To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith...To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.展开更多
Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them. This paper generates test cases for configuration testing with several common m...Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them. This paper generates test cases for configuration testing with several common methods, such as multiple single-factor experiments, uniform design, and orthogonal experiment design used in other fields. This paper analyzes their merits and improves the orthogonal experiment design method with pairwise testing, and decreases the testing risk caused by incomplete testing with a method of multiple-factors-covering. It presents a simple factor cover method which can cover all the factors and pairwise combinations to the greatest degree. Some comparisons of these methods are made on the aspects of test suite scale, coverage, and usability, etc..展开更多
针对馈线自动化的功能测试问题,为避免配电终端接入实际配电网进行测试实验可能对电力系统的安全运行造成不利影响,同时为了提高测试的灵活性、效率性和正确性,文中提出了一种虚实结合的馈线自动化测试方法,利用RTLAB(Real Time Laborat...针对馈线自动化的功能测试问题,为避免配电终端接入实际配电网进行测试实验可能对电力系统的安全运行造成不利影响,同时为了提高测试的灵活性、效率性和正确性,文中提出了一种虚实结合的馈线自动化测试方法,利用RTLAB(Real Time Laboratory)实时全数字仿真器搭建配电网并模拟故障运行,设计具备保护、重合闸、就地式FA(Feeder Automation)功能的仿真型虚拟配电终端用于开展RTLAB实时仿真器与物理模型硬件在环仿真研究。文中设计的基于高性能线性功率放大器的接口实施方案被测配电终端接入测试系统形成闭环,构建了虚实结合的馈线自动化仿真测试环境。通过开展基本故障处理能力测试和容错能力测试的硬件在环仿真实验,验证了接口装置的准确性,同时验证了测试平台的有效性。展开更多
文摘To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.
文摘Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them. This paper generates test cases for configuration testing with several common methods, such as multiple single-factor experiments, uniform design, and orthogonal experiment design used in other fields. This paper analyzes their merits and improves the orthogonal experiment design method with pairwise testing, and decreases the testing risk caused by incomplete testing with a method of multiple-factors-covering. It presents a simple factor cover method which can cover all the factors and pairwise combinations to the greatest degree. Some comparisons of these methods are made on the aspects of test suite scale, coverage, and usability, etc..
文摘针对馈线自动化的功能测试问题,为避免配电终端接入实际配电网进行测试实验可能对电力系统的安全运行造成不利影响,同时为了提高测试的灵活性、效率性和正确性,文中提出了一种虚实结合的馈线自动化测试方法,利用RTLAB(Real Time Laboratory)实时全数字仿真器搭建配电网并模拟故障运行,设计具备保护、重合闸、就地式FA(Feeder Automation)功能的仿真型虚拟配电终端用于开展RTLAB实时仿真器与物理模型硬件在环仿真研究。文中设计的基于高性能线性功率放大器的接口实施方案被测配电终端接入测试系统形成闭环,构建了虚实结合的馈线自动化仿真测试环境。通过开展基本故障处理能力测试和容错能力测试的硬件在环仿真实验,验证了接口装置的准确性,同时验证了测试平台的有效性。