CN107957954A - The method and system of test data security is improved under a kind of linux system - Google Patents

The method and system of test data security is improved under a kind of linux system Download PDF

Info

Publication number
CN107957954A
CN107957954A CN201711376526.XA CN201711376526A CN107957954A CN 107957954 A CN107957954 A CN 107957954A CN 201711376526 A CN201711376526 A CN 201711376526A CN 107957954 A CN107957954 A CN 107957954A
Authority
CN
China
Prior art keywords
test
data
test data
database
executable program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711376526.XA
Other languages
Chinese (zh)
Other versions
CN107957954B (en
Inventor
刘智刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201711376526.XA priority Critical patent/CN107957954B/en
Publication of CN107957954A publication Critical patent/CN107957954A/en
Application granted granted Critical
Publication of CN107957954B publication Critical patent/CN107957954B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

The embodiment of the present application discloses the method and system that test data security is improved under a kind of linux system, and this method includes:By can not the executable program of decompiling obtain test data, the data writing commands to database are included in the executable program;According to the item types of test, by calling in the executable program to the data writing commands of database, test data is automatically write in database;Test data in the test report that test data and tester in comparison database are edited, checks the uniformity of test data.The system includes test data acquisition module, test data writing module and checks module.Method and system in the application, can effectively improve the safety and reliability of test data.

