SlideShare a Scribd company logo
Verification and Validation Assuring that a software system meets a user's needs
Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V & V To explain static analysis as a verification technique To describe the Cleanroom software development process
Topics covered Verification and validation planning Software inspections Automated static analysis Cleanroom software development
Verification:  "Are we building the product right" The software should conform to its specification Validation:  "Are we building the right product" The software should do what the user really requires Verification vs validation
Is a whole life-cycle process - V & V must be  applied at each stage in the software process. Has two principal objectives The discovery of defects in a system The assessment of whether or not the system is usable in  an operational situation. The V & V process
Software inspections   Concerned with analysis of  the static system representation to discover problems   ( static verification) May be supplement by tool-based document and code analysis Software testing   Concerned with exercising and  observing product behaviour (dynamic verification) The system is executed with test data and its operational behaviour is observed Static and dynamic verification
Static and dynamic V&V
Can reveal the presence of errors NOT their  absence A successful test is a test which discovers one  or more errors The only validation technique for non-functional  requirements Should be used in conjunction with static  verification to provide full V&V coverage Program testing
Defect testing Tests designed to discover system defects. A successful defect test is one which reveals the presence  of defects in a system. Covered in Chapter 20  Statistical testing tests designed to reflect the frequence of user inputs. Used  for reliability estimation. Covered in Chapter 21  Types of testing
V& V goals Verification and validation should establish confidence that the software is fit for purpose This does NOT mean completely free of defects Rather, it must be good enough for its intended use and the type of use will determine the degree of confidence that is needed
V & V confidence Depends on system’s purpose, user expectations and marketing environment Software function The level of confidence depends on how critical the software is to an organisation User expectations Users may have low expectations of certain kinds of software Marketing environment Getting a product to market early may be more important than finding defects in the program
Defect testing and debugging are distinct  processes Verification and validation is concerned with establishing the existence of defects in a program Debugging is concerned with locating and  repairing these errors Debugging involves formulating a hypothesis  about program behaviour then testing these  hypotheses to find the system error Testing and debugging
The debugging process
Careful planning is required to get the most out of testing and inspection processes Planning should start early in the development process The plan should identify the balance between static verification and testing Test planning is about defining standards for the testing process rather than describing product tests V & V planning
The V-model of development
The structure of a software test plan The testing process Requirements traceability Tested items Testing schedule Test recording procedures Hardware and software requirements Constraints
Software inspections Involve people examining the source representation with the aim of discovering anomalies and defects Do not require execution of a system so may be used before implementation May be applied to any representation of the system (requirements, design, test data, etc.) Very effective technique for discovering errors
Inspection success Many diffreent defects may be discovered in a single inspection. In testing, one defect ,may mask another so several executions are required The reuse domain and programming knowledge so reviewers are likely to have seen the types of error that commonly arise
Inspections and testing Inspections and testing are complementary and not opposing verification techniques Both should be used during the V & V process Inspections can check conformance with a specification but not conformance with the customer’s real requirements Inspections cannot check non-functional characteristics such as performance, usability, etc.
Program inspections Formalised approach to document reviews Intended explicitly for defect DETECTION (not  correction) Defects may be logical errors, anomalies in the code that might indicate an erroneous condition (e.g. an uninitialised variable) or non-compliance with standards
Inspection pre-conditions A precise specification must be available Team members must be familiar with the  organisation standards Syntactically correct code must be available An error checklist should be prepared Management must accept that inspection will  increase costs early in the software process Management must not use inspections for staff  appraisal
The inspection process
Inspection procedure System overview presented to inspection team Code and associated documents are  distributed to inspection team in advance Inspection takes place and discovered errors  are noted Modifications are made to repair discovered  errors Re-inspection may or may not be required
Inspection teams Made up of at least 4 members Author of the code being inspected Inspector who  finds errors, omissions and inconsistencies  Reader who reads the code to the team Moderator who chairs the meeting and notes  discovered errors Other roles are Scribe and  Chief moderator
Inspection checklists Checklist of common errors should be used to  drive the inspection Error checklist is programming language  dependent The 'weaker' the type checking, the larger the  checklist Examples: Initialisation, Constant naming, loop  termination, array bounds, etc.
Inspection checks
Inspection rate 500 statements/hour during overview 125 source statement/hour during individual  preparation 90-125 statements/hour can be inspected Inspection is therefore an expensive process Inspecting 500 lines costs about 40 man/hours  effort = £2800
Automated static analysis Static analysers are software tools for source text processing They parse the program text and try to discover potentially erroneous conditions and bring these to the attention of the V & V team Very effective as an aid to inspections. A  supplement to but not a replacement for  inspections
Static analysis checks
Stages of static analysis Control flow analysis.   Checks for loops with  multiple exit or entry points, finds unreachable  code, etc. Data use analysis.   Detects uninitialised  variables, variables written twice without an  intervening assignment, variables which are  declared but never used, etc. Interface analysis.   Checks the consistency of  routine and procedure declarations and their  use
Stages of static analysis Information flow analysis.   Identifies the  dependencies of output variables. Does not  detect anomalies itself but highlights  information for code inspection or review Path analysis.   Identifies paths through the program and sets out the statements executed in that path. Again, potentially useful in the review process Both these stages generate vast amounts of information. Must be used with care.
LINT static analysis 138% more lint_ex.c #include <stdio.h> printarray (Anarray) int Anarray; { printf(“%d”,Anarray); } main () { int Anarray[5]; int i; char c; printarray (Anarray, i, c); printarray (Anarray) ; } 139% cc lint_ex.c 140% lint lint_ex.c lint_ex.c(10): warning: c may be used before set lint_ex.c(10): warning: i may be used before set printarray: variable # of args. lint_ex.c(4) :: lint_ex.c(10) printarray, arg. 1 used inconsistently lint_ex.c(4) :: lint_ex.c(10) printarray, arg. 1 used inconsistently lint_ex.c(4) :: lint_ex.c(11) printf returns value which is always ignored
Use of static analysis Particularly valuable when a language such as C is used which has weak typing and hence many errors are undetected by the compiler Less cost-effective for languages like Java that have strong type checking and can therefore detect many errors during compilation
The name is derived from the 'Cleanroom'  process in semiconductor fabrication. The  philosophy is defect avoidance rather than  defect removal Software development process based on: Incremental development Formal specification. Static verification using correctness arguments Statistical testing to determine program reliability. Cleanroom software development
The Cleanroom process
Cleanroom process characteristics Formal specification using a state transition model Incremental development Structured programming - limited control and abstraction constructs are used Static verification using rigorous inspections Statistical testing of the system (covered in Ch. 21).
Incremental development
Formal specification and inspections The state based model is a system specification and the inspection process checks the program against this model Programming approach is defined so that the correspondence between the model and the system is clear Mathematical arguments (not proofs) are used to increase confidence in the inspection process
Specification team.   Responsible for developing  and maintaining the system specification Development team.   Responsible for  developing and verifying the software.  The  software is NOT executed or even compiled  during this process Certification team.   Responsible for developing  a set of statistical tests to exercise the software  after development. Reliability growth models  used to determine when reliability is acceptable Cleanroom process teams
Results in IBM have been very impressive with  few discovered faults in delivered systems Independent assessment shows that the  process is no more expensive than other  approaches Fewer errors than in a 'traditional' development  process Not clear how this approach can be transferred  to an environment with less skilled or less  highly motivated engineers Cleanroom process evaluation
Key points Verification and validation are not the same thing. Verification shows conformance with specification; validation shows that the program meets the customer’s needs Test plans should be drawn up to guide the testing process. Static verification techniques involve examination and analysis of the program for error detection
Key points Program inspections are very effective in discovering errors Program code in inspections is checked by a small team to locate software faults Static analysis tools can discover program anomalies which may be an indication of faults in the code The Cleanroom development process depends on incremental development, static verification and statistical testing

