CN107104850A - A kind of Quantum Chain method of testing - Google Patents

A kind of Quantum Chain method of testing Download PDF

Info

Publication number
CN107104850A
CN107104850A CN201710182050.XA CN201710182050A CN107104850A CN 107104850 A CN107104850 A CN 107104850A CN 201710182050 A CN201710182050 A CN 201710182050A CN 107104850 A CN107104850 A CN 107104850A
Authority
CN
China
Prior art keywords
test
network
quantum
testing
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710182050.XA
Other languages
Chinese (zh)
Inventor
钱德君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710182050.XA priority Critical patent/CN107104850A/en
Publication of CN107104850A publication Critical patent/CN107104850A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0888Throughput
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Abstract

The present invention relates to a kind of Quantum Chain method of testing, the platform for Quantum Chain will be before being disposed, and test must keep stringency;Method of testing includes the functional test of software, network P 2 P test, aggressive test, reliability testing etc., method of testing covering is complete, need to consider various aspects when will use Quantum Chain system, and it will issue and update in test network, enter the examination of line code before issue, effectively ensure security, the availability of system by test.

Description

A kind of Quantum Chain method of testing
Technical field
It is a kind of Quantum Chain method of testing the present invention relates to quantum catenary system on internet.
Background technology
In quantum catenary system, primary is directed to one compatible UTXO model towards the High Availabitity of different industries of offer POS intelligent contract platform.UTXO models are a parts for bit coin network very core, and code therein possesses ratio Higher maturity, in compatibility UTXO models among these, can not only receive other developers of the bit coin ecosystem and show There is developing instrument, there can also be relatively good security.In addition, the virtual machine part on intelligent contract, the survey of Quantum Chain Virtual machine must be also supported in examination network.Therefore, quantum catenary system will pass through a series of strict tests before distribution, pass through Sophisticated software testing process, carrys out control software quality.
The content of the invention
In view of this, the present invention provides a kind of Quantum Chain method of testing for solving or partly solving the above problems.
To reach the effect of above-mentioned technical proposal, the technical scheme is that:A kind of Quantum Chain method of testing, comprising with Lower content:
Functional test, each method for the application programming interface of Quantum Chain core is tested, it is necessary in generation Reached on code 85% coverage rate, for each methods described describe in detail specification in additional test logic, to cover complexity Case;
Scrnario testing, defines the high level scene set with complicated test logic, comprising:
1. the new assets of distribution;
2. create new transaction;
3. create specific order, and the need for being recorded in assets to meet quantum coin;
4. do a set of transaction;
Final result is tracked, the scrnario testing must include interacting for subsystem and patrolling for complexity Volume;
Network test, wherein network delay and throughput problem emphatically, test of the operation with different topology structure Network, and simulate different situations:The first situation is, the degeneration of network key connection delay;Second of situation be, network The degeneration of the handling capacity of middle key node;
Network P 2 P is tested, and builds network and analog case set to obtain peer-to-peer network:
1. core name node will be eliminated by third party;
2. network will be decomposed into separate sub-network;
3. note the speed of transaction and block in heterogeneous networks topological broadcast;
4. the problem of avoiding circulating propagation;
Performance test, can allow for verifying the calculating performance of a local node, without considering network delay effect;In order to Such test, we have to carry out network virtualization model and go to exclude network effect, and test is necessary for each application program and compiled Journey interface performs progress large-scale application Program Interfaces and called;
A scalable network is tested, and high load capacity degraded test and the high load capacity test of different topology structure are carried out wherein, In high load capacity degraded test, operation Quantum Chain system interior joint set and the transaction of generation maximum quantity per second will Both propagate in a network, collection of statistical data and reduction and the other problemses for observing performance;In the different topology knot In the high load capacity test of structure, the node set operated in different topological structures, and produce transaction flow;