Description

The method and system of test data security is improved under a kind of linux system
Technical field
It is safe more particularly to test data is improved under a kind of linux system this application involves system testing technical field The method and system of property.
Background technology
System testing, is to carry out science to a complete server external member, have the test of planning.Specifically, pass through Test obtained test data and test log come examine system under test (SUT) whether meet standard requirement specification, and for The place of the cause diversified in specifications of standard requirement carries out case study, the scheme after optimization is drawn, according to the scheme after optimization to quilt Examining system re-starts test, untill test data and test log meet the specification of product standard requirement.
Current system detection method is typically, it is first determined testing standard, it is by not to test normal data used Respective standard is confirmed to different test objects with approach;Then data source is by the calculations of various systems, finally A series of test datas are formed, the formed data of test are generally stored on server with editable textual form, tested Personnel carry out crawl extracts to the test data of editable text form, are then copied in corresponding test report;Finally will Test data is contrasted with normal data, judges whether system and hardware are qualified according to comparing result.
However, in current system detection method, since test data is usually stored in clothes with editable textual form It is engaged on device, user can modify it by instruments such as vim, nano, replicate, and therefore, test data is in transmittance process In safety and reliability it is excessively poor, there is the possibility being tampered, so as to cause test result inaccurate.
The content of the invention
The method and system that test data security is improved under a kind of linux system is provided in the embodiment of the present application, with Solve the problems, such as that test data safety and reliability in transmittance process is not high enough in the prior art.
In order to solve the above-mentioned technical problem, the embodiment of the present application discloses following technical solution:
A kind of method that test data security is improved under linux system, it is characterised in that the described method includes:
By can not the executable program of decompiling obtain test data, include to database in the executable program Data writing commands;
, will by calling to the data writing commands of database in the executable program according to the item types of test Test data is automatically write in database;
Test data in the test report that test data and tester in comparison database are edited, checks test The uniformity of data.
Alternatively, it is described by can not decompiling executable program obtain test data method, include the following steps:
First test script of increasing income property is all recompilated, obtain can not decompiling executable program, described the One test script is the test script for the official release issued on File Transfer Protocol platform;
Current test object is tested by the executable program, obtains test data.
Alternatively, it is described by can not decompiling executable program obtain test data method, include the following steps:
The second test script is obtained, second test script is the test script being being currently used;
Second test script is verified using MD5 calibration tools, judge second test script whether with First test script is consistent;
When second test script is consistent with first test script, using can not the program language of decompiling connect Mouthful call second test script, obtain can not decompiling executable program;
Current test object is tested by the executable program, obtains test data.
Alternatively, according to the item types of test, the data of database are write by calling in the executable program Order, before test data is automatically write in database, the method further includes:
Tables of data is created according to test event type, different test events is distinguished data different in correspondence database Table, the tables of data are used for storage standards data and test data.
Alternatively, the structure of the tables of data includes table name, field name and field type.
Alternatively, according to the item types of test, by test data by it is described can not decompiling program language it is automatic After in write into Databasce, the method further includes:
By checking database, in the whether whole write into Databasce of exact p-value data.
Alternatively, to checking the user of database, the authority for being only limitted to check is set.
A kind of system that test data security is improved under linux system, it is characterised in that the system comprises:
Test data acquisition module, for by can not decompiling executable program obtain test data, it is described to hold The data writing commands to database are included in line program;
Test data writing module, for the item types according to test, by calling logarithm in the executable program According to the data writing commands in storehouse, test data is automatically write in database;
Check module, the test in the test report edited for the test data in comparison database and tester Data, check the uniformity of test data.
Alternatively, the test data acquisition module includes:
Executable program acquiring unit, is all recompilated, acquisition can not be anti-for the first test script to increasing income property The executable program of compiling, first test script are the test foot for the official release issued on File Transfer Protocol platform This;Alternatively,
When the second test script is consistent with first test script, with can not decompiling program language interface call Second test script, obtain can not decompiling executable program, second test script is being currently used Test script;
Test data acquiring unit, for being tested by the executable program current test object, obtains Test data.
Alternatively, the system also includes:Tables of data creation module, for creating tables of data according to test event type, Different test events is set to distinguish tables of data different in correspondence database, the tables of data is used for storage standards data and test Data.
The technical solution that embodiments herein provides can include the following benefits:
The embodiment of the present application provides a kind of method that test data security is improved under linux system, first by can not The executable program of decompiling obtains test data, and the data writing commands to database are included in executable program.Due to In the application using can not decompiling executable program obtain test data, can ensure from source perform test action survey Training originally can not be changed, thus by the test data acquired in the test script be also it is safe and reliable, can be from raising The angle of test script reliability greatly improves the security of test data.Due in the executable program in the embodiment of the present application Comprising the data writing commands to database, therefore, when according to test event type, test data is automatically write in database, Data otherwise must can not be write, this is just by calling the data writing commands in executable program to carry out data write-in Ensure the test data that acquired test data is true unmodified mistake, therefore, be conducive to improve in database and test number According to safety and reliability.Finally, during the application is implemented, compiled by the test data in comparison database and tester Test data in the test report collected, checks the uniformity of test data, can further improve the accuracy of test data And reliability.In addition, it can avoid making to checking that the user setting of database is only limitted to the authority checked in the embodiment of the present application Modification of the user to test data, is conducive to further improve the safety and reliability of test.
The embodiment of the present application also provides the system that test data security is improved under a kind of linux system, which includes Test data acquisition module, wherein three parts of test data writing module and inspection module, test data acquisition module are again Including executable program acquiring unit and test data acquiring unit.The setting of executable program acquiring unit, can be by not Can the program language of decompiling the test script of increasing income property is compiled, due to its can not decompiling characteristic, can be effective The source for ensuring test program is unique, reliable, so as to improve the security of test data.Test data writing module Setting, by calling in executable program to the data writing commands of database, be able to will be tested according to the item types of test Data are automatically write in database, no so as to ensure that user must call the data writing commands in executable program Then can not be by test data write into Databasce, this ensures that acquired test data is real test data, avoids making The situation that user modifies test data, is conducive to improve the safety and reliability of test data.The embodiment of the present application Also module is checked by setting, the test data in the test report edited to the test data in database and tester Contrasted, check the uniformity of test data, be conducive to further improve the security of test data.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not The application can be limited.
Brief description of the drawings
It is illustrated more clearly that the technical solutions in the embodiments of the present application or in the prior art, below will be to embodiment or existing Attached drawing is briefly described needed in technology description, it should be apparent that, for those of ordinary skills, Without creative efforts, other attached drawings can also be obtained according to these attached drawings.
The stream of the method for test data security is improved under a kind of linux system that Fig. 1 is provided by the embodiment of the present application Journey schematic diagram;
The method of test data security is improved under another linux system that Fig. 2 is provided by the embodiment of the present application Flow diagram;
The knot of the system of test data security is improved under a kind of linux system that Fig. 3 is provided by the embodiment of the present application Structure schematic diagram.
Embodiment
It is in order to make those skilled in the art better understand the technical solutions in the application, real below in conjunction with the application The attached drawing in example is applied, the technical solution in the embodiment of the present application is clearly and completely described, it is clear that described implementation Example is merely a part but not all of the embodiments of the present application.It is common based on the embodiment in the application, this area Technical staff's all other embodiments obtained without making creative work, should all belong to the application protection Scope.
System testing, is using the software by integration testing as other in a part, with system of computer system Part combines, soft to find to a series of being strictly effectively tested of computer system progress under actual motion environment The problem of part is potential, ensures the normal operation of system.System testing is to be directed to the test that whole product systems carry out, test object Not only include the software that need to be tested, the hardware also relied on comprising software, peripheral hardware are even soft including some data, some supports Part and its interface etc..The method and system that test data security is improved in the application is to be based on Linux platform, is suitable for The system such as the operating system of all mainstreams, such as RHEL, CENTOS, SUSE, UBUNTU under Linux.In the embodiment of the present application only with It is illustrated exemplified by RHEL7 systems.
Embodiment one
Referring to Fig. 1, test data security is improved under a kind of linux system that Fig. 1 is provided by the embodiment of the present application The flow diagram of method.As shown in Figure 1, the method in the embodiment of the present application mainly includes the following steps:
S1:By can not decompiling executable program obtain test data.Wherein, included in executable program to data The data writing commands in storehouse.
Test script in linux system is usually the test script of increasing income property, such as scripts or python, this Increasing income property test script can carry out decompiling, can not ensure the reliability of test data.Using not in the embodiment of the present application Can the program language of decompiling common increasing income property test script in linux system is compiled, due to selected program Language can not decompiling characteristic, it can be ensured that test script is unique, reliable, so as to from test program source Angle improves the security of test data.In the present embodiment can not the executable program of decompiling can be by C language come real It is existing.
Further, step S1 can include following two methods in the embodiment of the present application:
First method specifically comprises the following steps:
S111:First test script of increasing income property is all recompilated, obtain can not decompiling executable program.Its In, the first test script is the test script for the official release issued on File Transfer Protocol platform, that is, on FTP platforms Official's test script of unmodified mistake.FTP platforms are typically a ftp server, and being stored on the server has various instruments And data, administrator's account be able to may only be downloaded data with uplink data, regular account, it is not possible to change data.
S112:Current test object is tested by the executable program, obtains test data.
From above step S111-S112, first method is equivalent to closed data source, i.e.,:Test script is closed To can not be in the executable program of decompiling, so as to fulfill the secrecy of test data.It should be noted that this method needs pair Test script all recompilates, and all rewrites test script for example with C language, thoroughly prevents to repair from the angle of test script Change the possibility of test script, the security of test data can be effectively improved, but workload is bigger.
Second method specifically comprises the following steps:
S121:Obtain the second test script.
Wherein, the second test script is the test script being being currently used, that is, to carry out current test event, Obtained by tester from test platform and input the test script in current test system.Duplication, input in test script During, it may occur that the modification of test script.
S122:Second test script is verified using MD5 calibration tools, judges that second test script is It is no consistent with the first test script.
Specifically, md5sum check codes are generated to the first test script using MD5 calibration tools first, this is with reference to verification Code, after the second test script is got by the first test script, using order " title of the second test scripts of MD5+ ", is obtained The md5sum check codes of the second test script are got, by the md5sum check codes of the second script with being contrasted with reference to check code. If both are identical, judge that the second test script is consistent with the first test script, presently used second test script is The test script of safety;Otherwise judge that the second test script and the first test script are inconsistent, presently used second test Script is modified, it is necessary to reacquire test script.
The test script called is verified by MD5 calibration tools in the present embodiment, being capable of effective exact p-value Whether script is tampered with, so as to improve the security of test data.
S123:When the second test script is consistent with the first test script, using can not decompiling program language interface Call the second test script, obtain can not decompiling executable program.
By taking C language as an example, can by system () interface of C language call test script, two after C language is compiled An interface of the system executable file as test.Subsequently can be according to the test acquired in the second test script called Data are screened, in the test data write into Databasce for only choosing user's concern.
S124:Current test object is tested by executable program, obtains test data.
Namely tested using the test script after current compiling, after test run, get test data.
From above step S121-S124, second method by can not the program language interface of decompiling call and survey The method of training sheet, it is not necessary to all test scripts are recompilated, but in order to ensure the security of test data, profit The test script called is verified with MD5 calibration tools, therefore, this method can equally greatly improve test data Safety and reliability, and this method also help save the testing time, improve work efficiency.
With continued reference to Fig. 1, after getting test data, by test data write into Databasce, that is, step S3 is performed:According to The item types of test, by calling in the executable program to the data writing commands of database, test data is passed through Can not the program language of decompiling automatically write in database.
Due to including the data writing commands to database in executable program, that is, by database in this implementation The write-in of data writing commands can not be in the executable program of decompiling, therefore, when by test data write into Databasce, it is necessary to Call in executable program to the data writing commands of database, data write-in could be carried out, otherwise can not be write.Database Username and password only has administrator to know.This method be able to ensure that must by can not decompiling executable program perform Test, therefore, acquired test data are the test data of true unmodified mistake, are conducive to improve the reliable of test data Property and security.
