Title :
Mitigating Security Risks in Systems that Support Pervasive Services and Computing: Access-Driven Verification, Validation and Testing
Author :
Arthur, James D. ; Bazaz, Anil ; Nance, Richard E. ; Balci, Osman
Author_Institution :
Department of Computer Science, Virginia Polytechnic Institute and State University (Virginia Tech), arthur@vt.edu
Abstract :
Unique operational and environmental characteristics define pervasive services and computing; they, too, define an ideal atmosphere in which security risks flourish. Ever-present accessibility through the networked and wireless infrastructures, dependency on autonomous and often anonymous computing agents, and the ubiquitous nature of pervasive services make them both enticing and easy targets for ill-intentioned activities. To help mitigate that risk, we propose an adaptive, access-driven verification, validation and testing (VV&T) strategy that, through a Process/Object Model of Computation, (a) identifies those resources and software objects most susceptible to attack, (b) enumerates violable constraints and assumptions underlying those attacks, and (c) provides multi-level strategies incorporating resources, software objects, and constraints and assumptions to determine if, and to what extent, systems supporting pervasive computing are vulnerable to security exploits. The VV&T strategies are defined to accommodate various levels of access to the software development process and its artifacts.
Keywords :
object-oriented programming; program testing; program verification; security of data; ubiquitous computing; access-driven testing; access-driven validation; access-driven verification; ill-intentioned activity; pervasive computing; pervasive service; security risk; software development process; software object model; ubiquitous computing; Application software; Communication system security; Computational modeling; Computer networks; Computer science; Computer security; Information security; Pervasive computing; Software testing; System testing; Constraints and Assumptions; Exploits; Pervasive Services; Process/ObjectModel; Security Risk; Testing; Validation; Verification; Vulnerabilities;
Conference_Titel :
Pervasive Services, IEEE International Conference on
Conference_Location :
Istanbul
Print_ISBN :
1-4244-1325-7
Electronic_ISBN :
1-4244-1326-5
DOI :
10.1109/PERSER.2007.4283900