Test
management
GUI
Resource
management
Runtime
monitoring
Resource
Resource
request
SUT
TC
SUT
SUT
VM
Test
component
management
VM state
request
VM
VM VM
VM
TC
TC
Google Compute Engine
Create Delete Start Stop
Scale
up/down
Figure 8: Cloud Testing Architecture Overview.
REFERENCES
Ahmad, A., Bouquet, F., Fourneret, E., Le Gall, F., and Leg-
eard, B. (2016). Model-based testing as a service for
iot platforms. In Margaria, T. and Steffen, B., editors,
Leveraging Applications of Formal Methods, Verifica-
tion and Validation: Discussion, Dissemination, Ap-
plications, pages 727–742, Cham. Springer Interna-
tional Publishing.
Antonakakis, M., April, T., Bailey, M., Bernhard, M.,
Bursztein, E., Cochran, J., Durumeric, Z., Halderman,
J. A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever,
C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sul-
livan, N., Thomas, K., and Zhou, Y. (2017). Under-
standing the mirai botnet. In 26th USENIX Security
Symposium (USENIX Security 17), pages 1093–1110,
Vancouver, BC. USENIX Association.
Aslanyan, Z., Nielson, F., and Parker, D. (2016). Quanti-
tative verification and synthesis of attack-defence sce-
narios. In IEEE 29th Computer Security Foundations
Symposium, CSF 2016, Lisbon, Portugal, June 27 -
July 1, 2016, pages 105–119.
Axel Rennoch, Claude Desroches, T. V. and Schieferdecker,
I. (2016). TTCN-3 Quick Reference Card.
Behrmann, G., Larsen, K. G., and Rasmussen, J. I. (2005).
Priced timed automata: Algorithms and applications.
In de Boer, F. S., Bonsangue, M. M., Graf, S., and
de Roever, W.-P., editors, Formal Methods for Com-
ponents and Objects, pages 162–182, Berlin, Heidel-
berg. Springer Berlin Heidelberg.
Bengtsson, J. and Yi, W. (2004). Timed Automata: Seman-
tics, Algorithms and Tools, pages 87–124. Springer
Berlin Heidelberg, Berlin, Heidelberg.
Bensalem, S., Krichen, M., Majdoub, L., Robbana, R., and
Tripakis, S. (2007). A simplified approach for test-
ing real-time systems based on action refinement. In
ISoLA 2007, Workshop On Leveraging Applications of
Formal Methods, Verification and Validation, Poitiers-
Futuroscope, France, December 12-14, 2007, pages
191–202.
Boyte, K. J. (2017). A comparative analysis of the cyber-
attacks against estonia, the united states, and ukraine:
Exemplifying the evolution of internet-supported war-
fare. Int. J. Cyber Warf. Terror., 7(2):54–69.
Ebner, M. (2004). TTCN-3 Test Case Generation from Mes-
sage Sequence Charts. In Proceeding of the Work-
shop on Integrated-reliability with Telecommunica-
tions and UML Languages (WITUL’04).
ETSI (2015). Methods for Testing and Specification (MTS),
The Testing and Test Control Notation version 3,
TTCN-3 Language Extensions: TTCN-3 Performance
and Real Time Testing.
Felderer, M., Zech, P., Breu, R., B
¨
uchler, M., and
Pretschner, A. (2016). Model-based security testing:
A taxonomy and systematic classification. Softw. Test.
Verif. Reliab., 26(2):119–148.
Gao, J., Bai, X., and Tsai, W.-T. (September 2011). Cloud
testing- issues, challenges, needs and practice. Soft-
ware Engineering : An International Journal (SEIJ).
Hochberger, C. and Liskowsky, R., editors (2006). In-
formatik 2006 - Informatik f
¨
ur Menschen, Band 2,
Beitr
¨
age der 36. Jahrestagung der Gesellschaft f
¨
ur In-
formatik e.V. (GI), 2.-6. Oktober 2006 in Dresden, vol-
ume 94 of LNI. GI.
Kamm
¨
uller, F., Nurse, J. R. C., and Probst, C. W. (2016).
Attack tree analysis for insider threats on the iot using
isabelle. In Tryfonas, T., editor, Human Aspects of
Information Security, Privacy, and Trust, pages 234–
246, Cham. Springer International Publishing.
Kordy, B., Pi
`
etre-Cambac
´
ed
`
es, L., and Schweitzer, P.
(2014). Dag-based attack and defense modeling:
Don’t miss the forest for the attack trees. Computer
Science Review, 13-14:1 – 38.
Krichen, M. (2012). A formal framework for black-box
conformance testing of distributed real-time systems.
IJCCBS, 3(1/2):26–43.
ENASE 2019 - 14th International Conference on Evaluation of Novel Approaches to Software Engineering
576