Proceedings of the 4th International Conference on Security of Information and Networks 2011
DOI: 10.1145/2070425.2070443
|View full text |Cite
|
Sign up to set email alerts
|

A model-based attack injection approach for security validation

Abstract: International audienceCommunication systems are inherently buggy. These flaws can lead to security breaches in applications, which a malicious user could exploit to cause security failures in the system and, under certain circumstances, to take complete control of the vulnerable system. In this paper, we introduce a novel attack injection approach based on attack modeling to perform security testing and detect potential security vulnerabilities. We use attack trees to describe the system flaws and derive corre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2013
2013
2017
2017

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 15 publications
0
4
0
1
Order By: Relevance
“…Los documentos seleccionados para el estudio de las herramientas, metodologías y procesos para realizar pruebas, pueden dividirse de forma operativa en tres bandos. En el primer bando podemos agrupar las herramientas que desempeñan el rol de un atacante [17], [16], [19], [15], [13], [27], [12], [28] En el segundo bando, las herramientas juegan el rol de defensores, son dotadas con mecanismos capaces de identificar un ataque y tratar de defender el software, o mínimo reportar lo ocurrido [29], [30]. En la Tabla 5 se muestran las dos herramientas encontradas que clasifican en este bando.…”
Section: Resultados Y Discusiónunclassified
“…Los documentos seleccionados para el estudio de las herramientas, metodologías y procesos para realizar pruebas, pueden dividirse de forma operativa en tres bandos. En el primer bando podemos agrupar las herramientas que desempeñan el rol de un atacante [17], [16], [19], [15], [13], [27], [12], [28] En el segundo bando, las herramientas juegan el rol de defensores, son dotadas con mecanismos capaces de identificar un ataque y tratar de defender el software, o mínimo reportar lo ocurrido [29], [30]. En la Tabla 5 se muestran las dos herramientas encontradas que clasifican en este bando.…”
Section: Resultados Y Discusiónunclassified
“…These techniques focus on security testing and use models to capture the characteristics of typical malicious (and invalid) inputs that should be properly handled by the software under test. Models like attack trees [Morais et al 2011], UML state machines [Hussein and Zulkernine 2006], and transition nets [Xu et al 2012], are used to generate sequences of illegal actions, which are not relevant for testing data processing systems where the complexity of the testing process lies in the definition of the input data and mappings to complex, structured outputs. Mutation-based approaches instead alter valid field data or existing test inputs to generate invalid test inputs [Shan and Zhu 2009;Bertolino et al 2014;De Jonge and Visser 2012].…”
Section: Related Workmentioning
confidence: 99%
“…These approaches, known as threat modelling techniques, rely on models used to capture the characteristics of typical malicious (and invalid) inputs that should be properly handled by the software under test. Models like attack trees [17], UML state machines [18], and transition nets [19], are used to generate sequences of illegal actions and thus are not suitable for generating the invalid input data needed in our context. Context free grammars can be used to generate invalid input data but the existing approaches do not model the complex relationships among data fields [4], [5].…”
Section: Related Workmentioning
confidence: 99%