DocumentCode :
2608930
Title :
Targeting Security Vulnerabilities: From Specification to Detection (Short Paper)
Author :
Hanna, Aiman ; Ling, Hai Zhou ; Furlong, Jason ; Yang, Zhenrong ; Debbabi, Mourad
Author_Institution :
Comput. Security Lab., Concordia Univ., Montreal, QC
fYear :
2008
fDate :
12-13 Aug. 2008
Firstpage :
97
Lastpage :
102
Abstract :
In this paper, we present a joint approach to automate software security testing using two approaches, namely team edit automata (TEA), and the security chaining approach. Team edit automata is used to formally specify the security properties to be tested. It also composes the monitoring engine of the vulnerability detection process. The security chaining approach is used to generate test-data for the purpose of proving that a vulnerability is not only present in the software being tested but it is also exploitable. The combined approach provides elements of a solution towards the automation of security testing of software.
Keywords :
program testing; security of data; security chaining approach; security vulnerability detection process; software security testing; team edit automata; Automata; Automatic testing; Automation; Computer security; Data analysis; Data security; Engines; Monitoring; Software quality; Software testing; Control Flow Analysis; Data Dependency; Dynamic Analysis; Security Automata; Security Testing; Test-Data Generation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Quality Software, 2008. QSIC '08. The Eighth International Conference on
Conference_Location :
Oxford
ISSN :
1550-6002
Print_ISBN :
978-0-7695-3312-4
Type :
conf
DOI :
10.1109/QSIC.2008.35
Filename :
4601532
Link To Document :
بازگشت