2021
DOI: 10.1109/access.2021.3076918
|View full text |Cite
|
Sign up to set email alerts
|

Security Testing for Naval Ship Combat System Software

Abstract: This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2021R1A2C2012635).

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 19 publications
(20 reference statements)
0
5
0
1
Order By: Relevance
“…Some works evaluate the performance of target systems to assess their security or the impact of security controls on their operation. This is observed to be achieved through emulating the behavior of adversaries (i.e., adversary emulation) [66,83] or testing the functionality of a specific functional unit (i.e., unit testing) [26,82,84,85]. Other works target the exiting vulnerabilities in the system as an indicator of the efficiency of its security posture [25,86].…”
Section: Evaluation Approachesmentioning
confidence: 99%
See 4 more Smart Citations
“…Some works evaluate the performance of target systems to assess their security or the impact of security controls on their operation. This is observed to be achieved through emulating the behavior of adversaries (i.e., adversary emulation) [66,83] or testing the functionality of a specific functional unit (i.e., unit testing) [26,82,84,85]. Other works target the exiting vulnerabilities in the system as an indicator of the efficiency of its security posture [25,86].…”
Section: Evaluation Approachesmentioning
confidence: 99%
“…On the other hand, in more advanced system development phases, approaches tend to consider more realistic settings reaching the ability to evaluate the real target system [25,26] and on some occasions simulating certain elements in the environment [89,90]. Additionally, some works address the software source code, middleware and hosting operating system for evaluating its security [82,84,85].…”
Section: Evaluation Approachesmentioning
confidence: 99%
See 3 more Smart Citations