The write-in of test data is carried out in this implementation according to the item types of test, that is, is stored classifiedly in the database Test data, is conducive to user and carries out lookup easily and fast and calling to test data.
After in test data write into Databasce, S5 is entered step:Test data and tester in comparison database Test data in the test report edited, checks the uniformity of test data.
After test report refers to test in the embodiment of the present application, tester according to the project currently tested and The test data of the test event arranges a kind of comprehensive report formed.Test report is usually doc document forms, by tester Member is according in different test event type manual editings and typing computer.
During the application is implemented, in the test report edited by the test data in comparison database and tester Test data, checks the uniformity of test data, can further improve the accuracy and reliability of test data.
Embodiment two
Referring to Fig. 2 on the basis of the embodiment one shown in Fig. 1, Fig. 2 be provided by the embodiment of the present application it is another The flow diagram of the method for test data security is improved under kind linux system.As shown in Figure 2, in the embodiment of the present application After method is except step S1, S3 and S5 in embodiment illustrated in fig. 1, following steps are further included:
Before step S3, test data is stored classifiedly to be better achieved in database, the embodiment of the present application adds The step of creating tables of data, i.e. step S2:Tables of data is created according to test event type, different test events is corresponded to respectively Different tables of data in database.Wherein, tables of data is used for storage standards data and test data.
Important component, that is, tables of data in database, standard is created when tables of data is created in the embodiment of the present application Data, and test data is in the tables of data after the completion of testing by order write into Databasce, therefore, in the embodiment of the present application Tables of data is mainly used for storing test data.The normal data mentioned in the present embodiment is testing standard, is surveyed in system testing The references object that examination data are compared, by the way that the normal data of test data and preset in advance is contrasted, to judge to be tested Whether system and hardware are qualified.
Since the structure of different pieces of information table in database is different, for different test events, by creating tables of data, make Different tables of data, effectively can classify test event in different test event difference correspondence databases.Such as: The test data of cpu performance test event is stored in CPU_PERF tables, and by the test data of hard disk performance test event It is stored in HDD_PERF tables.
After creating tables of data, implementation methods of the step S3 in C language is:According to current test event type, will survey Examination data are inserted into the tables of data corresponding to current test event by the mysql.h built-in functions of C language.
Further, the structure of tables of data includes table name, field name and field type in the embodiment of the present application.Namely Say, tables of data is defined storage content by table name, field name and field type.Below with the performance test of CPU Exemplified by speccpu, the design method of tables of data in the embodiment of the present application is described in detail:
Table name can be named as:Perf_cpu, wherein perf are the characteristic major class of table, and cpu is the characteristic group of table.Because Data to be used are needed mainly to include in the performance test of CPU:Measured data, normal data and " measured data/criterion numeral According to " ratio, so field name is designed as:Model (CPU titles), Int_Act (integral point measured data), Int_Spec (integral points Normal data), Int_Pct (integral point " actual measurement/standard " ratio), Fp_Act (floating-point measured data), Fp_Spec (floating-point standards Data), Fp_Pct (floating-point " actual measurement/standard " ratio).Field type designs:Model is usually no more than 10 characters, is set as Varchar (10), and it is arranged to primarykey;Other measured datas and normal data are integer, are set as int (10); The ratio of " measured data/normal data " should be floating type, be set as float.
Understand that after step S3, the embodiment of the present application further includes step S4 with continued reference to Fig. 2:By checking database, really Recognize in the whether whole write into Databasce of test data.
Further, the authority for being only limitted to check can also be set to checking the user of database.I.e.:For tester Member, only assigns selection authority, and cannot change the content of database.This method can further avoid user from will changing survey Data are tried, so as to improve the safety and reliability of test data.
Specifically, a test user can be created, select authorities is only provided to test user, data is checked for it Use, the data checked include:The data of some test-types, test data not up to standard etc..
The part that the embodiment is not described in detail can refer to the embodiment one shown in Fig. 1, between the two can mutual reference, No longer elaborate herein.
Referring to Fig. 3, test data security is improved under a kind of linux system that Fig. 3 is provided by the embodiment of the present application The structure diagram of system.From the figure 3, it may be seen that the system in the embodiment of the present application mainly includes test data acquisition module, test Three parts of Data write. module and inspection module.Wherein, test data acquisition module be used for by can not decompiling can Executive program obtains test data, wherein, the data writing commands to database are included in executable program;Test data writes Module is used for the item types according to test, will by calling to the data writing commands of database in the executable program Test data is automatically write in database;Check what module was edited for the test data in comparison database and tester Test data in test report, checks the uniformity of test data.
Further, the test data acquisition module of the embodiment of the present application includes executable program acquiring unit and test number According to acquiring unit.Test data acquiring unit is used to test current test object by the executable program, obtains Take test data.
Wherein, executable program acquiring unit has two types:The first executable program acquiring unit is used for increasing income Property the first test script all recompilate, obtain can not decompiling executable program.Wherein, the first test script is text The test script for the official release issued on part transport protocol platform, that is, the test script issued on FPT platforms, FTP are put down Platform is typically a ftp server, on the server storage have various instruments and a data, administrator's account can with uplink data, Regular account may only download data, it is not possible to change data.
Second of executable program acquiring unit is used for when the second test script is consistent with first test script, uses Can not decompiling program language interface call the second test script, obtain can not decompiling executable program.Wherein, second Test script is the test script being being currently used.
For test data is classified in write into Databasce, the system in the embodiment of the present application further includes tables of data establishment Module, for creating tables of data according to test event type, makes different test events distinguish number different in correspondence database According to table.Wherein, tables of data is used for storage standards data and test data.
Further, the system in the embodiment of the present application further includes database and checks module, for checking database, confirms In the whether whole write into Databasce of test data.Database, which is checked, can also set priority assignation unit in module, for looking into See the user of database, the authority for being only limitted to check is set, so as to avoid user from changing the content of database, be conducive to improve The security of test data.
The method and principle of test data security are improved in the embodiment of the present application, in the embodiment shown in Fig. 1 and Fig. 2 It has been elaborated that, details are not described herein.
The above is only the embodiment of the application, is made skilled artisans appreciate that or realizing this Shen Please.A variety of modifications to these embodiments will be apparent to one skilled in the art, as defined herein General Principle can be realized in other embodiments in the case where not departing from spirit herein or scope.Therefore, the application The embodiments shown herein is not intended to be limited to, and is to fit to and the principles and novel features disclosed herein phase one The most wide scope caused.