The storage test of scalability, produces the local entity of maximum quantity, and verify key parameter and all look into The degeneration of inquiry;
Finance test, in the finance test, carries out decimal accuracy test, the complex transaction with final balance checking Generation scheme, system time F.F. experiment;
Financial crisis is tested, in the case of different financial crises, carries out benchmark test, can be false in the benchmark test If condition for the huge rate of recovery, license gateway it is default, encryption gateway default, tested on this condition;
Aggressiveness test, for the complicated threat modeling that system design is enough, and analyze all possible threat and Attempt to avoid its generation, be that they create sharp alleviation plan;And, it is necessary to which testing standard is attacked, the standard is attacked Hit and spread unchecked comprising dual cost attack, common recognition attack, the transaction of distributed denial of service;
Reliability testing, the relevant specific test of system is carried out on special virtual machine and observe they how along with Time performs their activity, all key parameters is being noted among these, and attempt to find out the degenerate case of key parameter;
Active block is tested, and what only operation was seldom has different topology structure, disables/enable node, with network key The network of parameter degradation, just for active block, is noting the situation when full node will be unable to use among these;
The completely available property of file can be realized on network with storage test, dispose complete network, and upload network text Part and node is destroyed one by one, to observe whether network can provide required availability level;
Security test, analyzes useful safety problem, and all overlay areas are carried out with complicated analysis;
Version is tested, and test network is disposed during this, and is disposed over the network after the node of new different editions, Attempt to pass through every other test.
The present invention useful achievement be:The invention provides a kind of Quantum Chain method of testing, the platform of Quantum Chain will be in quilt Pass through strict test before deployment;This includes the functional test of software, network P 2 P test, aggressive test, reliability testing Deng, and renewal will be issued in test network, the examination of line code is entered before issue, test effectively ensures the safety of system Property, availability.
Embodiment
In order that technical problems, technical solutions and advantages to be solved are more clearly understood, tie below Embodiment is closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only to explain The present invention, is not intended to limit the present invention, and can realize that the product of said function belongs to equivalent substitution and improvement, be all contained in this hair Within bright protection domain.Specific method is as follows:
Embodiment 1:It must all complete and be announced in Internet community in all tests of setting up every time weekly.Test Strategy It is as follows:
1. functional test
For quantum core api each method.We must reach 85% coverage rate on code.For each side We will be explained in additional test logic in specification to method, can so cover the case of complexity.Therefore, we will determine Our logic function is intact defined in specification and make good progress.
2. scrnario testing
We define the high level scene set with complicated test logic, comprising:
1. the new assets of distribution
2. create new transaction
3. create specific order, and the need for being recorded in assets to meet quantum coin.
4. do a set of transaction
Final result is tracked, such scrnario testing must include interacting for subsystem and patrolling for complexity Volume.
3. network test
We must focus on network delay and throughput problem in this test.
We must run the test network with different topology structure, and must simulate different situations.The first Situation is, the degeneration of network key connection delay, and second of situation be, the degeneration of the handling capacity of key node in network.We It must pay close attention to how network shows and adapt to such case.
4. network P 2 P is tested
We must build network and analog case set to obtain peer-to-peer network.
1. core name node will be eliminated by third party.
2. network will be decomposed into separate sub-network.
3. note the speed of transaction and block in heterogeneous networks topological broadcast.
4. the problem of avoiding circulating propagation.
5. performance test