More Related Content

PDF
Software testing methods, levels and types
PPTX
verification and validation
PPTX
Object oriented testing
PPTX
White Box Testing And Control Flow & Loop Testing
PDF
Types of software testing
PPTX
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
PPTX
Black box software testing
PPT
Software Quality Metrics
Software testing methods, levels and types
verification and validation
Object oriented testing
White Box Testing And Control Flow & Loop Testing
Types of software testing
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Black box software testing
Software Quality Metrics

What's hot (20)

PPTX
Software Configuration Management (SCM)
PPTX
Software metrics
PPT
Testing fundamentals
PPTX
Software testing
PPTX
software maintenance
PPT
Basic software-testing-concepts
PDF
Test cases
PPT
Software Verification & Validation
PPT
Software Quality Challenge
PPTX
Software Reliability
PPT
Chapter 13 software testing strategies
PPTX
Test design techniques
PPT
Basic Guide to Manual Testing
PPT
System testing ppt
PPTX
Software testing and process
PPT
Software metrics
PPT
Black box and white box testing
PPTX
System testing
PPT
Software architecture design ppt
PPTX
Requirement Analysis
Software Configuration Management (SCM)
Software metrics
Testing fundamentals
Software testing
software maintenance
Basic software-testing-concepts
Test cases
Software Verification & Validation
Software Quality Challenge
Software Reliability
Chapter 13 software testing strategies
Test design techniques
Basic Guide to Manual Testing
System testing ppt
Software testing and process
Software metrics
Black box and white box testing
System testing
Software architecture design ppt
Requirement Analysis
Ad