Claims (10)

1. the method for test data security is improved under a kind of linux system, it is characterised in that the described method includes:
By can not the executable program of decompiling obtain test data, the data to database are included in the executable program Writing commands;
According to the item types of test, by calling in the executable program to the data writing commands of database, will test Data are automatically write in database;
Test data in the test report that test data and tester in comparison database are edited, checks test data Uniformity.
2. the method for test data security is improved under a kind of linux system according to claim 1, it is characterised in that It is described by can not decompiling executable program obtain test data method, include the following steps:
First test script of increasing income property is all recompilated, obtain can not decompiling executable program, described first surveys Training sheet is the test script for the official release issued on File Transfer Protocol platform;
Current test object is tested by the executable program, obtains test data.
3. the method for test data security is improved under a kind of linux system according to claim 1, it is characterised in that It is described by can not decompiling executable program obtain test data method, include the following steps:
The second test script is obtained, second test script is the test script being being currently used;
Second test script is verified using MD5 calibration tools, judges second test script whether with first Test script is consistent;
When second test script is consistent with first test script, using can not decompiling program language interface tune With second test script, obtain can not decompiling executable program;
Current test object is tested by the executable program, obtains test data.
4. the method for test data security is improved under a kind of linux system according to claim 1, it is characterised in that According to the item types of test, by calling to the data writing commands of database in the executable program, by test data Before automatically writing in database, the method further includes:
Tables of data is created according to test event type, different test events is distinguished tables of data different in correspondence database, The tables of data is used for storage standards data and test data.
5. the method for test data security is improved under a kind of linux system according to claim 4, it is characterised in that The structure of the tables of data includes table name, field name and field type.
6. the method for test data security is improved under a kind of linux system according to any one in claim 1-5, It is characterized in that, according to the item types of test, by test data by it is described can not the program language of decompiling automatically write After in database, the method further includes:
By checking database, in the whether whole write into Databasce of exact p-value data.
7. the method for test data security is improved under a kind of linux system according to claim 5, it is characterised in that User to checking database, sets the authority for being only limitted to check.
8. the system of test data security is improved under a kind of linux system, it is characterised in that the system comprises:
Test data acquisition module, for by can not decompiling executable program obtain test data, the executable journey The data writing commands to database are included in sequence;
Test data writing module, for the item types according to test, by calling in the executable program to database Data writing commands, test data is automatically write in database;
Check module, the test number in the test report edited for the test data in comparison database and tester According to checking the uniformity of test data.
9. the system of test data security is improved under a kind of linux system according to claim 8, it is characterised in that The test data acquisition module includes:
Executable program acquiring unit, is all recompilated, acquisition can not decompiling for the first test script to increasing income property Executable program, first test script is the test script for the official release issued on File Transfer Protocol platform;Or Person,
When the second test script is consistent with first test script, with can not decompiling program language interface call described in Second test script, obtain can not decompiling executable program, second test script is the test being being currently used Script;
Test data acquiring unit, for being tested by the executable program current test object, obtains test Data.
10. improving the system of test data security under a kind of linux system according to claim 8 or claim 9, its feature exists In, the system also includes:Tables of data creation module, for creating tables of data according to test event type, makes different tests Different tables of data, the tables of data are used for storage standards data and test data in project difference correspondence database.
CN201711376526.XA 2017-12-19 2017-12-19 Method and system for improving test data security in Linux system Active CN107957954B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711376526.XA CN107957954B (en) 2017-12-19 2017-12-19 Method and system for improving test data security in Linux system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711376526.XA CN107957954B (en) 2017-12-19 2017-12-19 Method and system for improving test data security in Linux system

