-
1
-
-
26044454396
-
Is mutation an appropriate tool for testing experiments?
-
J.H. Andrews, L.C. Briand, and Y. Labiche, "Is Mutation an Appropriate Tool for Testing Experiments?," Proc. 27th Int'l Conf. Software Eng. (ICSE '05), pp. 402-411, 2005.
-
(2005)
Proc. 27th Int'l Conf. Software Eng. (ICSE '05)
, pp. 402-411
-
-
Andrews, J.H.1
Briand, L.C.2
Labiche, Y.3
-
2
-
-
77249093633
-
Automated security testing of web widget interactions
-
C. Bezemer, A. Mesbah, and A. van Deursen, "Automated Security Testing of Web Widget Interactions," Proc. Seventh Joint Meeting of the European Software Eng. Conf. and the ACM SIGSOFT Symp. Foundations of Software Eng. (ESE/FSE '09), pp. 81-90, 2009.
-
(2009)
Proc. Seventh Joint Meeting of the European Software Eng. Conf. and the ACM SIGSOFT Symp. Foundations of Software Eng. (ESE/FSE '09)
, pp. 81-90
-
-
Bezemer, C.1
Mesbah, A.2
Van Deursen, A.3
-
4
-
-
70350458973
-
Model-based approach to security test automation
-
June
-
M. Blackburn, R. Busser, A. Nauman, and R. Chandramouli, "Model-Based Approach to Security Test Automation," Proc. Int'l Software and Internet Quality Week Conf., June 2001.
-
(2001)
Proc. Int'l Software and Internet Quality Week Conf.
-
-
Blackburn, M.1
Busser, R.2
Nauman, A.3
Chandramouli, R.4
-
5
-
-
12344337151
-
Automated testing of security functions using a combined model & Interface driven approach
-
R. Chandramouli and M. Blackburn, "Automated Testing of Security Functions Using a Combined Model & Interface Driven Approach," Proc. 37th Hawaii Int'l Conf. System Sciences, pp. 299-308, 2004.
-
(2004)
Proc. 37th Hawaii Int'l Conf. System Sciences
, pp. 299-308
-
-
Chandramouli, R.1
Blackburn, M.2
-
7
-
-
50049110333
-
Testing and comparing web vulnerability scanning tools for sql injection and xss attacks
-
Dec.
-
J. Fonseca, M. Vieira, and H. Madeira, "Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and Xss Attacks," Proc. 13th Pacific Rim Int'l Symp. Dependable Computing, pp. 365-372, Dec. 2007.
-
(2007)
Proc. 13th Pacific Rim Int'l Symp. Dependable Computing
, pp. 365-372
-
-
Fonseca, J.1
Vieira, M.2
Madeira, H.3
-
12
-
-
37349091904
-
Conformance checking of access control policies specified in XACML
-
V.C. Hu, E. Martin, J. Hwang, and T. Xie, "Conformance Checking of Access Control Policies Specified in XACML," Proc. First IEEE Int'l Workshop Security in Software Eng., 2007.
-
(2007)
Proc. First IEEE Int'l Workshop Security in Software Eng.
-
-
Hu, V.C.1
Martin, E.2
Hwang, J.3
Xie, T.4
-
13
-
-
80053606092
-
An analysis and survey of the development of mutation testing
-
Sept./Oct.
-
Y. Jia and M. Harman, "An Analysis and Survey of the Development of Mutation Testing," IEEE Trans. Software Eng., vol. 37, no. 5, pp. 649-678, Sept./Oct. 2011.
-
(2011)
IEEE Trans. Software Eng.
, vol.37
, Issue.5
, pp. 649-678
-
-
Jia, Y.1
Harman, M.2
-
14
-
-
79960568639
-
Generating security tests in addition to functional tests
-
J. Julliand, P.A. Masson, and R. Tissot, "Generating Security Tests in Addition to Functional Tests," Proc. Third Int'l Workshop Automation of Software Test, pp. 41-44, 2008.
-
(2008)
Proc. Third Int'l Workshop Automation of Software Test
, pp. 41-44
-
-
Julliand, J.1
Masson, P.A.2
Tissot, R.3
-
15
-
-
57049146951
-
Model-based security testing using UMLsec
-
Dec.
-
J. Jü rjens, "Model-Based Security Testing Using UMLsec," Electronic Notes in Theoretical Computer Science, vol. 220, no. 1, pp. 93-104, Dec. 2008.
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.220
, Issue.1
, pp. 93-104
-
-
Jü Rjens, J.1
-
16
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
May
-
A. Kieyzun, P.J. Guo, K. Jayaraman, and M.D. Ernst, "Automatic Creation of SQL Injection and Cross-Site Scripting Attacks," Proc. 31st Int'l Conf. Software Eng. (ICSE '09), May 2009.