Performance test can allow for us and verify the calculating performance of a local node, without considering network delay effect. For such test, we have to carry out network virtualization model and go to exclude network effect.Test is necessary for each API and performed Carry out extensive API Calls.For example, the millions of transaction of establishment per second and the degeneration of observation core capabilities parameter.
6. a scalable network is tested
Some topologys that we less must be realized on network:
1. core network node
2. proxy network node
High load capacity Degrading experiment
We must run the transaction of node set and generation maximum quantity per second and propagate in a network.Collect statistics Data and reduction and the other problemses for observing performance.
The high load capacity of different topology structure
We must run node set, and produce transaction flow, but all these nodes will be included in different open up Flutter in structure.
7. the storage test of scalability
We must produce the local entity of maximum quantity, and verify key parameter and the degeneration of all inquiries.
8. finance test
We must carry out the finance test of many standards.
1. decimal accuracy test
2. the complex transaction generation scheme with final balance checking
The time F.F. experiment of lifetime of system in 3.10
9. financial crisis is tested
System must be reliable in the case of different financial crises.We need to carry out benchmark test to them:
1. the huge rate of recovery
2. permit the default of gateway
3. encryption gateway is default
10. aggressiveness test
We must be for the enough complicated threat modelings of system design.We must analyze all possible threat simultaneously And attempt to avoid its generation, it is that they create sharp alleviation plan.
For example, we there is a situation where to cover, the situation is that intelligent contract logic can be passed by hacker attacks and value Bad user will be distributed to by passing.
Also, we must test the testing standard in these networks and attack, such as:
1. dual cost attack
2. common recognition attack
3. the transaction of distributed denial of service is spread unchecked
11. reliability testing
System must be reliable.We must carry out the relevant specific test of system on special virtual machine and observe them How their activity is performed along with the time.It must be noted that all key parameters, and attempt to find out the degeneration of key parameter Situation.
12. active block is tested
We, which must run, seldom have different topology structure, disables/enable node, with network key parameter degradation Network.Particularly, the situation that we must be noted that is, when full node will be unable to use.
13. storage test can be used
We must realize the completely available property of file on network.It would therefore be desirable to dispose complete network, upload Network file and node is destroyed one by one, to observe whether network can provide required availability level.
14. security test
The problem of we must analyze useful safety problem such as buffer overflow.We are carried out to all overlay areas Complexity analysis.
15. version is tested
We must dispose test network, and be disposed on network after the node of new different editions, attempt by all Other tests.
Embodiment 2:The formalization logic of test
The establishment of transaction:
Wherein,
The establishment of block:
Wherein,Proved for test, the test proves to be used for by selecting evidence scheme to create block. Evidence scheme has Proof-of-Work | Proof-of-Stake | tri- kinds of Proof-of-Time.
The establishment of intelligent contract:
Create address, private key and public key:
The test transaction propagation time:
Test block is set up and the propagation time:
Test protection to network attack is directed to following aspect:Unwarranted expenditure, double expenditures, competition attack, history Modification, excavation privately, Sybil attack, 51% attack.
The preferred embodiments of the invention is the foregoing is only, the claims of the present invention are not limited to. Simultaneously it is described above, for those skilled in the technology concerned it would be appreciated that and implement, therefore other be based on institute of the present invention The equivalent change that disclosure is completed, should be included in the covering scope of the claims.
The present invention useful achievement be:The invention provides a kind of Quantum Chain method of testing, the platform of Quantum Chain will be in quilt Pass through strict test before deployment;This includes the functional test of software, network P 2 P test, aggressive test, reliability testing Deng, and renewal will be issued in test network, the examination of line code is entered before issue, test effectively ensures the safety of system Property, availability.

