2007
DOI: 10.1109/aswec.2007.31
|View full text |Cite
|
Sign up to set email alerts
|

Model-Based Security Vulnerability Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 16 publications
0
3
0
2
Order By: Relevance
“…Regarding functional security testing, Martin [56] provides an automated test generation method to test the correctness of access control policies. Nonfunctional security testing is addressed by Salas et al [57]. Since many IT systems communicate via the Internet, there are numerous MBST approaches for web applications [58], [59].…”
Section: A Related Workmentioning
confidence: 99%
“…Regarding functional security testing, Martin [56] provides an automated test generation method to test the correctness of access control policies. Nonfunctional security testing is addressed by Salas et al [57]. Since many IT systems communicate via the Internet, there are numerous MBST approaches for web applications [58], [59].…”
Section: A Related Workmentioning
confidence: 99%
“…Furthermore, the tour over the state machine can be artificially modified using mutation, as Hierons and Merayo do. 17 Executing operations in an order different than the expected one may discover unknown errors in the SUT, hidden behind an incomplete specification: Salas et al, 18 for example, already faced this problem in a work about cybersecurity. In the context of user interface testing, 19 Belli also generates "faulty interactions," which are sequences of events which are not considered in the state machine.…”
Section: Ormentioning
confidence: 99%
“…;Xieetal.,2011;Zheng&Zhang,2013;Almorsyetal., 2012).ProtectionofLDAP-enabledwebapplicationsinvolvessignificanteffortfortheadministrators anddevelopers.Ourworkisalsomotivatedbyeffortsthatapplyfaultinjection (Fonseca,Vieira,& Madeira,2007;Vignaetal.,2004;Tal,Knight,&Dean,2004;Kieżun,Guo,Jayaraman,&Ernst, 2008;Ghosh&Kelly,n.d. ;Fouque,Leresteux,&Valette,2012;Voas,2000;Salas,Krishnan,&Ross, 2007;Grela,Sapiecha,&Strug,2015;Aichernig,&Salas,2005).Wediscussrelatedworkintwo categories:LDAPInjectionmitigationapproachesandfaultinjection-basedapproaches.…”
Section: Related Workmentioning
confidence: 99%