-
(2009)
Proc. 31st Int'l Conf. Software Eng. (ICSE '09)
-
-
Kieyzun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
17
-
-
79551578456
-
UML-Based modeling and analysis of security threats
-
Sept.
-
J. Kong, D. Xu, and X. Zeng, "UML-Based Modeling and Analysis of Security Threats," Int'l J. Software Eng. and Knowledge Eng., vol. 20, no. 6, pp. 875-897, Sept. 2010.
-
(2010)
Int'l J. Software Eng. and Knowledge Eng.
, vol.20
, Issue.6
, pp. 875-897
-
-
Kong, J.1
Xu, D.2
Zeng, X.3
-
19
-
-
37349056999
-
Test generation from security policies specified in Or-BAC
-
DOI 10.1109/COMPSAC.2007.210, 4291133, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007
-
K. Li, L. Mounier, and R. Groz, "Test Generation from Security Policies Specified in Or-BAC," Proc. 31st Computer Software and Applications Conf. (COMPSAC '07), pp. 255-260, 2007. (Pubitemid 350301802)
-
(2007)
Proceedings - International Computer Software and Applications Conference
, vol.2
, pp. 255-260
-
-
Li, K.1
Mounier, L.2
Groz, R.3
-
20
-
-
34548010540
-
A formal approach for testing security rules
-
DOI 10.1145/1266840.1266860, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
W. Mallouli, J.M. Orset, A. Cavalli, N. Cuppens, and F. Cuppens, "A Formal Approach for Testing Security Rules," Proc. 12th ACM Symp. Access Control Models and Technologies, pp. 127-132, 2007. (Pubitemid 47281545)
-
(2007)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 127-132
-
-
Mallouli, W.1
Orset, J.-M.2
Cavalli, A.3
Cuppens, N.4
Cuppens, F.5
-
21
-
-
70349681069
-
Security test generation using threat trees
-
May
-
A. Marback, H. Do, K. He, S. Kondamarri, and D. Xu, "Security Test Generation Using Threat Trees," Proc. Fourth Int'l Workshop Automation of Software Test (AST '09), May 2009.
-
(2009)
Proc. Fourth Int'l Workshop Automation of Software Test (AST '09)
-
-
Marback, A.1
Do, H.2
He, K.3
Kondamarri, S.4
Xu, D.5
-
22
-
-
35348900179
-
A fault model and mutation testing of access control policies
-
DOI 10.1145/1242572.1242663, 16th International World Wide Web Conference, WWW2007
-
E. Martin and T. Xie, "A Fault Model and Mutation Testing of Access Control Policies," Proc. 16th Int'l Conf. World Wide Web (WWW '07), pp. 667-676, May 2007. (Pubitemid 47582296)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 667-676
-
-
Martin, E.1
Xie, T.2
-
23
-
-
85084163766
-
Automatic generation of XSS and SQL injection attacks with goal-directed model checking
-
M. Martin and M.S. Lam, "Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking," Proc. 17th Conf. Security Symp. (SS '08), pp. 31-43, 2008.
-
(2008)
Proc. 17th Conf. Security Symp. (SS '08)
, pp. 31-43
-
-
Martin, M.1
Lam, M.S.2
-
24
-
-
73449142778
-
Scalable and effective test generation for role-based access control systems
-
Sept./Oct.
-
A. Masood, R. Bhatti, A. Ghafoor, and A. Mathur, "Scalable and Effective Test Generation for Role-Based Access Control Systems," IEEE Trans. Software Eng., vol. 35, no. 5, pp. 654-668, Sept./Oct. 2009.
-
(2009)
IEEE Trans. Software Eng.
, vol.35
, Issue.5
, pp. 654-668
-
-
Masood, A.1
Bhatti, R.2
Ghafoor, A.3
Mathur, A.4
-
25
-
-
77952740950
-
Conformance testing of temporal role-based access control systems
-
Apr.-June
-
A. Masood, A. Ghafoor, and A. Mathur, "Conformance Testing of Temporal Role-Based Access Control Systems," IEEE Trans. Dependable and Secure Computing, vol. 7, no. 2, pp. 144-158, Apr.-June 2010.
-
(2010)
IEEE Trans. Dependable and Secure Computing
, vol.7
, Issue.2
, pp. 144-158
-
-
Masood, A.1
Ghafoor, A.2
Mathur, A.3
-
28
-
-
0024645936
-
Petri nets: Properties, analysis and applications
-
Apr.
-
T. Murata, "Petri Nets: Properties, Analysis and Applications," Proc. IEEE, vol. 77, no. 4, pp. 541-580, Apr. 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
29
-
-
12844249431
-
Software security testing
-
Sept./Oct.
