메뉴 건너뛰기




Volumn 9, Issue 4, 2012, Pages 526-540

Automated security test generation with formal threat models

Author keywords

KeywordsSoftware security; model based testing; Petri nets.; security testing; software testing; threat modeling

Indexed keywords

AUTOMATIC TEST PATTERN GENERATION; C++ (PROGRAMMING LANGUAGE); DENIAL-OF-SERVICE ATTACK; MODEL CHECKING; ONLINE SYSTEMS; PETRI NETS;

EID: 84861136278     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.24     Document Type: Article
Times cited : (87)

References (47)
  • 5
    • 12344337151 scopus 로고    scopus 로고
    • Automated testing of security functions using a combined model & Interface driven approach
    • R. Chandramouli and M. Blackburn, "Automated Testing of Security Functions Using a Combined Model & Interface Driven Approach," Proc. 37th Hawaii Int'l Conf. System Sciences, pp. 299-308, 2004.
    • (2004) Proc. 37th Hawaii Int'l Conf. System Sciences , pp. 299-308
    • Chandramouli, R.1    Blackburn, M.2
  • 13
    • 80053606092 scopus 로고    scopus 로고
    • An analysis and survey of the development of mutation testing
    • Sept./Oct.
    • Y. Jia and M. Harman, "An Analysis and Survey of the Development of Mutation Testing," IEEE Trans. Software Eng., vol. 37, no. 5, pp. 649-678, Sept./Oct. 2011.
    • (2011) IEEE Trans. Software Eng. , vol.37 , Issue.5 , pp. 649-678
    • Jia, Y.1    Harman, M.2
  • 15
  • 17
    • 79551578456 scopus 로고    scopus 로고
    • UML-Based modeling and analysis of security threats
    • Sept.
    • J. Kong, D. Xu, and X. Zeng, "UML-Based Modeling and Analysis of Security Threats," Int'l J. Software Eng. and Knowledge Eng., vol. 20, no. 6, pp. 875-897, Sept. 2010.
    • (2010) Int'l J. Software Eng. and Knowledge Eng. , vol.20 , Issue.6 , pp. 875-897
    • Kong, J.1    Xu, D.2    Zeng, X.3
  • 19
    • 37349056999 scopus 로고    scopus 로고
    • Test generation from security policies specified in Or-BAC
    • DOI 10.1109/COMPSAC.2007.210, 4291133, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007
    • K. Li, L. Mounier, and R. Groz, "Test Generation from Security Policies Specified in Or-BAC," Proc. 31st Computer Software and Applications Conf. (COMPSAC '07), pp. 255-260, 2007. (Pubitemid 350301802)
    • (2007) Proceedings - International Computer Software and Applications Conference , vol.2 , pp. 255-260
    • Li, K.1    Mounier, L.2    Groz, R.3
  • 22
    • 35348900179 scopus 로고    scopus 로고
    • A fault model and mutation testing of access control policies
    • DOI 10.1145/1242572.1242663, 16th International World Wide Web Conference, WWW2007
    • E. Martin and T. Xie, "A Fault Model and Mutation Testing of Access Control Policies," Proc. 16th Int'l Conf. World Wide Web (WWW '07), pp. 667-676, May 2007. (Pubitemid 47582296)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 667-676
    • Martin, E.1    Xie, T.2
  • 23
    • 85084163766 scopus 로고    scopus 로고
    • Automatic generation of XSS and SQL injection attacks with goal-directed model checking
    • M. Martin and M.S. Lam, "Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking," Proc. 17th Conf. Security Symp. (SS '08), pp. 31-43, 2008.
    • (2008) Proc. 17th Conf. Security Symp. (SS '08) , pp. 31-43
    • Martin, M.1    Lam, M.S.2
  • 24
    • 73449142778 scopus 로고    scopus 로고
    • Scalable and effective test generation for role-based access control systems
    • Sept./Oct.
    • A. Masood, R. Bhatti, A. Ghafoor, and A. Mathur, "Scalable and Effective Test Generation for Role-Based Access Control Systems," IEEE Trans. Software Eng., vol. 35, no. 5, pp. 654-668, Sept./Oct. 2009.