Viewers also liked (8)

PDF
Software Testing
PDF
Poole.eric
PPT
Verifcation and Validation
PPTX
Software Verification and Validation
PPT
Complex System Engineering
PPTX
Lou wheatcraft vv
PDF
9-Software Verification and Validation (Object Oriented Software Engineering ...
PPT
Software Testing
Software Testing
Poole.eric
Verifcation and Validation
Software Verification and Validation
Complex System Engineering
Lou wheatcraft vv
9-Software Verification and Validation (Object Oriented Software Engineering ...
Software Testing
Ad

Similar to Verification and Validation in Software Engineering SE19 (20)

PPT
Ch22
PPT
SECh1920
PDF
ISTQB-Foundation-Flashcards For Learning.pdf
PPTX
Quality Analyst Training - Gain America
PPT
Software_Verification_and_Validation.ppt
PPTX
softwaretestingpowerpointpresentation.pptx
PPTX
Software testing & Quality Assurance
PPT
Sech1920 1200112979886874-3
PPTX
Sta unit 2(abimanyu)
PDF
softwaretestingppt-120810095500-phpapp02 (1).pdf
PPS
Mca se chapter_07_software_validation
PPTX
https://www.slideshare.net/slideshow/system-testing-60970402/60970402Software...
PDF
Software testing kn husainy
PPTX
Software testing
PPTX
Software verification &amp; validation
PPTX
softwaretestingppt-FINAL-PPT-1
PPT
Testing strategies in Software Engineering
DOC
software testing strategies
PDF
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
PPT
SOFTWARE TESTING
Ch22
SECh1920
ISTQB-Foundation-Flashcards For Learning.pdf
Quality Analyst Training - Gain America
Software_Verification_and_Validation.ppt
softwaretestingpowerpointpresentation.pptx
Software testing & Quality Assurance
Sech1920 1200112979886874-3
Sta unit 2(abimanyu)
softwaretestingppt-120810095500-phpapp02 (1).pdf
Mca se chapter_07_software_validation
https://www.slideshare.net/slideshow/system-testing-60970402/60970402Software...
Software testing kn husainy
Software testing
Software verification &amp; validation
softwaretestingppt-FINAL-PPT-1
Testing strategies in Software Engineering
software testing strategies
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
SOFTWARE TESTING

More from koolkampus (20)

PPT
Local Area Networks in Data Communication DC24
PPT
Bit Oriented Protocols in Data Communication DC23
PPT
Data Link Control in Data Communication DC20
PPT
Error Detection and Correction in Data Communication DC18
PPT
TDM in Data Communication DC16
PPT
Radio Communication Band(Data Communication) DC14
PPT
Connectors in Data Communication DC12
PPT
Transmission of Digital Data(Data Communication) DC11
PPT
Analog to Digital Encoding in Data Communication DC9
PPT
Signal with DC Component(Data Communication) DC7
PPT
Layer Examples in Data Communication CD4
PPT
OSI Model (Data Communication) DC3
PPT
Basic Concepts in Data Communication DC1
PPT
Token Passing in Data Communication DC25
PPT
Data Link Protocols in Data Communication DC22
PPT
Flow Control in Data Communication DC21
PPT
CRC in Data Communication DC19
PPT
Telephone Networn in Data Communication DC17
PPT
Multiplexing in Data Communication DC15
PPT
Transmission Media in Data Communication DC13
Local Area Networks in Data Communication DC24
Bit Oriented Protocols in Data Communication DC23
Data Link Control in Data Communication DC20
Error Detection and Correction in Data Communication DC18
TDM in Data Communication DC16
Radio Communication Band(Data Communication) DC14
Connectors in Data Communication DC12
Transmission of Digital Data(Data Communication) DC11
Analog to Digital Encoding in Data Communication DC9
Signal with DC Component(Data Communication) DC7
Layer Examples in Data Communication CD4
OSI Model (Data Communication) DC3
Basic Concepts in Data Communication DC1
Token Passing in Data Communication DC25
Data Link Protocols in Data Communication DC22
Flow Control in Data Communication DC21
CRC in Data Communication DC19
Telephone Networn in Data Communication DC17
Multiplexing in Data Communication DC15
Transmission Media in Data Communication DC13