-
B. Potter, B. Allen, and G. Mcgraw, "Software Security Testing," IEEE Security & Privacy, pp. 32-36, Sept./Oct. 2004.
-
(2004)
IEEE Security & Privacy
, pp. 32-36
-
-
Potter, B.1
Allen, B.2
McGraw, G.3
-
30
-
-
26444536759
-
Methodological issues in model-based testing
-
Model-Based Testing of Reactive Systems: Advanced Lectures
-
A. Pretschner and J. Philipps, "Methodological Issues in Model-Based Testing," Model-Based Testing of Reactive Systems, M. Broy, B. Jonsson, J.-P. Katoen, M. Leucker, A. Pretschner, eds., pp. 281-291, Springer-Verlag, 2005. (Pubitemid 350227431)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 3472
, pp. 281-291
-
-
Pretschner, A.1
Philipps, J.2
-
34
-
-
84861145583
-
Mitigating program security vulnerabilities: Approaches and challenges
-
Sept.
-
H. Shahriar and M. Zulkernine, "Mitigating Program Security Vulnerabilities: Approaches and Challenges," ACM Computing Surveys, Sept. 2010.
-
(2010)
ACM Computing Surveys
-
-
Shahriar, H.1
Zulkernine, M.2
-
37
-
-
3042823607
-
Why security testing is hard?
-
July/Aug.
-
H.H. Thompson, "Why Security Testing Is Hard?," IEEE Security & Privacy Magazine, vol. 1, no. 4, pp. 83-86, July/Aug. 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.4
, pp. 83-86
-
-
Thompson, H.H.1
-
38
-
-
0036838204
-
Testing for software security
-
J. Thompson and J. Whittaker, "Testing for Software Security," Dr. Dobb's J., pp. 24-34, Nov. 2002. (Pubitemid 35172240)
-
(2002)
Dr. Dobb's Journal
, vol.27
, Issue.11
, pp. 24-34
-
-
Thompson, H.H.1
Whittaker, J.A.2
-
39
-
-
84861115328
-
Seven pernicious Kingdoms: A taxonomy of software security errors
-
K. Tsipenyuk, B. Chess, and G. McGraw, "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors," Proc. Workshop Software Security Assurance Tools, Techniques, and Metrics, pp. 36-43, 2005.
-
(2005)
Proc. Workshop Software Security Assurance Tools, Techniques, and Metrics
, pp. 36-43
-
-
Tsipenyuk, K.1
Chess, B.2
McGraw, G.3
-
40
-
-
33846467766
-
Mutating database queries
-
DOI 10.1016/j.infsof.2006.06.009, PII S0950584906000814
-
J. Tuya, M. Suárez-Cabal, and C. Riva, "Mutating Database Queries," Information and Software Technology, vol. 49, no. 4, pp. 398-417, Apr. 2007. (Pubitemid 46164882)
-
(2007)
Information and Software Technology
, vol.49
, Issue.4
, pp. 398-417
-
-
Tuya, J.1
Suarez-Cabal, M.J.2
Riva, C.D.3
-
45
-
-
33646524687
-
Threat-driven modeling and verification of secure software using aspect-oriented petri nets
-
Apr.
-
D. Xu and K.E. Nygard, "Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets," IEEE Trans. Software Eng., vol. 32, no. 4, pp. 265-278, Apr. 2006.
-
(2006)
IEEE Trans. Software Eng.
, vol.32
, Issue.4
, pp. 265-278
-
-
Xu, D.1
Nygard, K.E.2
-
46
-
-
70349663631
-
-
Wiley Encyclopedia of Computer Science and Engineering, B.W. Wah, ed. John Wiley & Sons, Inc. Jan.
-
D. Xu, "Software Security," Wiley Encyclopedia of Computer Science and Engineering, B.W. Wah, ed., vol. 5, pp. 2703-2716, John Wiley & Sons, Inc., Jan. 2009.
-
(2009)
Software Security
, vol.5
, pp. 2703-2716
-
-
Xu, D.1
-
47
-
-
0038360956
-
Modeling and analyzing multi-agent behaviors using predicate/transition nets
-
Feb.
-
D. Xu, R.A. Volz, T.R. Ioerger, and J. Yen, "Modeling and Analyzing Multi-Agent Behaviors Using Predicate/Transition Nets," Int'l J. Software Eng. and Knowledge Eng., vol. 13, no. 1, pp. 103-124, Feb. 2003.
-
(2003)
Int'l J. Software Eng. and Knowledge Eng.
, vol.13
, Issue.1
, pp. 103-124
-
-
Xu, D.1
Volz, R.A.2
Ioerger, T.R.3
Yen, J.4
|