SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Web Application Testing in Fifteen
Years of WSE
Anna Rita Fasolino
Domenico Amalfitano
Porfirio Tramontana
Dipartimento di Ingegneria Elettrica e
Tecnologie dell’Informazione

University of Naples Federico II, Italy
Web Application Testing


Web application testing has always been a
relevant and attractive topic






Due to the widespread diffusion and success
of WAs in the modern society
And to the growing need for dependable,
usable, effective, … quality apps

Two decades of contributions in this area

Hundreds of papers in the literature dealt with this
topic over the last two decades [1]
 More than 20 papers on Web study of were
[1] V. Garousi, A. Mesbah, et al. “A systematic mappingTestingweb application testing,
” Information and Software Technology, vol. 55, no. editions.
8, pp. 1396–1374, Mar. 2013.
Anna Ritapresented 2013 the past 09/28/2013
Fasolino - WSE in - Eindhoven - WSE
2

Web application testing : a selection of
contributions from past WSE editions
Area

Topics

Number of
papers

WA Testing

Generic issues in Web
testing

1

2007

Testing the
Functionality

White-box testing

3

2002, 2005,
2006

User-session based testing

1

2006

Model-based Testing

WSE Editions

2007

Regression Testing

1

2009

Testing large Web
applications

2

2004

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

3
Area

Topics

Testing nonfunctional
requirements

Accessibility assessment

4

Security and
Vulnerability

5

Robusteness testing

1

2009

Performance testing

1

2004

Web Service

Web Service testing

1

2006

Rich Internet
Application (RIA)
testing

RIA testing automation

1

2010

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

Number of
papers

WSE Editions

2002, 2003, 2005,
2011

4
A fast survey about the contributions
provided by some of these papers…





A preliminary contribution:
The peculiarities of testing Web applications
and the necessity for specialized skills in this
field were remarked by Parveen, Tilley and
Gonzalez in 2007 [2]

T. Parveen, S. Tilley, and G. Gonzalez, “On the Need for Teaching Web Application Testing,”
in 9th IEEE International Workshop on Web Site Evolution, 2007
Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

5
Techniques for Testing the functionality
of Web apps …


Three relevant contributions by Ricca and Tonella:
 2002: white-box coverage criteria over two models
of the application under test (a navigation model and
a control flow model) [4]
 2005: a roadmap for testing the functionality of a
Web application and a comparison between
techniques for functional testing, code coverage
testing and model based testing [5]
 2006: a Web fault taxonomy considering specific
characteristics of a Web application that are likely to
introduce faults in Web applications’ behavior [6]

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

6
Techniques for Testing the functionality
of large Web apps




2004: Bedi and Schroeder [7] focused on
challenges of testing large scale e-commerce
applications based on server-side scripting
languages.
2004: Sneed [8] reported his experience and
resulting insights about testing a complex Web
system.

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

7
Black-Box and Model Based techniques






2002: Di Lucca and Di Penta [9] showed the necessity
for analysing actions/events provided by the browser
(such as the usage of backward and forward buttons) in
order to discover navigation inconsistencies in Web
applications
2006: Di Lucca, Fasolino and Tramontana [10]
described a technique for downsizing test suites
obtained from a set of user-sessions data
2007: Dai and Chen [11] used an inter-connection
dependence model for generating sequences of Web
pages that are potentially fault prone and for capturing
cross-tier faults in multi-tier Web applications.

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

8
Regression Testing


A specific problem of WA: finding solutions for
effectively comparing output executions to find
real differences among them .


2009: Soechting et al. [12] proposed a technique to
measure syntactic differences in the tree-structured
output of Web apps for reducing the number of false
positives in regression testing.

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

9
Rich Internet Application (RIA) testing




RIAs with their enhanced UI, responsiveness, and new
implementation technologies renewed the scenarios of
Web application testing.
2010: Amalfitano, Fasolino and Tramontana analysed
the most critical open issues in RIA testing automation
and proposed a classification framework of testing
techniques based on:







goal of the technique (such as finding generic faults or
application–specific ones)
test case generation approach (i.e., code-based, requirementbased, by crawling, by user-session-data, by hybrid approaches)
types of testing oracles
categories of tools supporting testing automation.

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

10
Testing non-functional requirements:
accessibility








2002: Kirchner analyzed the features of existing tools
for verifying Web pages against accessibility
guidelines and correcting accessibility problems.
2003: Kirchner presented a benchmark composed by
a set of Web pages containing violations to guidelines
and checkpoints defined by the WAI.
2005: Di Lucca, Fasolino, and Tramontana proposed a
meta-model for representing the parts of the
application involved in accessibility problems and a
tool for accessibility analysis
2011: Kienle et al. presented a survey of articles from
past WSE editions entitled “the past, present and
future of Web Accessibility”
11
Security and Vulnerability assessment










2005: Di Lucca, Fasolino, Tramontana, ... proposed an
approach for Cross Site Scripting (XSS) vulnerability
detection in a Web application.
2006: Muthuprasanna et al. presented a technique to
detect and prevent SQL-Injection Attacks (SQLIA) in WA
2007: Merlo et al. proposed a two-step technique for
finding SQL-Injections vulnerabilities
2012: Alalfi, Cordy, and Dean introduced a Model Driven
approach (based on Prolog) to support the assessment of
security properties in dynamic Web applications.
2010: Yagi et al. investigated the distribution of malwares
on Web applications and used honeypot’s traffic patterns
for the detection of malware files present in Was.