Claims (1)

1. a kind of Quantum Chain method of testing, applied to quantum catenary system, it is characterised in that include functional test, scrnario testing, net Network test, network P 2 P test, performance test, a scalable network test, the storage of scalability test, finance test, finance danger Machine test, aggressive test, reliability testing, active block are tested, can tested with storage test, security test, version:
The functional test, testing needle is to each method of the application programming interface of the quantum catenary system center heart, coverage rate On reach 85%, the additional test logic in specification is described in detail, to cover the case of complexity;
The scrnario testing, is tested the high level scene set in quantum catenary system, and the high level scene set is comprising more Individual test scene, the test scene is included:1. the new assets of distribution;2. create new transaction;3. specific order is created, and The need for being recorded in assets to meet quantum coin;4. carry on a deal;
The final result of the scrnario testing is tracked, the scrnario testing must interacting comprising subsystem;
The network test, the test network of the network test operation with different topology structure, and simulate wherein different Situation:The first situation is, the degeneration of crucial connection delay in network;Second of situation is that key node gulps down in network The degeneration for the amount of telling;
The network P 2 P test, builds the situation set of network and simulation to obtain peer-to-peer network, the situation set is as follows:
1. the core name node in network will be eliminated by the third party merchandised;
2. network is broken down into separate sub-network;
3. block is propagated in heterogeneous networks topological structure, wherein the speed of transaction is brought into as key value;
4. the possibility of circulating propagation is removed;
The performance test, the calculating performance of a local node is verified in the case where not considering the carryover effects of network;The performance Test execution network virtualization model is to exclude the unfavorable effect of network, and the execution of each application programming interface can be advised greatly Call other applications DLL mould;
The a scalable network test, the high load capacity test comprising high load capacity degraded test and different topology structure, described In high load capacity degraded test, the operation Quantum Chain system interior joint set and transaction of generation maximum quantity per second, make both Propagated in network, statistics and the problem of observe the reduction and related generation of performance;In the different topology structure In high load capacity test, the node set operated in different topological structures, and produce transaction flow;
The storage test of the scalability, is extended, extension produces the local entity pair of maximum quantity to quantum catenary system As, and verify all key parameters and the degeneration of inquiry during generation;
The finance test, in the finance test, carries out decimal accuracy test, the complex transaction verified with resulting balance Generation scheme, system time F.F. experiment, the decimal accuracy test are carried out in precision to the numeral after the decimal point of fund Test, the complex transaction generation scheme verified with resulting balance is in the final result to large-scale, complicated transaction Remaining sum verified, verify the accuracy of the number of remaining sum, system time F.F. experiment for prediction future transaction money Gold change;
The financial crisis test, in the case of different financial crises, carries out benchmark test, assumes in the benchmark test Condition be the huge rate of recovery, license gateway it is default, encryption gateway default, assuming that under conditions of tested;
The aggressive test, for the complicated threat modeling that Quantum Chain system design is enough, and analyzes all possible prestige Coerce and attempt to avoid its generation, be that described threaten creates sharp alleviation plan;And, it is necessary to testing standard is attacked, The standard attacks include dual cost attack, common recognition attack, the spilling of the transaction of distributed denial of service;
The reliability testing, carries out the specific test and observation specific survey related to quantum catenary system on special virtual machine The change that is shown along with the change of time is tried, moving back for the specific test and the key parameter in the change is found out Change;
The active block test, is tested, the active block is tool in the active block test for active block Have less different topology structure, disable and enable node, the network of network key parameter degradation, for that can not make when full node The situation of used time carries out stress test;
It is described that the completely available property of file is realized on network with storage test, complete network is disposed, and upper transmitting file is simultaneously Node sequentially in destruction network, to observe whether network can provide required availability level;
All safety problems in the security test, analysis Quantum Chain system, and to all coverings of the safety problem Region carries out complicated analysis;
Version test, disposes test network during this, and disposes on this test network the section of new different editions After point, attempt by all other tests tested except the version.
CN201710182050.XA 2017-03-24 2017-03-24 A kind of Quantum Chain method of testing Pending CN107104850A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710182050.XA CN107104850A (en) 2017-03-24 2017-03-24 A kind of Quantum Chain method of testing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710182050.XA CN107104850A (en) 2017-03-24 2017-03-24 A kind of Quantum Chain method of testing

Publications (1)

Publication Number Publication Date
CN107104850A true CN107104850A (en) 2017-08-29

Family

ID=59674751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710182050.XA Pending CN107104850A (en) 2017-03-24 2017-03-24 A kind of Quantum Chain method of testing

Country Status (1)

Country Link
CN (1) CN107104850A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107844704A (en) * 2017-11-01 2018-03-27 济南浪潮高新科技投资发展有限公司 One kind is based on block chain believable intelligent contract reinforcement means
CN109471744A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The more subchain system architectures of main chain adduction row based on block chain
CN109508981A (en) * 2017-09-15 2019-03-22 富士通株式会社 Method and apparatus for testing intelligent contract
CN110162470A (en) * 2019-04-28 2019-08-23 阿里巴巴集团控股有限公司 A kind of test method and device of block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6804709B2 (en) * 2001-02-20 2004-10-12 Microsoft Corporation System uses test controller to match different combination configuration capabilities of servers and clients and assign test cases for implementing distributed testing
CN101820346A (en) * 2010-05-04 2010-09-01 北京飞天诚信科技有限公司 Secure digital signature method
CN102184353A (en) * 2011-04-02 2011-09-14 方园 Method for preventing online payment data from being intercepted
CN106101242A (en) * 2016-06-24 2016-11-09 深圳前海微众银行股份有限公司 The construction method of block chain cloud service platform and device
CN106503098A (en) * 2016-10-14 2017-03-15 中金云金融(北京)大数据科技股份有限公司 It is built in the block chain cloud service frame system of Paas service layers

