2016
DOI: 10.1007/978-3-319-39564-7_24
|View full text |Cite
|
Sign up to set email alerts
|

Extending HARM to make Test Cases for Penetration Testing

Abstract: Abstract. [Context and motivation] Penetration testing is one key technique for discovering vulnerabilities, so that software can be made more secure.[Question/problem] Alignment between modeling techniques used earlier in a project and the development of penetration tests could enable a more systematic approach to such testing, and in some cases also enable creativity. [Principal ideas/results] This paper proposes an extension of HARM (Hacker Attack Representation Method) to achieve a systematic approach to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…A specific Web browser must be installed on their computers, known as the Safe Exam Browser (SEB) [1], which regulates access to websites, search engines, other applications and system calls, also referred to as browser lockdown. Vegendla et al (2016) report on a case study doing penetration testing on the SEB, identifying some vulnerabilities that could be used for cheating. However, it must be noted that this cheating is less likely today, as the software has since been improved.…”
Section: Case A: Digital Examsmentioning
confidence: 99%
“…A specific Web browser must be installed on their computers, known as the Safe Exam Browser (SEB) [1], which regulates access to websites, search engines, other applications and system calls, also referred to as browser lockdown. Vegendla et al (2016) report on a case study doing penetration testing on the SEB, identifying some vulnerabilities that could be used for cheating. However, it must be noted that this cheating is less likely today, as the software has since been improved.…”
Section: Case A: Digital Examsmentioning
confidence: 99%
“…These scenarios can be divided in web-based applications and systems , web services [34][35][36][37][38][39] network protocols and devices [11,14,[40][41][42][43][44][45][46][47][48][49][50][51][52], software and desktop applications [61], and process control system [62]. Figure 4 shows the different target scenarios that have a diversity in relation to the number of studies, and as mentioned before, most of the studies are related to web-based applications, network devices, and protocols contexts.…”
Section: Rq2-what Are the Target-scenarios In Pentest?mentioning
confidence: 99%