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

12
Robustness testing and Web Service
Testing




2009: Xu et al. proposed an innovative three-steps
approach (based on an ontology written in the Web
Ontology Language for Services (OWL-S)) for generating
robustness test data as invalid inputs.
2006: Sneed et al. presented a Web Service testing
technique and a tool for simulating the usage of Web
services and generating and validating system test data.

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

13
Web Application Testing: from the past
to the present




Web applications evolved significantly over the
last two decades, from the first static WA...
Technologies, platforms, development
approaches changed considerably: :









more complex and dynamic multi-layered systems
business logic implemented both at the client and at
the server side
asynchronous interactions between layers (see RIAs
and AJAX)
Developed using CMS, Frameworks, Model-driven
approaches…
Adaptable, Context aware, Mobile Web applications

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

14
WAs in the next future…







Growing complexity
Will integrate more and more services,
components, applications, and multimedia
Will be able to adapt themselves to evolving
execution environments and operating contexts
Will have to be accessed by mobile devices,
equipped with heterogeneous hardware,
operating systems, and execution platforms...

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

15
Web application testing:
future perspectives…


New solutions of Web testing automation
will be increasingly needed, for testing
more and more complex apps




The applicability and effectiveness of searchbased, model-based, and crawling-based
techniques will have to be investigated
Suitable strategies for integration and system
testing of complex Web applications will be
needed

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

16
Web application testing:
future perspectives


New testing frameworks and environments will be
necessary, with runtime monitoring capabilities




To cope with the issues of testing dynamic and selfadaptive Web applications

New testing infrastructures also exploiting the
computational capabilities of Service oriented
architectures and Cloud computing will have to be
designed


to cope with the fragmentation issues of testing
applications running on heterogeneous execution
platforms and including heterogeneous components

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

17
References
[1]
V. Garousi, A. Mesbah, A. Betin-Can, and S. Mirshokraie, “A
systematic mapping study of web application testing,” Information
and Software Technology, vol. 55, no. 8, pp. 1396–1374, Mar. 2013.
[2]
T. Parveen, S. Tilley, and G. Gonzalez, “On the Need for
Teaching Web Application Testing,” in 9th IEEE International
Workshop on Web Site Evolution, 2007, pp. 51–55.
[3]
G. A. Di Lucca and A. R. Fasolino, “Testing Web-based
applications: The state of the art and future trends,” Information and
Software Technology, vol. 48, no. 12, pp. 1172–1186, 2006.
[4]
P. Tonella and F. Ricca, “A 2-layer model for the white-box
testing of Web applications,” in 6th IEEE International Workshop on
Web Site Evolution, 2004, pp. 11–19.
[5]
F. Ricca and P. Tonella, “Web Testing: a Roadmap for the
Empirical Research,” in 7th IEEE International Symposium on Web
Site Evolution, 2005, pp. 63–70.
[6]
A. Marchetto, F. Ricca, and P. Tonella, “Empirical Validation of
a Web Fault Taxonomy and its usage for Fault Seeding,”in 9th IEEE
International Workshop on Web Site Evolution, 2007, pp. 31–38.
Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

18
[7]
S. Bedi and P. J. Schroeder, “Observations on the
implementation and testing of scripted Web applications,” in 6th IEEE
International Workshop on Web Site Evolution, 2004, pp. 20–27.
[8]
H. M. Sneed, “Testing a Web application,” 6th IEEE
International Workshop on Web Site Evolution, 2004, pp. 3–10.
[9]
G. A. Di Lucca and M. Di Penta, “Considering browser
interaction in Web application testing,” in 5th IEEE International
Workshop on Web Site Evolution, 2003, pp. 74–81.
[10]
S. Elbaum, G. Rothermel, and M. F. Ii, “Leveraging UserSession Data to Support Web Application Testing” in IEEE
Transactions on Software Engineering, , vol. 31, no. 3, pp. 187–201,
2005
[11]
S. Sampath, I. C. Society, S. Sprenkle, E. Gibson, L. Pollock,
and A. S. Greenwald, “Applying Concept Analysis to User-SessionBased Testing of Web Applications,” in IEEE Transactions on
Software Engineering, , vol. 33, no. 10, pp. 643–658, 2007.
[12]
D. Amalfitano, A. R. Fasolino, and P. Tramontana, “Rich
Internet Application Testing Using Execution Trace Data,” in 3th
International Conference on Software Testing, Verification, and
Validation Workshops, 2010, pp. 274–283.
Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

19
[13]
G. A. Di Lucca, A. Fasolino, and P. Tramontana, “A Technique for
Reducing User Session Data Sets in Web Application Testing,” in 8th IEEE
International Symposium on Web Site Evolution, 2006, pp. 7–13.
[14]
Z. Dai and M.-H. Chen, “Automatic Test Case Generation for Multi-tier
Web Applications,” in 9th IEEE International Workshop on Web Site Evolution,
2007, pp. 39–43.
[15]
E. Soechting, K. Dobolyi, and W. Weimer, “Syntactic regression
testing for tree-structured output,” in 11th IEEE International Symposium on
Web Systems Evolution, 2009, pp. 39–48.
[16]
D. Amalfitano, A. R. Fasolino, and P. Tramontana, “Techniques and
tools for Rich Internet Applications testing,” in 12th IEEE International
Symposium on Web Systems Evolution, 2010, pp. 63–72.
[17]
M. Kirchner, “Evaluation, repair, and transformation of Web pages for
Web content accessibility. Review of some available tools,” in 4th IEEE
International Workshop on Web Site Evolution, 2002, pp. 65–72.
[18]
M. Kirchner, “Benchmark for testing the evaluation tools for Web
pages accessibility,” in 5th IEEE International Workshop on Web Site
Evolution, 2003, pp. 66–73.
[19]
G. A. Di Lucca, A. R. Fasolino, and P. Tramontana, “Web Site
Accessibility: Identifying and Fixing Accessibility Problems in Client Page
Code,” in 7th IEEE International Symposium on Web Site Evolution, 2005, pp.
71–78.
[20]
H. Kienle, P. Tramontana, S. Tilley, and D. Bolchini, “Ten years of
access for all from WSE 2001 to WSE 2011,” in 13th IEEE International
Symposium on Web Systems Evolution, 2011, pp. 99–104.
Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

