Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach

Karl R.P.H. Leung*, Joseph K.Y. Ng, W. L. Yeung

*Corresponding author for this work

Research output: Contribution to journalJournal articlepeer-review

Abstract

Comparing actual output with the expected output of some controlled input is a fundamental principle of program correctness testing. However, in some situations, the input is uncontrollable or even undetectable during testing, it is impossible to decide the expected output or the test oracle. Or in some situations, the output may be indeterministic or unpredictable, hence it is impossible to compare the output with the expected one. We encountered these problems and could not conduct normal program testing when we developed programs to extract network data from various mobile stations in the Mobile Location Estimation System project. Instead we analyzed the program output and challenge it against the intrinsic properties, the environment, the program itself, and the application results to find evidence that the output is suitable to be used for the planned purposes. In short, we accessed the trustworthiness of the programs. In the development of our mobile software, it was common that different programs of the same specification had to be developed for mobile stations of different models. These different implementations provided another source of reference for trustworthiness assessment. Our experience of applying the trustworthiness approach to developing software for extracting network data from mobile stations is reported in this paper.

Original languageEnglish
Pages (from-to)962-968
Number of pages7
JournalJournal of Systems and Software
Volume79
Issue number7
DOIs
Publication statusPublished - Jul 2006

Scopus Subject Areas

  • Software
  • Information Systems
  • Hardware and Architecture

User-Defined Keywords

  • Mobile embedded software testing
  • Untestable environment

Fingerprint

Dive into the research topics of 'Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach'. Together they form a unique fingerprint.

Cite this