A Systematic Approach to Generate and Conduct Destructive Security Test Sets

Author:

Madhuri K.1,Suman M.1,Sri M. Nalini1,Kumar K. Ravi1,Kameswari U. Jyothi1

Affiliation:

1. K.L.University, Guntur (Dt)

Abstract

Security testing involves two approaches; the question of who should do it has two answers. Standard testing organizations using a traditional approach can perform functional security testing. For example, ensuring that access control mechanisms work as advertised is a classic functional testing exercise. Systematic security testing approaches should be seamlessly incorporated into software engineering curricula and software development process. Traditional software engineering textbooks failed to provide adequate methods and techniques for students and software engineers to bring security engineering approaches to software development process generating secure software as well as correct software. This paper argues that a security testing phase should be added to software development process with systematic approach to generating and conducting destructive security test sets following a complete coverage principle. Software engineers must have formal training on writing secure code. The security testing tasks include penetrating and destructive tests that are different from functional testing tasks currently covered in software engineering textbooks Moreover, component-based development and formal methods could be useful to produce secure code, as well as automatic security checking tools. Some experience of applying security testing principles in our software engineering method teaching is reported.

Publisher

Trans Tech Publications, Ltd.

Subject

General Engineering

Reference15 articles.

1. Computer Emergency Response Team (CERT) Coordination Center, http: /www. cert. org/, August (2003).

2. Hao Chen and David Wagner, MOSPS: an Infrastructure for Examining Security Properties of Software, Proceedings of CCS'02, November 18 - 22, 2002, Washington, DC, USA.

3. Carlo Ghezzi, Mehdi Jazayeri, and Dino Mandrioli, Fundamentals of Software Engineering, Prentice Hall, (1991).

4. Frank Hayes, The Story So Far, ComputerWorld, Vol. 37, No 28, July 14, (2003).

5. John E. Hopcroft, Rajeev Motwani, and Jeffery D. Ullman, Introduction to Automata Theory, Languages, and Computation, 2nd edition, Addison Wesley, (2001).

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3