20
[21]
G. A. Di Lucca, A. R. Fasolino, M. Mastroianni, and P. Tramontana, “Identifying
cross site scripting vulnerabilities in Web applications,” in 6th IEEE International
Workshop on Web Site Evolution, 2004, pp. 71–80.
[22]
M. Muthuprasanna, K. Wei, and S. Kothari, “Eliminating SQL Injection Attacks
- A Transparent Defense Mechanism,” in 8th IEEE International Symposium on Web
Site Evolution, 2006, pp. 22–32.
[23]
E. Merlo, D. Letarte, and G. Antoniol, “SQL-Injection Security Evolution
Analysis in PHP,” in 9th IEEE International Workshop on Web Site Evolution, 2007, pp.
45–49.
[24]
M. H. Alalfi, J. R. Cordy, and T. R. Dean, “Automated verification of role-based
access control security models recovered from dynamic web applications,” in 14th IEEE
International Symposium on Web Systems Evolution, 2012, pp. 1–10.
[25]
D. Basin, M. Clavel, and M. Egea, “A decade of model-driven security,” in 16th
ACM Symposium on Access Control Models and Technologies, 2011, pp.1-10.
[26]
T. Yagi, N. Tanimoto, T. Hariu, and M. Itoh, “Investigation and analysis of
malware on websites,” in 12th IEEE International Symposium on Web Systems
Evolution, 2010, pp. 73–81.
[27]
L. Xu, Q. Yuan, J. Wu, and C. Liu, “Ontology-based Web Service robustness
test generation,” in 11th IEEE International Symposium on Web Systems Evolution,
2009, pp. 59–68.
[28]
H. Sneed and S. Huang, “WSDLTest - A Tool for Testing Web Services,” in 8th
IEEE International Symposium on Web Site Evolution, 2006, pp. 14–21.
[29]
S. Barber, “Creating effective load models for performance testing with
incomplete empirical data,” in 6th IEEE International Workshop on Web Site Evolution,
2004, pp. 51–59.

Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013

21

Contenu connexe

En vedette

Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...Porfirio Tramontana
 
Web Pages Classification using Concept Analysis
Web Pages Classification using Concept Analysis Web Pages Classification using Concept Analysis
Web Pages Classification using Concept Analysis Porfirio Tramontana
 
A Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android ApplicationsA Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android ApplicationsPorfirio Tramontana
 
Improving Usability of Web Pages for Blind
Improving Usability of Web Pages for BlindImproving Usability of Web Pages for Blind
Improving Usability of Web Pages for BlindPorfirio Tramontana
 
Web Site Accessibility: Identifying and Fixing Accessibility Problems in Clie...
Web Site Accessibility: Identifying and Fixing Accessibility Problems in Clie...Web Site Accessibility: Identifying and Fixing Accessibility Problems in Clie...
Web Site Accessibility: Identifying and Fixing Accessibility Problems in Clie...Porfirio Tramontana
 
Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications Porfirio Tramontana
 
Recovering a Business Object Model from Web Applications
Recovering a Business Object Model from Web ApplicationsRecovering a Business Object Model from Web Applications
Recovering a Business Object Model from Web ApplicationsPorfirio Tramontana
 
Using GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android AppsUsing GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android AppsPorfirio Tramontana
 
Comprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA ToolComprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA ToolPorfirio Tramontana
 
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...Porfirio Tramontana
 
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...Porfirio Tramontana
 
Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach Porfirio Tramontana
 
Techniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications TestingTechniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications TestingPorfirio Tramontana
 
Reverse Engineering Finite State Machines from Rich Internet Applications
Reverse Engineering Finite State Machines from Rich Internet ApplicationsReverse Engineering Finite State Machines from Rich Internet Applications
Reverse Engineering Finite State Machines from Rich Internet ApplicationsPorfirio Tramontana
 
DynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application ComprehensionDynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application ComprehensionPorfirio Tramontana
 
3D Printing for Surgical Innovation: A Primer
3D Printing for Surgical Innovation:  A Primer3D Printing for Surgical Innovation:  A Primer
3D Printing for Surgical Innovation: A PrimerNigel Parsad
 
Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications Porfirio Tramontana
 
WARE: a tool for the Reverse Engineering of Web Applications
WARE: a tool for the Reverse Engineering of Web Applications WARE: a tool for the Reverse Engineering of Web Applications
WARE: a tool for the Reverse Engineering of Web Applications Porfirio Tramontana
 
Standard 3D medical images and printing
Standard 3D medical images and printingStandard 3D medical images and printing
Standard 3D medical images and printingYoung Moon
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011photomatt
 

En vedette (20)

Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
 
Web Pages Classification using Concept Analysis
Web Pages Classification using Concept Analysis Web Pages Classification using Concept Analysis
Web Pages Classification using Concept Analysis
 
A Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android ApplicationsA Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android Applications
 
Improving Usability of Web Pages for Blind
Improving Usability of Web Pages for BlindImproving Usability of Web Pages for Blind
Improving Usability of Web Pages for Blind
 
Web Site Accessibility: Identifying and Fixing Accessibility Problems in Clie...
Web Site Accessibility: Identifying and Fixing Accessibility Problems in Clie...Web Site Accessibility: Identifying and Fixing Accessibility Problems in Clie...
Web Site Accessibility: Identifying and Fixing Accessibility Problems in Clie...
 
Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications
 
Recovering a Business Object Model from Web Applications
Recovering a Business Object Model from Web ApplicationsRecovering a Business Object Model from Web Applications
Recovering a Business Object Model from Web Applications
 
Using GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android AppsUsing GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android Apps
 
Comprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA ToolComprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA Tool
 
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
 
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
 
Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach
 
Techniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications TestingTechniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications Testing
 
Reverse Engineering Finite State Machines from Rich Internet Applications
Reverse Engineering Finite State Machines from Rich Internet ApplicationsReverse Engineering Finite State Machines from Rich Internet Applications
Reverse Engineering Finite State Machines from Rich Internet Applications
 
DynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application ComprehensionDynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application Comprehension
 
3D Printing for Surgical Innovation: A Primer
3D Printing for Surgical Innovation:  A Primer3D Printing for Surgical Innovation:  A Primer
3D Printing for Surgical Innovation: A Primer
 
Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications
 
WARE: a tool for the Reverse Engineering of Web Applications
WARE: a tool for the Reverse Engineering of Web Applications WARE: a tool for the Reverse Engineering of Web Applications
WARE: a tool for the Reverse Engineering of Web Applications
 
Standard 3D medical images and printing
Standard 3D medical images and printingStandard 3D medical images and printing
Standard 3D medical images and printing
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Similaire à Web Application Testing in Fifteen Years of WSE

Iaetsd a survey of various design patterns for improving quality and
Iaetsd a survey of various design patterns for improving quality andIaetsd a survey of various design patterns for improving quality and
Iaetsd a survey of various design patterns for improving quality andIaetsd Iaetsd
 
Web Application Testing (Major Challenges and Techniques)
Web Application Testing (Major Challenges and Techniques)Web Application Testing (Major Challenges and Techniques)
Web Application Testing (Major Challenges and Techniques)Editor IJMTER
 
A Review on Web Application Testing and its Current Research Directions
A Review on Web Application Testing and its Current Research Directions A Review on Web Application Testing and its Current Research Directions
A Review on Web Application Testing and its Current Research Directions IJECEIAES
 
Rich Internet Applications
Rich Internet ApplicationsRich Internet Applications
Rich Internet ApplicationsYoussef Shaath
 
A new approach to gather similar operations extracted from web services
A new approach to gather similar operations extracted from web servicesA new approach to gather similar operations extracted from web services
A new approach to gather similar operations extracted from web servicesIJECEIAES
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
 
A systematic mapping study of performance analysis and modelling of cloud sys...
A systematic mapping study of performance analysis and modelling of cloud sys...A systematic mapping study of performance analysis and modelling of cloud sys...
A systematic mapping study of performance analysis and modelling of cloud sys...IJECEIAES
 
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...IOSR Journals
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
Simulation Modelling Practice and Theory 47 (2014) 28–45Cont.docx
Simulation Modelling Practice and Theory 47 (2014) 28–45Cont.docxSimulation Modelling Practice and Theory 47 (2014) 28–45Cont.docx
Simulation Modelling Practice and Theory 47 (2014) 28–45Cont.docxedgar6wallace88877
 
User-Interface Usability Evaluation
User-Interface Usability EvaluationUser-Interface Usability Evaluation
User-Interface Usability EvaluationCSCJournals
 
Process, design, implementation and evaluation of a mobile collaboration layer
Process, design, implementation and evaluation of a mobile collaboration layerProcess, design, implementation and evaluation of a mobile collaboration layer
Process, design, implementation and evaluation of a mobile collaboration layerMauro Pichiliani
 
Most Readed Articles in last Month - International Journal of Software Engine...
Most Readed Articles in last Month - International Journal of Software Engine...Most Readed Articles in last Month - International Journal of Software Engine...
Most Readed Articles in last Month - International Journal of Software Engine...ijseajournal
 
PATHS state of the art monitoring report
PATHS state of the art monitoring reportPATHS state of the art monitoring report
PATHS state of the art monitoring reportpathsproject
 
Metamodels evaluation of web engineering methodologies to develop web applica...
Metamodels evaluation of web engineering methodologies to develop web applica...Metamodels evaluation of web engineering methodologies to develop web applica...
Metamodels evaluation of web engineering methodologies to develop web applica...IJCSEA Journal
 
A hybrid crowd-powered.compressed
A hybrid crowd-powered.compressedA hybrid crowd-powered.compressed
A hybrid crowd-powered.compressedjoseph wanjekeche
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
 
Implementing Web Applications as Social Machines Composition: a Case Study
Implementing Web Applications as Social Machines Composition: a Case StudyImplementing Web Applications as Social Machines Composition: a Case Study
Implementing Web Applications as Social Machines Composition: a Case StudyKellyton Brito
 

