Essays about: "Automated Software Testing"

Showing result 1 - 5 of 220 essays containing the words Automated Software Testing.

  1. 1. A Case Study on the Limitations of Automated Duplicate Bug Report Detection

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Malte Götharsson; Karl Stahre; [2023-09-26]
    Keywords : ;

    Abstract : Identifying duplicate bug reports is crucial in software development as it helps streamline the debugging process, reduce redundancy, and enhance overall efficiency. By addressing the challenges associated with existing automated techniques and leveraging testers’ expertise, the tool proposed in this study aims to improve the accuracy of duplicate detection, saving valuable time and resources while ensuring that potential duplicates are not overlooked. READ MORE

  2. 2. A comparison between random testing and adaptive random testing

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Nicklas Johansson; Ola Aareskjold; [2023]
    Keywords : Adaptive random testing; Random testing; Defect detection efficiency; test case generation time;

    Abstract : Software testing is essential for quality assurance, with automated techniques such as random testing and adaptive random testing being cost-effective solutions compared to others. Adaptive random testing seeks to enhance random testing, and there is a conception that adaptive random testing always should replace random testing. READ MORE

  3. 3. Continuous Integration for Embedded Software with Modular Firmware Architecture

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fabian Segatz; [2023]
    Keywords : Continuous integration; Embedded software development; Modular firmware architecture; Jenkins; Software quality; Kontinuerlig integration; Inbyggd programvaruutveckling; Modulär fastvara arkitektur; Jenkins; Programvarukvalitet;

    Abstract : Continuous Integration (CI) techniques are widely adopted in web and application development but have received limited attention in the embedded software domain. This thesis investigates the application of CI techniques in embedded software development through a case study at Cobolt AB, a company specializing in optoelectronics. READ MORE

  4. 4. Behavioural comparison of test and field executions of video games

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chloé Marie Porion; [2023]
    Keywords : Software Testing; Field Monitoring; Test Monitoring; Video Games; Video Game Modding; Mjukvarutestning; Fältövervakning; Testövervakning; Videospel; Videospel Modding;

    Abstract : Software developers write tests to ensure that their application behaves as intended. However, the behaviour of an application in production may deviate from the behaviours that are tested. This difference between test and field executions is rarely assessed in practice. READ MORE

  5. 5. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE