2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2015
DOI: 10.1109/icstw.2015.7107436
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of the IPO-Family algorithms for test case generation in web security testing

Abstract: Security testing of web applications remains a major problem of software engineering. In order to reveal vulnerabilities, testing approaches use different strategies for detection of certain kinds of inputs that might lead to a security breach. Such approaches depend on the corresponding test case generation technique that are executed against the system under test. In this work we examine how two of the most popular algorithms for combinatorial test case generation, namely the IPOG and IPOG-F algorithms, perf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…-In the majority of our past security testing experiments [2], [3], [7] we have witnessed that higher strength interaction testing yields better results w.r.t. exploitation rate.…”
Section: Combinatorial Testing For Web Security Testingmentioning
confidence: 96%
See 2 more Smart Citations
“…-In the majority of our past security testing experiments [2], [3], [7] we have witnessed that higher strength interaction testing yields better results w.r.t. exploitation rate.…”
Section: Combinatorial Testing For Web Security Testingmentioning
confidence: 96%
“…Combinatorial testing has been successfully applied for testing (critical) software systems in large organizations [11]. It is an already proven method for blackbox security testing of large-scale web software systems [7], [3], [2] where t-way testing was applied successfully to XSS detection. In this section, we review these key contributions in web security testing that are based on combinatorial methods and are used as a basis for analyzing XSS vulnerabilities via fault localization methods throughout this paper.…”
Section: Combinatorial Testing For Web Security Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…The combinatorial test design process for XSS attack vector generation, has been explained in detail in [6], [10].…”
Section: Bnf Grammar For Xss Attack Vectorsmentioning
confidence: 99%
“…The metrics and evaluation method used is a typical example of the construct threats, which concern whether the metrics/evaluation method can reflect what we intend to measure. In our work, the metrics studied are widely used in this field of research [59,60] and they serves as quality indicator for different aspects of SQLi testing. To mitigate the randomness introduced by the training, we repeat 20 experiment runs for each tool under a SUT.…”
Section: Threats To Validitymentioning
confidence: 99%