Similaire à Web Application Testing in Fifteen Years of WSE (20)

Iaetsd a survey of various design patterns for improving quality and
Iaetsd a survey of various design patterns for improving quality andIaetsd a survey of various design patterns for improving quality and
Iaetsd a survey of various design patterns for improving quality and
 
Web Application Testing (Major Challenges and Techniques)
Web Application Testing (Major Challenges and Techniques)Web Application Testing (Major Challenges and Techniques)
Web Application Testing (Major Challenges and Techniques)
 
A Review on Web Application Testing and its Current Research Directions
A Review on Web Application Testing and its Current Research Directions A Review on Web Application Testing and its Current Research Directions
A Review on Web Application Testing and its Current Research Directions
 
ACCESSIBLE project concept and achievements
ACCESSIBLE project concept and achievementsACCESSIBLE project concept and achievements
ACCESSIBLE project concept and achievements
 
Rich Internet Applications
Rich Internet ApplicationsRich Internet Applications
Rich Internet Applications
 
A new approach to gather similar operations extracted from web services
A new approach to gather similar operations extracted from web servicesA new approach to gather similar operations extracted from web services
A new approach to gather similar operations extracted from web services
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
A systematic mapping study of performance analysis and modelling of cloud sys...
A systematic mapping study of performance analysis and modelling of cloud sys...A systematic mapping study of performance analysis and modelling of cloud sys...
A systematic mapping study of performance analysis and modelling of cloud sys...
 
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
Simulation Modelling Practice and Theory 47 (2014) 28–45Cont.docx
Simulation Modelling Practice and Theory 47 (2014) 28–45Cont.docxSimulation Modelling Practice and Theory 47 (2014) 28–45Cont.docx
Simulation Modelling Practice and Theory 47 (2014) 28–45Cont.docx
 
User-Interface Usability Evaluation
User-Interface Usability EvaluationUser-Interface Usability Evaluation
User-Interface Usability Evaluation
 
Process, design, implementation and evaluation of a mobile collaboration layer
Process, design, implementation and evaluation of a mobile collaboration layerProcess, design, implementation and evaluation of a mobile collaboration layer
Process, design, implementation and evaluation of a mobile collaboration layer
 
Most Readed Articles in last Month - International Journal of Software Engine...
Most Readed Articles in last Month - International Journal of Software Engine...Most Readed Articles in last Month - International Journal of Software Engine...
Most Readed Articles in last Month - International Journal of Software Engine...
 
PATHS state of the art monitoring report
PATHS state of the art monitoring reportPATHS state of the art monitoring report
PATHS state of the art monitoring report
 
Metamodels evaluation of web engineering methodologies to develop web applica...
Metamodels evaluation of web engineering methodologies to develop web applica...Metamodels evaluation of web engineering methodologies to develop web applica...
Metamodels evaluation of web engineering methodologies to develop web applica...
 
A hybrid crowd-powered.compressed
A hybrid crowd-powered.compressedA hybrid crowd-powered.compressed
A hybrid crowd-powered.compressed
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
 
2.pdf
2.pdf2.pdf
2.pdf
 
Implementing Web Applications as Social Machines Composition: a Case Study
Implementing Web Applications as Social Machines Composition: a Case StudyImplementing Web Applications as Social Machines Composition: a Case Study
Implementing Web Applications as Social Machines Composition: a Case Study
 

Plus de Porfirio Tramontana

An Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdfAn Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdfPorfirio Tramontana
 
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...Porfirio Tramontana
 
Techniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationTechniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationPorfirio Tramontana
 
A technique for parallel gui testing of android applications
A technique for parallel gui testing of android applicationsA technique for parallel gui testing of android applications
A technique for parallel gui testing of android applicationsPorfirio Tramontana
 
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...Porfirio Tramontana
 
Reverse Engineering Web Applications
Reverse Engineering Web ApplicationsReverse Engineering Web Applications
Reverse Engineering Web ApplicationsPorfirio Tramontana
 
A GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application TestingA GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application TestingPorfirio Tramontana
 
Rich Internet Application Testing Using Execution Trace Data
Rich Internet Application Testing  Using Execution Trace Data Rich Internet Application Testing  Using Execution Trace Data
Rich Internet Application Testing Using Execution Trace Data Porfirio Tramontana
 
An AHP-based Framework for Quality and Security Evaluation
An AHP-based Framework for Quality and Security EvaluationAn AHP-based Framework for Quality and Security Evaluation
An AHP-based Framework for Quality and Security EvaluationPorfirio Tramontana
 
Experimenting a Reverse Engineering Technique for Modelling the Behaviour of ...
Experimenting a Reverse Engineering Technique for Modelling the Behaviour of ...Experimenting a Reverse Engineering Technique for Modelling the Behaviour of ...
Experimenting a Reverse Engineering Technique for Modelling the Behaviour of ...Porfirio Tramontana
 
A policy-based evaluation framework for Quality and Security in Service Orien...
A policy-based evaluation framework for Quality and Security in Service Orien...A policy-based evaluation framework for Quality and Security in Service Orien...
A policy-based evaluation framework for Quality and Security in Service Orien...Porfirio Tramontana
 
Turning Web Applications into Web Services by Wrapping Techniques
Turning Web Applications into Web Services by Wrapping TechniquesTurning Web Applications into Web Services by Wrapping Techniques
Turning Web Applications into Web Services by Wrapping TechniquesPorfirio Tramontana
 