Publications (2)

Publication Number Publication Date
CN107957954A true CN107957954A (en) 2018-04-24
CN107957954B CN107957954B (en) 2021-06-29

Family

ID=61959238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711376526.XA Active CN107957954B (en) 2017-12-19 2017-12-19 Method and system for improving test data security in Linux system

Country Status (1)

Country Link
CN (1) CN107957954B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108804316A (en) * 2018-05-24 2018-11-13 郑州云海信息技术有限公司 A kind of method of inspection and system of test script program standardization
CN113282427A (en) * 2021-04-30 2021-08-20 深圳市智微智能科技股份有限公司 Method, device and equipment for feeding back production and measurement system data and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080139191A1 (en) * 2006-12-08 2008-06-12 Miguel Melnyk Content adaptation
US20100162217A1 (en) * 2008-12-22 2010-06-24 Microsoft Corporation Debugging System Using Static Analysis
CN103309795A (en) * 2012-03-08 2013-09-18 百度在线网络技术(北京)有限公司 Software testing method and system
CN103544106A (en) * 2013-10-31 2014-01-29 广东欧珀移动通信有限公司 Method and device for generating script based on control
CN104239757A (en) * 2014-09-30 2014-12-24 北京奇虎科技有限公司 Application program reversing-preventing method and device and operation method and terminal
CN105095090A (en) * 2015-09-16 2015-11-25 北京奇虎科技有限公司 Method and device for testing application installation package
CN105204980A (en) * 2014-05-26 2015-12-30 腾讯科技(深圳)有限公司 Method for testing virtual engine software and testing equipment
CN105959177A (en) * 2016-04-26 2016-09-21 网易(杭州)网络有限公司 Game server stress test script generation method and device
CN106295327A (en) * 2015-05-14 2017-01-04 腾讯科技(深圳)有限公司 The reinforcement means of executable file and device
CN107169317A (en) * 2017-03-31 2017-09-15 武汉斗鱼网络科技有限公司 A kind of method and device that LUA scripts are encrypted
CN107292134A (en) * 2017-05-27 2017-10-24 北京思特奇信息技术股份有限公司 It is a kind of to prevent Android from applying by the application reinforcement means and system of decompiling
US20170344463A1 (en) * 2016-05-27 2017-11-30 International Business Machines Corporation System and method for bypassing evasion tests with applications in analysis and monitoring of mobile applications

