2013 IEEE Sixth International Conference on Software Testing, Verification and Validation 2013
DOI: 10.1109/icst.2013.75
|View full text |Cite
|
Sign up to set email alerts
|

The SPaCIoS Project: Secure Provision and Consumption in the Internet of Services

Abstract: We describe the SPaCIoS project, illustrating its main objectives, the results obtained so far and those that we expect to achieve, in particular, the development of the SPaCIoS Tool, an integrated platform that takes as input a formal description of the system under validation, the expected security goals, and a description of the capabilities of the attacker, and automatically generates and executes a sequence of test cases on the system through a number of proxies.The vision of the Internet of Services (IoS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…Note that the concretisation and the execution of the test cases have been implemented by re-using components of the testing execution engine extracted from the SPaCIoS project [10]. Fig.…”
Section: Stiate Back-endmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that the concretisation and the execution of the test cases have been implemented by re-using components of the testing execution engine extracted from the SPaCIoS project [10]. Fig.…”
Section: Stiate Back-endmentioning
confidence: 99%
“…In doing so, STIATE borrows software components developed for the SPaCIoS Tool [10], [11] that are further improved with new usability features (e.g., the STIATE front-end), richer content for the mutation engine, and reduced manual effort for testing execution. We demonstrate STIATE against an application scenario employing the SAML Single Sign-On multi-party protocol, a well-known industrial security standard largely studied in previous literature.…”
Section: Introductionmentioning
confidence: 99%
“…We reported the problem to OASIS which subsequently released an errata addressing the issue. 4 We also used SATMC at SAP as a back-end for security protocol analysis and testing (AVANTSSAR [1] and SPaCIoS [28]) to assist development teams in the design and development of the SAP NetWeaver SAML Single Sign-On (SAP NGSSO) and SAP OAuth 2.0 solutions. Overall, more than one hundred different protocol configurations and corresponding formal models have been analyzed, showing that both SAP NGSSO and SAP OAuth2 services are indeed well designed.…”
Section: Success Storiesmentioning
confidence: 99%
“…SATMC has been successfully applied in variety of application domains (namely, security protocols, security-sensitive business processes, and cryptographic APIs) and for different purposes (e.g., design-time security analysis and security testing). SATMC is integrated and used as a backend in a number of research prototypes (the AVISPA Tool [2], Tookan [18], the AVANTSSAR Platform [1], and the SPaCIoS Tool [28]) and industrial-strength tools (the Security Validator plugin for SAP NetWeaver BPM 1 ). The effectiveness of SATMC is witnessed by the key role it played in the discovery of:…”
Section: Introductionmentioning
confidence: 99%
“…While verification is, of course, the optimal result, falsification is also extremely useful as one can often employ the discovered attack trace to directly carry out an attack on the protocol implementation (e.g., [10]) or exploit the trace to devise a suite of test cases so as to be able to analyze the implementation at run-time (e.g., [11][12][13]). …”
Section: Introductionmentioning
confidence: 99%