Migrating Interactive Legacy Systems To Web Services
Migrating Interactive Legacy Systems To Web ServicesMigrating Interactive Legacy Systems To Web Services
Migrating Interactive Legacy Systems To Web ServicesPorfirio Tramontana
 
A Technique for Reducing User Session Data Sets in Web Application Testing
A Technique for Reducing User Session Data Sets in Web Application TestingA Technique for Reducing User Session Data Sets in Web Application Testing
A Technique for Reducing User Session Data Sets in Web Application TestingPorfirio Tramontana
 

Plus de Porfirio Tramontana (14)

An Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdfAn Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdf
 
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
 
Techniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationTechniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing Automation
 
A technique for parallel gui testing of android applications
A technique for parallel gui testing of android applicationsA technique for parallel gui testing of android applications
A technique for parallel gui testing of android applications
 
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
 
Reverse Engineering Web Applications
Reverse Engineering Web ApplicationsReverse Engineering Web Applications
Reverse Engineering Web Applications
 
A GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application TestingA GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application Testing
 
Rich Internet Application Testing Using Execution Trace Data
Rich Internet Application Testing  Using Execution Trace Data Rich Internet Application Testing  Using Execution Trace Data
Rich Internet Application Testing Using Execution Trace Data
 
An AHP-based Framework for Quality and Security Evaluation
An AHP-based Framework for Quality and Security EvaluationAn AHP-based Framework for Quality and Security Evaluation
An AHP-based Framework for Quality and Security Evaluation
 
Experimenting a Reverse Engineering Technique for Modelling the Behaviour of ...
Experimenting a Reverse Engineering Technique for Modelling the Behaviour of ...Experimenting a Reverse Engineering Technique for Modelling the Behaviour of ...
Experimenting a Reverse Engineering Technique for Modelling the Behaviour of ...
 
A policy-based evaluation framework for Quality and Security in Service Orien...
A policy-based evaluation framework for Quality and Security in Service Orien...A policy-based evaluation framework for Quality and Security in Service Orien...
A policy-based evaluation framework for Quality and Security in Service Orien...
 
Turning Web Applications into Web Services by Wrapping Techniques
Turning Web Applications into Web Services by Wrapping TechniquesTurning Web Applications into Web Services by Wrapping Techniques
Turning Web Applications into Web Services by Wrapping Techniques
 
Migrating Interactive Legacy Systems To Web Services
Migrating Interactive Legacy Systems To Web ServicesMigrating Interactive Legacy Systems To Web Services
Migrating Interactive Legacy Systems To Web Services
 
A Technique for Reducing User Session Data Sets in Web Application Testing
A Technique for Reducing User Session Data Sets in Web Application TestingA Technique for Reducing User Session Data Sets in Web Application Testing
A Technique for Reducing User Session Data Sets in Web Application Testing
 

Dernier

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Dernier (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Web Application Testing in Fifteen Years of WSE

  • 1. Web Application Testing in Fifteen Years of WSE Anna Rita Fasolino Domenico Amalfitano Porfirio Tramontana Dipartimento di Ingegneria Elettrica e Tecnologie dell’Informazione University of Naples Federico II, Italy
  • 2. Web Application Testing  Web application testing has always been a relevant and attractive topic    Due to the widespread diffusion and success of WAs in the modern society And to the growing need for dependable, usable, effective, … quality apps Two decades of contributions in this area Hundreds of papers in the literature dealt with this topic over the last two decades [1]  More than 20 papers on Web study of were [1] V. Garousi, A. Mesbah, et al. “A systematic mappingTestingweb application testing, ” Information and Software Technology, vol. 55, no. editions. 8, pp. 1396–1374, Mar. 2013. Anna Ritapresented 2013 the past 09/28/2013 Fasolino - WSE in - Eindhoven - WSE 2 
  • 3. Web application testing : a selection of contributions from past WSE editions Area Topics Number of papers WA Testing Generic issues in Web testing 1 2007 Testing the Functionality White-box testing 3 2002, 2005, 2006 User-session based testing 1 2006 Model-based Testing WSE Editions 2007 Regression Testing 1 2009 Testing large Web applications 2 2004 Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 3
  • 4. Area Topics Testing nonfunctional requirements Accessibility assessment 4 Security and Vulnerability 5 Robusteness testing 1 2009 Performance testing 1 2004 Web Service Web Service testing 1 2006 Rich Internet Application (RIA) testing RIA testing automation 1 2010 Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 Number of papers WSE Editions 2002, 2003, 2005, 2011 4
  • 5. A fast survey about the contributions provided by some of these papers…   A preliminary contribution: The peculiarities of testing Web applications and the necessity for specialized skills in this field were remarked by Parveen, Tilley and Gonzalez in 2007 [2] T. Parveen, S. Tilley, and G. Gonzalez, “On the Need for Teaching Web Application Testing,” in 9th IEEE International Workshop on Web Site Evolution, 2007 Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 5
  • 6. Techniques for Testing the functionality of Web apps …  Three relevant contributions by Ricca and Tonella:  2002: white-box coverage criteria over two models of the application under test (a navigation model and a control flow model) [4]  2005: a roadmap for testing the functionality of a Web application and a comparison between techniques for functional testing, code coverage testing and model based testing [5]  2006: a Web fault taxonomy considering specific characteristics of a Web application that are likely to introduce faults in Web applications’ behavior [6] Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 6
  • 7. Techniques for Testing the functionality of large Web apps   2004: Bedi and Schroeder [7] focused on challenges of testing large scale e-commerce applications based on server-side scripting languages. 2004: Sneed [8] reported his experience and resulting insights about testing a complex Web system. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 7
  • 8. Black-Box and Model Based techniques    2002: Di Lucca and Di Penta [9] showed the necessity for analysing actions/events provided by the browser (such as the usage of backward and forward buttons) in order to discover navigation inconsistencies in Web applications 2006: Di Lucca, Fasolino and Tramontana [10] described a technique for downsizing test suites obtained from a set of user-sessions data 2007: Dai and Chen [11] used an inter-connection dependence model for generating sequences of Web pages that are potentially fault prone and for capturing cross-tier faults in multi-tier Web applications. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 8
  • 9. Regression Testing  A specific problem of WA: finding solutions for effectively comparing output executions to find real differences among them .  2009: Soechting et al. [12] proposed a technique to measure syntactic differences in the tree-structured output of Web apps for reducing the number of false positives in regression testing. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 9
  • 10. Rich Internet Application (RIA) testing   RIAs with their enhanced UI, responsiveness, and new implementation technologies renewed the scenarios of Web application testing. 2010: Amalfitano, Fasolino and Tramontana analysed the most critical open issues in RIA testing automation and proposed a classification framework of testing techniques based on:     goal of the technique (such as finding generic faults or application–specific ones) test case generation approach (i.e., code-based, requirementbased, by crawling, by user-session-data, by hybrid approaches) types of testing oracles categories of tools supporting testing automation. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 10
  • 11. Testing non-functional requirements: accessibility     2002: Kirchner analyzed the features of existing tools for verifying Web pages against accessibility guidelines and correcting accessibility problems. 2003: Kirchner presented a benchmark composed by a set of Web pages containing violations to guidelines and checkpoints defined by the WAI. 2005: Di Lucca, Fasolino, and Tramontana proposed a meta-model for representing the parts of the application involved in accessibility problems and a tool for accessibility analysis 2011: Kienle et al. presented a survey of articles from past WSE editions entitled “the past, present and future of Web Accessibility” 11
  • 12. Security and Vulnerability assessment      2005: Di Lucca, Fasolino, Tramontana, ... proposed an approach for Cross Site Scripting (XSS) vulnerability detection in a Web application. 2006: Muthuprasanna et al. presented a technique to detect and prevent SQL-Injection Attacks (SQLIA) in WA 2007: Merlo et al. proposed a two-step technique for finding SQL-Injections vulnerabilities 2012: Alalfi, Cordy, and Dean introduced a Model Driven approach (based on Prolog) to support the assessment of security properties in dynamic Web applications. 2010: Yagi et al. investigated the distribution of malwares on Web applications and used honeypot’s traffic patterns for the detection of malware files present in Was. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 12
  • 13. Robustness testing and Web Service Testing   2009: Xu et al. proposed an innovative three-steps approach (based on an ontology written in the Web Ontology Language for Services (OWL-S)) for generating robustness test data as invalid inputs. 2006: Sneed et al. presented a Web Service testing technique and a tool for simulating the usage of Web services and generating and validating system test data. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 13
  • 14. Web Application Testing: from the past to the present   Web applications evolved significantly over the last two decades, from the first static WA... Technologies, platforms, development approaches changed considerably: :      more complex and dynamic multi-layered systems business logic implemented both at the client and at the server side asynchronous interactions between layers (see RIAs and AJAX) Developed using CMS, Frameworks, Model-driven approaches… Adaptable, Context aware, Mobile Web applications Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 14
