메뉴 건너뛰기




Volumn , Issue , 2000, Pages 603-612

Testing for software vulnerability using environment perturbation

Author keywords

Environment perturbation; Fault injection; Security flaws; Security testing

Indexed keywords

COMPUTER OPERATING SYSTEMS; COMPUTER SIMULATION; COMPUTER SOFTWARE SELECTION AND EVALUATION; FAILURE ANALYSIS; PERTURBATION TECHNIQUES; SECURITY OF DATA;

EID: 0034590639     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (38)

References (29)
  • 1
    • 0003949225 scopus 로고
    • A taxonomy of security faults in the unix operation system
    • Master's thesis, Purdue University, August
    • T. Aslam. A taxonomy of security faults in the unix operation system. Master's thesis, Purdue University, August 1995.
    • (1995)
    • Aslam, T.1
  • 3
    • 0003411763 scopus 로고
    • A taxonomy of unix system and network vulnerabilities
    • Technical Report CSE-95-10, Department of Computer Science, University of California at Davis, May
    • M. Bishop. A taxonomy of unix system and network vulnerabilities. Technical Report CSE-95-10, Department of Computer Science, University of California at Davis, May 1995.
    • (1995)
    • Bishop, M.1
  • 4
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Spring
    • M. Bishop and M. Dilger. Checking for race conditions in file accesses. The USENIX Association Computing Systems, 9(2):131-151, Spring 1996.
    • (1996) The USENIX Association Computing Systems , vol.9 , Issue.2 , pp. 131-151
    • Bishop, M.1    Dilger, M.2
  • 5
    • 0029327426 scopus 로고
    • Fault injection: A method for validating computer-system dependability
    • June
    • J. Clark and D. Pradhan. Fault injection: A method for validating computer-system dependability. IEEE Computer, pages 47-56, June 1995.
    • (1995) IEEE Computer , pp. 47-56
    • Clark, J.1    Pradhan, D.2
  • 9
    • 0025557712 scopus 로고
    • An empirical study of the reliability of unix utilities
    • December
    • B. Miller, L. Fredriksen and B. So. An empirical study of the reliability of unix utilities. Communications of the ACM, 33(12):32-44, December 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.1    Fredriksen, L.2    So, B.3
  • 12
    • 0031354777 scopus 로고    scopus 로고
    • Software unit test coverage and adequacy
    • December
    • H. Zhu, P. Hall and J. May. Software unit test coverage and adequacy. ACM Computing Surveys, 29(4):366-427, December 1997.
    • (1997) ACM Computing Surveys , vol.29 , Issue.4 , pp. 366-427
    • Zhu, H.1    Hall, P.2    May, J.3
  • 13
    • 0027701722 scopus 로고
    • FINE: A fault injection and monitoring environment for tracing the unix system behavior under faults
    • November
    • W. Kao, R. Iyer and D. Tang. FINE: A fault injection and monitoring environment for tracing the unix system behavior under faults. IEEE Transactions on Software Engineering, 19(11):1105-1118, November 1993.
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.11 , pp. 1105-1118
    • Kao, W.1    Iyer, R.2    Tang, D.3
  • 17
    • 0004229237 scopus 로고    scopus 로고
    • Software vulnerability analysis
    • PhD thesis, Purdue University, Department of Computer Science, West Lafayette, Indiana
    • I. Krsul. Software Vulnerability Analysis. PhD thesis, Purdue University, Department of Computer Science, West Lafayette, Indiana, 1998.
    • (1998)
    • Krsul, I.1
  • 23
    • 0031187577 scopus 로고    scopus 로고
    • Predicting how badly "good" software can behave
    • August
    • J. Voas, F. Charron, G. McGraw, K. Miller and M. Friedman. Predicting how badly "good" software can behave. IEEE Software, 14(4):73-83, August 1997.
    • (1997) IEEE Software , vol.14 , Issue.4 , pp. 73-83
    • Voas, J.1    Charron, F.2    Mcgraw, G.3    Miller, K.4    Friedman, M.5
  • 24
    • 0003577356 scopus 로고
    • Fuzz revisited: A re-examination of the reliability of unix utilities and services
    • Technical report, Computer Sciences Department, University of Wisconsin
    • B. Miller, D. Koski, C. Lee, V. Maganty, R. Murthy, A. Natarajan and J. Steidl. Fuzz revisited: A re-examination of the reliability of unix utilities and services. Technical report, Computer Sciences Department, University of Wisconsin, 1995.
    • (1995)
    • Miller, B.1    Koski, D.2    Lee, C.3    Maganty, V.4    Murthy, R.5    Natarajan, A.6    Steidl, J.7
  • 26
    • 0004181989 scopus 로고
    • Doctor: An integrated software fault injection environment for distributed real-time systems
    • Technical report, University of Michigan, Department of Elect. Engr. and Computer Science
    • S. Han, K. Shin and H. Rosenberg. Doctor: An integrated software fault injection environment for distributed real-time systems. Technical report, University of Michigan, Department of Elect. Engr. and Computer Science, 1995.
    • (1995)
    • Han, S.1    Shin, K.2    Rosenberg, H.3
  • 27
    • 0031123369 scopus 로고    scopus 로고
    • Fault injection techniques and tools
    • April
    • M. Hsueh, T. Tsai and R. Iyer. Fault injection techniques and tools. IEEE Computer, pages 75-82, April 1997.
    • (1997) IEEE Computer , pp. 75-82
    • Hsueh, M.1    Tsai, T.2    Iyer, R.3
  • 28


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.