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
PDF
Chapter 2 Digital Image Fundamentals.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
PDF
SparkLabs Primer on Artificial Intelligence 2025
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Top Generative AI Tools for Patent Drafting in 2025.pdf
PDF
Smarter Business Operations Powered by IoT Remote Monitoring
PDF
Test Bank, Solutions for Java How to Program, An Objects-Natural Approach, 12...
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PPTX
CroxyProxy Instagram Access id login.pptx
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
NewMind AI Monthly Chronicles - July 2025
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
A Day in the Life of Location Data - Turning Where into How.pdf
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Chapter 2 Digital Image Fundamentals.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SparkLabs Primer on Artificial Intelligence 2025
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
GamePlan Trading System Review: Professional Trader's Honest Take
Top Generative AI Tools for Patent Drafting in 2025.pdf
Smarter Business Operations Powered by IoT Remote Monitoring
Test Bank, Solutions for Java How to Program, An Objects-Natural Approach, 12...
Revolutionize Operations with Intelligent IoT Monitoring and Control
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
CroxyProxy Instagram Access id login.pptx
madgavkar20181017ppt McKinsey Presentation.pdf

Verification and Validation in Software Engineering SE19

  • 1. Verification and Validation Assuring that a software system meets a user's needs
  • 2. Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V & V To explain static analysis as a verification technique To describe the Cleanroom software development process
  • 3. Topics covered Verification and validation planning Software inspections Automated static analysis Cleanroom software development
  • 4. Verification: &quot;Are we building the product right&quot; The software should conform to its specification Validation: &quot;Are we building the right product&quot; The software should do what the user really requires Verification vs validation
  • 5. Is a whole life-cycle process - V & V must be applied at each stage in the software process. Has two principal objectives The discovery of defects in a system The assessment of whether or not the system is usable in an operational situation. The V & V process
  • 6. Software inspections Concerned with analysis of the static system representation to discover problems ( static verification) May be supplement by tool-based document and code analysis Software testing Concerned with exercising and observing product behaviour (dynamic verification) The system is executed with test data and its operational behaviour is observed Static and dynamic verification
  • 8. Can reveal the presence of errors NOT their absence A successful test is a test which discovers one or more errors The only validation technique for non-functional requirements Should be used in conjunction with static verification to provide full V&V coverage Program testing
  • 9. Defect testing Tests designed to discover system defects. A successful defect test is one which reveals the presence of defects in a system. Covered in Chapter 20 Statistical testing tests designed to reflect the frequence of user inputs. Used for reliability estimation. Covered in Chapter 21 Types of testing
  • 10. V& V goals Verification and validation should establish confidence that the software is fit for purpose This does NOT mean completely free of defects Rather, it must be good enough for its intended use and the type of use will determine the degree of confidence that is needed
  • 11. V & V confidence Depends on system’s purpose, user expectations and marketing environment Software function The level of confidence depends on how critical the software is to an organisation User expectations Users may have low expectations of certain kinds of software Marketing environment Getting a product to market early may be more important than finding defects in the program
  • 12. Defect testing and debugging are distinct processes Verification and validation is concerned with establishing the existence of defects in a program Debugging is concerned with locating and repairing these errors Debugging involves formulating a hypothesis about program behaviour then testing these hypotheses to find the system error Testing and debugging
  • 14. Careful planning is required to get the most out of testing and inspection processes Planning should start early in the development process The plan should identify the balance between static verification and testing Test planning is about defining standards for the testing process rather than describing product tests V & V planning
  • 15. The V-model of development
  • 16. The structure of a software test plan The testing process Requirements traceability Tested items Testing schedule Test recording procedures Hardware and software requirements Constraints
  • 17. Software inspections Involve people examining the source representation with the aim of discovering anomalies and defects Do not require execution of a system so may be used before implementation May be applied to any representation of the system (requirements, design, test data, etc.) Very effective technique for discovering errors
  • 18. Inspection success Many diffreent defects may be discovered in a single inspection. In testing, one defect ,may mask another so several executions are required The reuse domain and programming knowledge so reviewers are likely to have seen the types of error that commonly arise
  • 19. Inspections and testing Inspections and testing are complementary and not opposing verification techniques Both should be used during the V & V process Inspections can check conformance with a specification but not conformance with the customer’s real requirements Inspections cannot check non-functional characteristics such as performance, usability, etc.
  • 20. Program inspections Formalised approach to document reviews Intended explicitly for defect DETECTION (not correction) Defects may be logical errors, anomalies in the code that might indicate an erroneous condition (e.g. an uninitialised variable) or non-compliance with standards
