2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE) 2018
DOI: 10.1109/issre.2018.00017
|View full text |Cite
|
Sign up to set email alerts
|

A Natural Language Programming Approach for Requirements-Based Security Testing

Abstract: To facilitate communication among stakeholders, software security requirements are typically written in natural language and capture both positive requirements (i.e., what the system is supposed to do to ensure security) and negative requirements (i.e., undesirable behavior undermining security). In this paper, we tackle the problem of automatically generating executable security test cases from security requirements in natural language (NL). More precisely, since existing approaches for the generation of test… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 57 publications
0
10
0
Order By: Relevance
“…Future work includes the extension of UMTG to deal with different types of testing problems and the identification of solutions to further the scalability of the strategy due to constraint solving for very large systems. We are currently working on UMTG-inspired approaches for security testing of Web systems [33], [34]. We also aim to address scalability issues by evaluating the feasibility of adopting alternative solving approaches, including SMT solvers [126], answer set programming [127], higher-order relational constraint solving [128], and the combination of constraint solving and search-based optimization [95], [129].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Future work includes the extension of UMTG to deal with different types of testing problems and the identification of solutions to further the scalability of the strategy due to constraint solving for very large systems. We are currently working on UMTG-inspired approaches for security testing of Web systems [33], [34]. We also aim to address scalability issues by evaluating the feasibility of adopting alternative solving approaches, including SMT solvers [126], answer set programming [127], higher-order relational constraint solving [128], and the combination of constraint solving and search-based optimization [95], [129].…”
Section: Discussionmentioning
confidence: 99%
“…It enables the extraction of behavioral information by reducing imprecision and incompleteness in use case specifications. RUCM has been successfully applied in many domains (e.g., [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35]). It has been previously evaluated through controlled experiments and showed to be usable and beneficial with respect to making use case specifications less ambiguous and more amenable to precise analysis and design [12].…”
Section: Introductionmentioning
confidence: 99%
“…The technique is aided by an application that allows natural language specifications to be automatically translated into Statechart models. In [34], the authors addressed the problem of automatically creating executable security test scenarios from natural language security requirements.…”
Section: Related Workmentioning
confidence: 99%
“…MCP is the tool supporting our approach for automatically generating security vulnerability test cases from misuse case specifications, described in a recent conference paper [20]. Fig.…”
Section: Tool Overviewmentioning
confidence: 99%