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6804709B2 (en) * 2001-02-20 2004-10-12 Microsoft Corporation System uses test controller to match different combination configuration capabilities of servers and clients and assign test cases for implementing distributed testing
CN101820346A (en) * 2010-05-04 2010-09-01 北京飞天诚信科技有限公司 Secure digital signature method
CN102184353A (en) * 2011-04-02 2011-09-14 方园 Method for preventing online payment data from being intercepted
CN106101242A (en) * 2016-06-24 2016-11-09 深圳前海微众银行股份有限公司 The construction method of block chain cloud service platform and device
CN106503098A (en) * 2016-10-14 2017-03-15 中金云金融(北京)大数据科技股份有限公司 It is built in the block chain cloud service frame system of Paas service layers

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508981A (en) * 2017-09-15 2019-03-22 富士通株式会社 Method and apparatus for testing intelligent contract
CN107844704A (en) * 2017-11-01 2018-03-27 济南浪潮高新科技投资发展有限公司 One kind is based on block chain believable intelligent contract reinforcement means
CN107844704B (en) * 2017-11-01 2019-12-31 浪潮集团有限公司 Credible intelligent contract reinforcing method based on block chain
CN109471744A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The more subchain system architectures of main chain adduction row based on block chain
CN109471744B (en) * 2018-11-21 2021-08-17 北京蓝石环球区块链科技有限公司 Main chain and parallel multi-sub-chain system architecture based on block chain
CN110162470A (en) * 2019-04-28 2019-08-23 阿里巴巴集团控股有限公司 A kind of test method and device of block chain
CN110162470B (en) * 2019-04-28 2023-08-18 创新先进技术有限公司 Block chain testing method and device

Similar Documents

Publication Publication Date Title
CN107104850A (en) A kind of Quantum Chain method of testing
Meinicke et al. On essential configuration complexity: Measuring interactions in highly-configurable systems
Lohachab et al. Towards interconnected blockchains: A comprehensive review of the role of interoperability among disparate blockchains
Garrido-Pelaz et al. Shall we collaborate? A model to analyse the benefits of information sharing
CN109615524B (en) Money laundering crime group partner identification method, money laundering crime group partner identification device, computer equipment and storage medium
EP3629551B1 (en) An apparatus, computer program and method for real time tracing of transactions through a distributed network
Li et al. A survey of DeFi security: Challenges and opportunities
WO2012012861A1 (en) System and method for efficiently deploying massively diverse program instances to resist differential attacks
EP3629273B1 (en) An apparatus, computer program and method
CN108460689A (en) A kind of declaration form analysis method, device, terminal device and storage medium
CN111489166A (en) Risk prevention and control method, device, processing equipment and system
Hughes et al. From playing games to committing crimes: A multi-technique approach to predicting key actors on an online gaming forum
Bodeau et al. System-of-systems threat model
CN113723954A (en) Method for detecting and supervising abnormal transaction nodes in block chain
CN115455435A (en) Intelligent contract fuzzy test method and device, storage medium and electronic equipment
Siewruk et al. Context-aware software vulnerability classification using machine learning
Baca Developing secure software: In an agile process
Trad Business Architecture and Transformation Projects: Enterprise Holistic Security Risk Management (ESRM)
Gupta et al. The experimental analysis of information security management issues for online financial services
Almashaqbeh et al. ABC: a cryptocurrency-focused threat modeling framework
Bouquet et al. Model-based testing for functional and security test generation
Liu et al. Complexity measures for secure service-oriented software architectures
Hamdi et al. Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures
Trad Enterprise Transformation Projects-Cloud Transformation Concept–Holistic Security Integration (CTC-HSI)
Trozze et al. Detecting DeFi securities violations from token smart contract code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170829