  • 15. WAs in the next future…     Growing complexity Will integrate more and more services, components, applications, and multimedia Will be able to adapt themselves to evolving execution environments and operating contexts Will have to be accessed by mobile devices, equipped with heterogeneous hardware, operating systems, and execution platforms... Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 15
  • 16. Web application testing: future perspectives…  New solutions of Web testing automation will be increasingly needed, for testing more and more complex apps   The applicability and effectiveness of searchbased, model-based, and crawling-based techniques will have to be investigated Suitable strategies for integration and system testing of complex Web applications will be needed Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 16
  • 17. Web application testing: future perspectives  New testing frameworks and environments will be necessary, with runtime monitoring capabilities   To cope with the issues of testing dynamic and selfadaptive Web applications New testing infrastructures also exploiting the computational capabilities of Service oriented architectures and Cloud computing will have to be designed  to cope with the fragmentation issues of testing applications running on heterogeneous execution platforms and including heterogeneous components Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 17
  • 18. References [1] V. Garousi, A. Mesbah, A. Betin-Can, and S. Mirshokraie, “A systematic mapping study of web application testing,” Information and Software Technology, vol. 55, no. 8, pp. 1396–1374, Mar. 2013. [2] T. Parveen, S. Tilley, and G. Gonzalez, “On the Need for Teaching Web Application Testing,” in 9th IEEE International Workshop on Web Site Evolution, 2007, pp. 51–55. [3] G. A. Di Lucca and A. R. Fasolino, “Testing Web-based applications: The state of the art and future trends,” Information and Software Technology, vol. 48, no. 12, pp. 1172–1186, 2006. [4] P. Tonella and F. Ricca, “A 2-layer model for the white-box testing of Web applications,” in 6th IEEE International Workshop on Web Site Evolution, 2004, pp. 11–19. [5] F. Ricca and P. Tonella, “Web Testing: a Roadmap for the Empirical Research,” in 7th IEEE International Symposium on Web Site Evolution, 2005, pp. 63–70. [6] A. Marchetto, F. Ricca, and P. Tonella, “Empirical Validation of a Web Fault Taxonomy and its usage for Fault Seeding,”in 9th IEEE International Workshop on Web Site Evolution, 2007, pp. 31–38. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 18
  • 19. [7] S. Bedi and P. J. Schroeder, “Observations on the implementation and testing of scripted Web applications,” in 6th IEEE International Workshop on Web Site Evolution, 2004, pp. 20–27. [8] H. M. Sneed, “Testing a Web application,” 6th IEEE International Workshop on Web Site Evolution, 2004, pp. 3–10. [9] G. A. Di Lucca and M. Di Penta, “Considering browser interaction in Web application testing,” in 5th IEEE International Workshop on Web Site Evolution, 2003, pp. 74–81. [10] S. Elbaum, G. Rothermel, and M. F. Ii, “Leveraging UserSession Data to Support Web Application Testing” in IEEE Transactions on Software Engineering, , vol. 31, no. 3, pp. 187–201, 2005 [11] S. Sampath, I. C. Society, S. Sprenkle, E. Gibson, L. Pollock, and A. S. Greenwald, “Applying Concept Analysis to User-SessionBased Testing of Web Applications,” in IEEE Transactions on Software Engineering, , vol. 33, no. 10, pp. 643–658, 2007. [12] D. Amalfitano, A. R. Fasolino, and P. Tramontana, “Rich Internet Application Testing Using Execution Trace Data,” in 3th International Conference on Software Testing, Verification, and Validation Workshops, 2010, pp. 274–283. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 19
  • 20. [13] G. A. Di Lucca, A. Fasolino, and P. Tramontana, “A Technique for Reducing User Session Data Sets in Web Application Testing,” in 8th IEEE International Symposium on Web Site Evolution, 2006, pp. 7–13. [14] Z. Dai and M.-H. Chen, “Automatic Test Case Generation for Multi-tier Web Applications,” in 9th IEEE International Workshop on Web Site Evolution, 2007, pp. 39–43. [15] E. Soechting, K. Dobolyi, and W. Weimer, “Syntactic regression testing for tree-structured output,” in 11th IEEE International Symposium on Web Systems Evolution, 2009, pp. 39–48. [16] D. Amalfitano, A. R. Fasolino, and P. Tramontana, “Techniques and tools for Rich Internet Applications testing,” in 12th IEEE International Symposium on Web Systems Evolution, 2010, pp. 63–72. [17] M. Kirchner, “Evaluation, repair, and transformation of Web pages for Web content accessibility. Review of some available tools,” in 4th IEEE International Workshop on Web Site Evolution, 2002, pp. 65–72. [18] M. Kirchner, “Benchmark for testing the evaluation tools for Web pages accessibility,” in 5th IEEE International Workshop on Web Site Evolution, 2003, pp. 66–73. [19] G. A. Di Lucca, A. R. Fasolino, and P. Tramontana, “Web Site Accessibility: Identifying and Fixing Accessibility Problems in Client Page Code,” in 7th IEEE International Symposium on Web Site Evolution, 2005, pp. 71–78. [20] H. Kienle, P. Tramontana, S. Tilley, and D. Bolchini, “Ten years of access for all from WSE 2001 to WSE 2011,” in 13th IEEE International Symposium on Web Systems Evolution, 2011, pp. 99–104. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 20
  • 21. [21] G. A. Di Lucca, A. R. Fasolino, M. Mastroianni, and P. Tramontana, “Identifying cross site scripting vulnerabilities in Web applications,” in 6th IEEE International Workshop on Web Site Evolution, 2004, pp. 71–80. [22] M. Muthuprasanna, K. Wei, and S. Kothari, “Eliminating SQL Injection Attacks - A Transparent Defense Mechanism,” in 8th IEEE International Symposium on Web Site Evolution, 2006, pp. 22–32. [23] E. Merlo, D. Letarte, and G. Antoniol, “SQL-Injection Security Evolution Analysis in PHP,” in 9th IEEE International Workshop on Web Site Evolution, 2007, pp. 45–49. [24] M. H. Alalfi, J. R. Cordy, and T. R. Dean, “Automated verification of role-based access control security models recovered from dynamic web applications,” in 14th IEEE International Symposium on Web Systems Evolution, 2012, pp. 1–10. [25] D. Basin, M. Clavel, and M. Egea, “A decade of model-driven security,” in 16th ACM Symposium on Access Control Models and Technologies, 2011, pp.1-10. [26] T. Yagi, N. Tanimoto, T. Hariu, and M. Itoh, “Investigation and analysis of malware on websites,” in 12th IEEE International Symposium on Web Systems Evolution, 2010, pp. 73–81. [27] L. Xu, Q. Yuan, J. Wu, and C. Liu, “Ontology-based Web Service robustness test generation,” in 11th IEEE International Symposium on Web Systems Evolution, 2009, pp. 59–68. [28] H. Sneed and S. Huang, “WSDLTest - A Tool for Testing Web Services,” in 8th IEEE International Symposium on Web Site Evolution, 2006, pp. 14–21. [29] S. Barber, “Creating effective load models for performance testing with incomplete empirical data,” in 6th IEEE International Workshop on Web Site Evolution, 2004, pp. 51–59. Anna Rita Fasolino - WSE 2013 - Eindhoven - 09/28/2013 21