2006 International Conference on Systems and Networks Communications (ICSNC'06) 2006
DOI: 10.1109/icsnc.2006.23
|View full text |Cite
|
Sign up to set email alerts
|

ASASI: An Environment for Addressing Software Application Security Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Part of this increased attention is from the realization that the current so-called "penetrate and patch" approach to security is inadequate Essafi, Labed, & Ghezala, 2006) because the applied patches often fix similar vulnerabilities that frequently reappear in software (Hoglund & McGraw, 2002;McGraw, 1999). For example, at the time of this writing, 13 of the 20 most severe US-CERT vulnerability notes documented over the last 10 years were buffer overflow vulnerabilities (US-CERT, 2007).…”
Section: Fundamental Question and Motivationmentioning
confidence: 94%
“…Part of this increased attention is from the realization that the current so-called "penetrate and patch" approach to security is inadequate Essafi, Labed, & Ghezala, 2006) because the applied patches often fix similar vulnerabilities that frequently reappear in software (Hoglund & McGraw, 2002;McGraw, 1999). For example, at the time of this writing, 13 of the 20 most severe US-CERT vulnerability notes documented over the last 10 years were buffer overflow vulnerabilities (US-CERT, 2007).…”
Section: Fundamental Question and Motivationmentioning
confidence: 94%
“… 2021 ; Essafi et al. 2006 ; Walden and Shumba 2006 ; Jayalath et al. 2020 ; Kanniah and Mahrin 2016 ; Arora et al.…”
Section: Related Researchmentioning
confidence: 99%
“…Numerous resources exist which focus on security testing [8,9,11,31,31,42,51,54]. Most notably the Open Web Application Security Project (OWASP) published a guide [27] describing techniques for testing web service security issues, and assembled a cheat sheet [33] focusing on specific security topics including authentication.…”
Section: Testing Authenticationmentioning
confidence: 99%
“…Security testing is motivated by risk models, attack patterns, and use/misuse cases [11,51,54]. Respected security testing resources, such as the OWASP testing guide [27], suggest test cases in this context from the "black box" testing perspective.…”
mentioning
confidence: 99%