  • 21. Inspection pre-conditions A precise specification must be available Team members must be familiar with the organisation standards Syntactically correct code must be available An error checklist should be prepared Management must accept that inspection will increase costs early in the software process Management must not use inspections for staff appraisal
  • 23. Inspection procedure System overview presented to inspection team Code and associated documents are distributed to inspection team in advance Inspection takes place and discovered errors are noted Modifications are made to repair discovered errors Re-inspection may or may not be required
  • 24. Inspection teams Made up of at least 4 members Author of the code being inspected Inspector who finds errors, omissions and inconsistencies Reader who reads the code to the team Moderator who chairs the meeting and notes discovered errors Other roles are Scribe and Chief moderator
  • 25. Inspection checklists Checklist of common errors should be used to drive the inspection Error checklist is programming language dependent The 'weaker' the type checking, the larger the checklist Examples: Initialisation, Constant naming, loop termination, array bounds, etc.
  • 27. Inspection rate 500 statements/hour during overview 125 source statement/hour during individual preparation 90-125 statements/hour can be inspected Inspection is therefore an expensive process Inspecting 500 lines costs about 40 man/hours effort = £2800
  • 28. Automated static analysis Static analysers are software tools for source text processing They parse the program text and try to discover potentially erroneous conditions and bring these to the attention of the V & V team Very effective as an aid to inspections. A supplement to but not a replacement for inspections
  • 30. Stages of static analysis Control flow analysis. Checks for loops with multiple exit or entry points, finds unreachable code, etc. Data use analysis. Detects uninitialised variables, variables written twice without an intervening assignment, variables which are declared but never used, etc. Interface analysis. Checks the consistency of routine and procedure declarations and their use
  • 31. Stages of static analysis Information flow analysis. Identifies the dependencies of output variables. Does not detect anomalies itself but highlights information for code inspection or review Path analysis. Identifies paths through the program and sets out the statements executed in that path. Again, potentially useful in the review process Both these stages generate vast amounts of information. Must be used with care.
  • 32. LINT static analysis 138% more lint_ex.c #include <stdio.h> printarray (Anarray) int Anarray; { printf(“%d”,Anarray); } main () { int Anarray[5]; int i; char c; printarray (Anarray, i, c); printarray (Anarray) ; } 139% cc lint_ex.c 140% lint lint_ex.c lint_ex.c(10): warning: c may be used before set lint_ex.c(10): warning: i may be used before set printarray: variable # of args. lint_ex.c(4) :: lint_ex.c(10) printarray, arg. 1 used inconsistently lint_ex.c(4) :: lint_ex.c(10) printarray, arg. 1 used inconsistently lint_ex.c(4) :: lint_ex.c(11) printf returns value which is always ignored
  • 33. Use of static analysis Particularly valuable when a language such as C is used which has weak typing and hence many errors are undetected by the compiler Less cost-effective for languages like Java that have strong type checking and can therefore detect many errors during compilation
  • 34. The name is derived from the 'Cleanroom' process in semiconductor fabrication. The philosophy is defect avoidance rather than defect removal Software development process based on: Incremental development Formal specification. Static verification using correctness arguments Statistical testing to determine program reliability. Cleanroom software development
  • 36. Cleanroom process characteristics Formal specification using a state transition model Incremental development Structured programming - limited control and abstraction constructs are used Static verification using rigorous inspections Statistical testing of the system (covered in Ch. 21).
  • 38. Formal specification and inspections The state based model is a system specification and the inspection process checks the program against this model Programming approach is defined so that the correspondence between the model and the system is clear Mathematical arguments (not proofs) are used to increase confidence in the inspection process
  • 39. Specification team. Responsible for developing and maintaining the system specification Development team. Responsible for developing and verifying the software. The software is NOT executed or even compiled during this process Certification team. Responsible for developing a set of statistical tests to exercise the software after development. Reliability growth models used to determine when reliability is acceptable Cleanroom process teams
  • 40. Results in IBM have been very impressive with few discovered faults in delivered systems Independent assessment shows that the process is no more expensive than other approaches Fewer errors than in a 'traditional' development process Not clear how this approach can be transferred to an environment with less skilled or less highly motivated engineers Cleanroom process evaluation
  • 41. Key points Verification and validation are not the same thing. Verification shows conformance with specification; validation shows that the program meets the customer’s needs Test plans should be drawn up to guide the testing process. Static verification techniques involve examination and analysis of the program for error detection
  • 42. Key points Program inspections are very effective in discovering errors Program code in inspections is checked by a small team to locate software faults Static analysis tools can discover program anomalies which may be an indication of faults in the code The Cleanroom development process depends on incremental development, static verification and statistical testing