    • (2009) IEEE Trans. Software Eng. , vol.35 , Issue.5 , pp. 654-668
    • Masood, A.1    Bhatti, R.2    Ghafoor, A.3    Mathur, A.4
  • 25
    • 77952740950 scopus 로고    scopus 로고
    • Conformance testing of temporal role-based access control systems
    • Apr.-June
    • A. Masood, A. Ghafoor, and A. Mathur, "Conformance Testing of Temporal Role-Based Access Control Systems," IEEE Trans. Dependable and Secure Computing, vol. 7, no. 2, pp. 144-158, Apr.-June 2010.
    • (2010) IEEE Trans. Dependable and Secure Computing , vol.7 , Issue.2 , pp. 144-158
    • Masood, A.1    Ghafoor, A.2    Mathur, A.3
  • 28
    • 0024645936 scopus 로고
    • Petri nets: Properties, analysis and applications
    • Apr.
    • T. Murata, "Petri Nets: Properties, Analysis and Applications," Proc. IEEE, vol. 77, no. 4, pp. 541-580, Apr. 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 34
    • 84861145583 scopus 로고    scopus 로고
    • Mitigating program security vulnerabilities: Approaches and challenges
    • Sept.
    • H. Shahriar and M. Zulkernine, "Mitigating Program Security Vulnerabilities: Approaches and Challenges," ACM Computing Surveys, Sept. 2010.
    • (2010) ACM Computing Surveys
    • Shahriar, H.1    Zulkernine, M.2
  • 37
    • 3042823607 scopus 로고    scopus 로고
    • Why security testing is hard?
    • July/Aug.
    • H.H. Thompson, "Why Security Testing Is Hard?," IEEE Security & Privacy Magazine, vol. 1, no. 4, pp. 83-86, July/Aug. 2003.
    • (2003) IEEE Security & Privacy Magazine , vol.1 , Issue.4 , pp. 83-86
    • Thompson, H.H.1
  • 38
    • 0036838204 scopus 로고    scopus 로고
    • Testing for software security
    • J. Thompson and J. Whittaker, "Testing for Software Security," Dr. Dobb's J., pp. 24-34, Nov. 2002. (Pubitemid 35172240)
    • (2002) Dr. Dobb's Journal , vol.27 , Issue.11 , pp. 24-34
    • Thompson, H.H.1    Whittaker, J.A.2
  • 40
    • 33846467766 scopus 로고    scopus 로고
    • Mutating database queries
    • DOI 10.1016/j.infsof.2006.06.009, PII S0950584906000814
    • J. Tuya, M. Suárez-Cabal, and C. Riva, "Mutating Database Queries," Information and Software Technology, vol. 49, no. 4, pp. 398-417, Apr. 2007. (Pubitemid 46164882)
    • (2007) Information and Software Technology , vol.49 , Issue.4 , pp. 398-417
    • Tuya, J.1    Suarez-Cabal, M.J.2    Riva, C.D.3
  • 45
    • 33646524687 scopus 로고    scopus 로고
    • Threat-driven modeling and verification of secure software using aspect-oriented petri nets
    • Apr.
    • D. Xu and K.E. Nygard, "Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets," IEEE Trans. Software Eng., vol. 32, no. 4, pp. 265-278, Apr. 2006.
    • (2006) IEEE Trans. Software Eng. , vol.32 , Issue.4 , pp. 265-278
    • Xu, D.1    Nygard, K.E.2
  • 46
    • 70349663631 scopus 로고    scopus 로고
    • Wiley Encyclopedia of Computer Science and Engineering, B.W. Wah, ed. John Wiley & Sons, Inc. Jan.
    • D. Xu, "Software Security," Wiley Encyclopedia of Computer Science and Engineering, B.W. Wah, ed., vol. 5, pp. 2703-2716, John Wiley & Sons, Inc., Jan. 2009.
    • (2009) Software Security , vol.5 , pp. 2703-2716
    • Xu, D.1
  • 47
    • 0038360956 scopus 로고    scopus 로고
    • Modeling and analyzing multi-agent behaviors using predicate/transition nets
    • Feb.
    • D. Xu, R.A. Volz, T.R. Ioerger, and J. Yen, "Modeling and Analyzing Multi-Agent Behaviors Using Predicate/Transition Nets," Int'l J. Software Eng. and Knowledge Eng., vol. 13, no. 1, pp. 103-124, Feb. 2003.
    • (2003) Int'l J. Software Eng. and Knowledge Eng. , vol.13 , Issue.1 , pp. 103-124
    • Xu, D.1    Volz, R.A.2    Ioerger, T.R.3    Yen, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.