Zhang Jiong, Jin Huihua, Shang Lihong, et al. Non-interference test method of embedded system software[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(07): 666-669. (in Chinese)
Citation: Zhang Jiong, Jin Huihua, Shang Lihong, et al. Non-interference test method of embedded system software[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(07): 666-669. (in Chinese)

Non-interference test method of embedded system software

  • Received Date: 21 Feb 2003
  • Publish Date: 31 Jul 2004
  • Traditional test methods of embedded system software impose on the object system and the result of the test are not accurate enough as expected. Non-interference test (NIT) method can solve the problem. Not same with the traditional test methods, NIT is completely non-interference to the object software. By analyzing the basic characteristics of NIT, an application model of NIT was set up. There must be three modules in this model, include static analyse module, dynamic analyse module and data gathering subsystem which tracks the object system by hardware. Static analyse module figures out the static characteristics of the object software and tells the other two modulus how to gather the state data of the object system and how to understand the data. In all steps of the test cycle, NIT does not add any instructions executed only within the test round into the object program.

     

  • [1] 靳 超. CodeTest嵌入式软件在线测试与分析工具在嵌入式系统开发中的应用 . 见:沈绪榜,何立民. 2001年嵌入式系统及单片机国际学术交流会论文集 .北京:北京航空航天大学出版社,2001.290~292 Jin Chao.CodeTest——the use of embedded software real-time test and analysis tools in the development of embedded system . In:Shen Xubang,He Limin. 2001International Conference on Embedded Systems .Beijing:Beijing University of Aeronautics and Astronautics Press, 2001.290~292(in Chinese) [2] 王 璞,张臻鉴,王玉玺. 基于覆盖的软件测试技术在实时嵌入式软件中的应用研究[J]. 计算机工程与设计, 1998,19(6):45~49 Wang Pu, Zhang Zhenjian, Wang Yuxi. A research on coverage-based software testing technique in the real-time embedded computer system[J]. Computer Engineering and Design, 1998,19(6):45~49(in Chinese) [3] 李 茜,梅 琳,凌 辉,等. EASTT:一种嵌入式应用软件测试系统[J]. 计算机工程与科学, 2002,24(2):66~69 Li Qian, Mei Lin, Ling Hui, et al. EASTT:an embedded application software test system[J]. Computer Engineering and Science, 2002,24(2):66~69(in Chinese) [4] Wolf F, Ernst R. Data flow based cache prediction using local simulation . IEEE International High-Level Validation and Test Workshop (HLDVT'00) . Berkeley, California :2000.155~160 [5] Ferdinand C, Wilhelm R. On predicting data cache behavior for real-time systems . Proceeding of the A CM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems, Volume 1474 of Lecture Notes in Computer Science . 1998.16~30
  • Relative Articles

    [1]SHI T X,CHEN L S,LI T S,et al. Distributed adaptive anti-disturbance control for power systems based on multi-agents[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(5):1685-1692 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0496.
    [2]LI Ruiqi, HUANG Yongqiang, LIU Liang, YUE Meng. Data Security Transmission Protection Mechanism for L-band Digital Aeronautical Communications System Based on Domestic Cryptographic Algorithms[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0656
    [3]ZHANG Dongping, WANG Mengting, LU Zhanhong, REN Ye, LIU Zhiyong, YANG Li. Intrusion Detection in Industrial Control Systems Based on Data Augmentation by Large Time Series Models[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0755
    [4]LI J,YANG D K,HONG X B,et al. Soil moisture algorithm testing of interference signal inversion with GNSS linearly polarized antenna[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(3):874-885 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0282.
    [5]ZHANG Y M,JIN G H,SHI Y,et al. Hysteresis characteristics of pneumatic artificial muscle based on improved Maxwell model[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(12):3686-3695 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0917.
    [6]TANG Y,DAI Q,YANG M Y,et al. Software defect prediction algorithm for intra-membrane sparrow optimizing ELM[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(2):643-654 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0438.
    [7]GENG Z T,ZHAO J Q. Design and development of virtual simulation experiment software of composite piezoelectric materials[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(11):3377-3381 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0826.
    [8]LIU Z Y,ZHANG G,LIU H R,et al. Software robot-based application behavior simulation for cyber security range in industrial control field[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(7):2237-2244 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0597.
    [9]HU X,CHEN J M,LI H F. Software security vulnerability patterns based on ontology[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(10):3084-3099 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0783.
    [10]ZHANG Fan, LIU Wan, GUO Yong-yan, CENG Zhi-chun, HE Qian-wei, ZHAO Zhong. The application and practice of black box testing technology in Fluid Simulation Software[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0621
    [11]XIONG Liang, ZHANG Rui, XU Bin, HUANG Qiao-ping. Research on Evolution Mechanism of Configuration and Parameter Solution Model of Air Data Sensing System for Aircraft[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0339
    [12]SHI X D,LI R P,ZHAO H X,et al. Non-standard interface aviation RF cable test method based on TRL[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(9):2207-2217 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0645.
    [13]ZHAO Yue-qing, LIN De-zhi, CHEN Hui, TANG Jia-li, CHEN Ping. Performance test and constitutive model selection of diaphragms in hot diaphragm forming[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0350
    [14]WANG L Y,CHEN W H,JIANG Y S,et al. Measurement of ejection factor of new resin matrix composites[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(11):2960-2967 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0056.
    [15]LEI Yao-lin, DING Wen-rui, LUO Yi-zhe, WANG Yu-feng, LIU Si-qi, ZHANG Zhi-lan. Trajectory planning and resource allocation methods in UAV data collection missions[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0531
    [16]XU F J,ZHOU X,ZHAO J S,et al. Conception and development of software-defined satellite technology[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(7):1543-1552 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0562.
    [17]ZHANG Pei-hong, ZHOU Gui-yu, SHEN Ying-ying, TANG Jing, ZHAO Wei, JIA Hong-yin. Research on simulation of parallel separation characteristics using NNW-FlowStar software[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0275
    [18]YANG B,HE Y Z,XU F,et al. Using improved genetic algorithm for software fault localization aided test case generation[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(9):2279-2288 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0524.
    [19]YANG B,LIU Z,WEI X J,et al. A safety analysis approach for embedded system[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(8):1930-1939 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0185.
    [20]JI Xiaoqi, SONG Zikai, YU Junqing. Player movement data analysis on soccer field reconstruction[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(8): 1543-1552. doi: 10.13700/j.bh.1001-5965.2022.0131
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2505) PDF downloads(840) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return