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080139191A1 (en) * 2006-12-08 2008-06-12 Miguel Melnyk Content adaptation
US20100162217A1 (en) * 2008-12-22 2010-06-24 Microsoft Corporation Debugging System Using Static Analysis
CN103309795A (en) * 2012-03-08 2013-09-18 百度在线网络技术(北京)有限公司 Software testing method and system
CN103544106A (en) * 2013-10-31 2014-01-29 广东欧珀移动通信有限公司 Method and device for generating script based on control
CN105204980A (en) * 2014-05-26 2015-12-30 腾讯科技(深圳)有限公司 Method for testing virtual engine software and testing equipment
CN104239757A (en) * 2014-09-30 2014-12-24 北京奇虎科技有限公司 Application program reversing-preventing method and device and operation method and terminal
CN106295327A (en) * 2015-05-14 2017-01-04 腾讯科技(深圳)有限公司 The reinforcement means of executable file and device
CN105095090A (en) * 2015-09-16 2015-11-25 北京奇虎科技有限公司 Method and device for testing application installation package
CN105959177A (en) * 2016-04-26 2016-09-21 网易(杭州)网络有限公司 Game server stress test script generation method and device
US20170344463A1 (en) * 2016-05-27 2017-11-30 International Business Machines Corporation System and method for bypassing evasion tests with applications in analysis and monitoring of mobile applications
CN107169317A (en) * 2017-03-31 2017-09-15 武汉斗鱼网络科技有限公司 A kind of method and device that LUA scripts are encrypted
CN107292134A (en) * 2017-05-27 2017-10-24 北京思特奇信息技术股份有限公司 It is a kind of to prevent Android from applying by the application reinforcement means and system of decompiling

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张达运 等: "基于Lua的Linux内核测试工具开发", 《计算机工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108804316A (en) * 2018-05-24 2018-11-13 郑州云海信息技术有限公司 A kind of method of inspection and system of test script program standardization
CN113282427A (en) * 2021-04-30 2021-08-20 深圳市智微智能科技股份有限公司 Method, device and equipment for feeding back production and measurement system data and storage medium

Also Published As

Publication number Publication date
CN107957954B (en) 2021-06-29

Similar Documents

Publication Publication Date Title
Wei et al. Taming android fragmentation: Characterizing and detecting compatibility issues for android apps
Ray et al. On the" naturalness" of buggy code
Novak et al. Taxonomy of static code analysis tools
US8627296B1 (en) Unified unit and integration test with automatic mock creation
AU2010350247B2 (en) Code inspection executing system for performing a code inspection of ABAP source codes
Hammoudi et al. Why do record/replay tests of web applications break?
US8397104B2 (en) Creation of test plans
US9990458B2 (en) Generic design rule checking (DRC) test case extraction
US20150094997A1 (en) Explaining partially illegal combinations in combinatorial models
Dallmeier et al. WebMate: Generating test cases for web 2.0
Coppola et al. Scripted gui testing of android apps: A study on diffusion, evolution and fragility
Kowalczyk et al. Configurations in Android testing: they matter
Kong et al. Mining android crash fixes in the absence of issue-and change-tracking systems
Ma et al. Paladin: Automated generation of reproducible test cases for android apps
Keng et al. Graph-aided directed testing of android applications for checking runtime privacy behaviours
Luna et al. Edroid: A mutation tool for android apps
CN107957954A (en) The method and system of test data security is improved under a kind of linux system
US5754861A (en) Dynamic program input/output determination
Ardito et al. Towards automated translation between generations of gui-based tests for mobile devices
CN113268470A (en) Efficient database rollback scheme verification method
Yu et al. An automated framework to support testing for process‐level race conditions
Arcuschin et al. On the feasibility and challenges of synthesizing executable Espresso tests
US10803219B1 (en) Method and system for combined formal static analysis of a design code
Rajaram et al. Benefits of defect taxonomies and validation of a new defect classification for health software
Ahmed et al. MuHyb: A proposed mutation testing tool for hybrid mobile applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant