2015
DOI: 10.17706/jsw.10.5.650-658
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Security Vulnerabilities Using Misuse Pattern Testing Approach

Abstract: Vulnerability detection is commonly been executed during the testing phase of software development. Current methods are not able to detect system or software security vulnerabilities of certain types of attacks during the early stages of software development. These attacks include both the ones we did not anticipate as well as the ones unknown during the design phase. In this paper we propose a method to detect the security vulnerabilities during the design phase of software development. This approach simulate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Yifan and Boonsiri also recognized the usefulness of pattern testing and proposed a method for detecting security vulnerabilities during design phase [62]. In their approach, they used model testing method to simulate attacks in UML simulation environment in accordance to the misuse patterns which helped uncover existing vulnerabilities that could expose a system to potential threats of certain types of attacks [62]. In addition to that, their method could also indicate which security patterns would be best suited to mitigate such risks.…”
Section: Identifying Security Vulnerabilities In Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Yifan and Boonsiri also recognized the usefulness of pattern testing and proposed a method for detecting security vulnerabilities during design phase [62]. In their approach, they used model testing method to simulate attacks in UML simulation environment in accordance to the misuse patterns which helped uncover existing vulnerabilities that could expose a system to potential threats of certain types of attacks [62]. In addition to that, their method could also indicate which security patterns would be best suited to mitigate such risks.…”
Section: Identifying Security Vulnerabilities In Designmentioning
confidence: 99%
“…In addition to that, their method could also indicate which security patterns would be best suited to mitigate such risks. The benefits reaped from the contribution of model testing helped them analyze system security vulnerabilities during the design phase of software development [62]. Moreover, authors believed this method to be cost-effective and valuable since it had the potentials to improve the design resulting in lower costs as opposed to costs incurred during testing, debugging and maintenance phases of software development [62].…”
Section: Identifying Security Vulnerabilities In Designmentioning
confidence: 99%