer, Policy Generator (PG). PG utilizes a number of heuristic techniques to improve space coverage over existing fuzzers. ...

Policy Generator (PG): A Heuristic-Based Fuzzer
  • Citing Conference Paper
  • January 2016

... Online cookies are commonly used by web servers to ensure the authentication and authorization of users across multiple pages, sections, and sessions (Tappenden & Miller, 2014). However, some cookies track user activities on a particular website while others track it across multiple websites. ...

Automated Cookie Collection Testing
  • Citing Article
  • February 2014

ACM Transactions on Software Engineering and Methodology

... (2) For RQ1.2, we adopted the P-measure [49], which is defined as the probability of a given test set detecting at least one failure. Although the P-measure may appear less practical than the F-measure, it has been widely used in many testing scenarios, especially in automated software testing [50]. Another evaluation metric is the E-measure [49], which is defined as the expected number of failures to be detected by a given test set. ...

Centroidal Voronoi Tessellations- A New Approach to Random Testing
  • Citing Article
  • February 2013

IEEE Transactions on Software Engineering

... As discussed in Section II-A, Chan et al. [37] identified three common failure patterns types: block; strip; and point ( Figure 1). Following previous ART studies [27], [46], [51], [52], [53], [54], we also used these patterns in our simulation framework. Using a unit input domain (D was [0, 1.0) d ), the block pattern was simulated as a single hypercube randomly constructed and located within D. This was achieved by selecting a random point and then extending the same length for each dimension (with respect to θ), producing, for example, a square in two dimensions, or a cube in three dimensions. ...

A Novel Evolutionary Approach for Adaptive Random Testing
  • Citing Article
  • January 2010

IEEE Transactions on Reliability

... For instance, once typical practice is to select common versions of mobile operating system, screen sizes and resolutions, and devices compatible with the app under test. Context simulators to simulate context change and network simulators to simulate different network protocols are essential elements in the test environment [11]. The application test server is also required to manage the communication of the automation technology and the app under test ...

Agile Testing of Location Based Services
  • Citing Conference Paper
  • June 2005

Lecture Notes in Computer Science

... Load and stress testing are proper approaches to figure out the reasons behind response time-outs and resource issues, and when undertaken, they can help to validate that LBS is scalable. In this regard, Yu et al. [21] proposed a novel framework for LBS testing. The proposed scalable testing framework still does not make the testing of a complicated software system simple, straightforward, or error free. ...

A Scalable Testing Framework for Location-Based Services
  • Citing Article
  • March 2009

Journal of Computer Science and Technology