2011 IEEE 35th Annual Computer Software and Applications Conference Workshops 2011
DOI: 10.1109/compsacw.2011.40
|View full text |Cite
|
Sign up to set email alerts
|

Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing

Abstract: Security testing is a major means for assuring software security and many security testing techniques have been developed in the past. Benchmarks, however, are in great demands for empirically evaluating the vulnerability detection capabilities of these techniques. To develop such a benchmark, this paper presents an approach to security mutation analysis of Magento, a fully-fledged open source e-commerce web application for evaluating automated security testing techniques. We create security mutants by injecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
5
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 20 publications
(35 reference statements)
1
5
0
Order By: Relevance
“…This finding is consistent with the software testing theory that states that testing aims to shows presence of defects, but it is not able to prove their absence [53]. Additionally, there is evidence in the literature that verification security methods do not identify all defects [54] [55] and some performance tools has limitations such as on temporal synchronization, GUI elements identification and incomplete implementations [56].…”
Section: E Verification Activities Only Do Not Guarantee Softwaresupporting
confidence: 74%
“…This finding is consistent with the software testing theory that states that testing aims to shows presence of defects, but it is not able to prove their absence [53]. Additionally, there is evidence in the literature that verification security methods do not identify all defects [54] [55] and some performance tools has limitations such as on temporal synchronization, GUI elements identification and incomplete implementations [56].…”
Section: E Verification Activities Only Do Not Guarantee Softwaresupporting
confidence: 74%
“…Focus Areas and limitations are shown in given table 8. These identified limitations are complex model [3] [16] [26], annotation cost [6], accuracy [6], lack in tool maturity [10], State space explosion [13], scalability issues [16], error prone [28], time consuming [32], [36], [42], multi components with the same degree [34], performance issues [35], lack of automation [41], quality assurance [41] etc. Focus areas and limitations are shown in given Table 8.…”
Section: Rq3: Which Areas These Approaches Address and What Are The Lmentioning
confidence: 99%
“…Thomas et al [150] do not provide an approach to model-based security testing. However, they point out the lack of benchmarks that may be used to test and evaluate existing model-based testing approaches.…”
Section: Approaches With Main Focus On Threat-based Security Testingmentioning
confidence: 99%
“…However, they point out the lack of benchmarks that may be used to test and evaluate existing model-based testing approaches. To this end, Thomas et al [150] present an approach to security mutation analysis which they apply on Magento, a fully-fledged open source e-commerce web application. In the approach, the authors create security mutants by injecting vulnerabilities in a systematic way.…”
Section: Approaches With Main Focus On Threat-based Security Testingmentioning
confidence: 99%
See 1 more Smart Citation