2009 ICSE Workshop on Automation of Software Test 2009
DOI: 10.1109/iwast.2009.5069042
|View full text |Cite
|
Sign up to set email alerts
|

Security test generation using threat trees

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
4
2

Relationship

2
8

Authors

Journals

citations
Cited by 26 publications
(29 citation statements)
references
References 12 publications
0
29
0
Order By: Relevance
“…3) Test Execution: Having assigned all input values to the parameters in the test paths, we implemented a test execution engine based on our existing tool that creates automated tests from Threat Models [24] Threat Models are a way for software designers to define and describe possible threats to the security of a software system [25]. The testing engine parses the input values file and enters data into the web application using a framework, written in the Perl programming language that uses the LWP and WWW:Mechanize libraries to simulate user interaction.…”
Section: ) Path Generationmentioning
confidence: 99%
“…3) Test Execution: Having assigned all input values to the parameters in the test paths, we implemented a test execution engine based on our existing tool that creates automated tests from Threat Models [24] Threat Models are a way for software designers to define and describe possible threats to the security of a software system [25]. The testing engine parses the input values file and enters data into the web application using a framework, written in the Perl programming language that uses the LWP and WWW:Mechanize libraries to simulate user interaction.…”
Section: ) Path Generationmentioning
confidence: 99%
“…As a major means for assuring software security, various security testing techniques have been developed for detecting software vulnerabilities in the past. For example, we have developed techniques for automatically generating security tests from threat models, represented by threat trees [2], threat nets [3], and UML sequence diagrams [4]. However, benchmarks are in great demands for empirically measuring the vulnerability detection capabilities of these techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Attack trees [18,19,20,21,22,23,24,25] Tree Defense trees [26,27,28,29] Threat trees [30,31,32] Fault trees [33] Attack nets [20,34,33,35] …”
Section: Attackmentioning
confidence: 99%