[ספר][B] Secure systems development with UML

J Jürjens - 2005‏ - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

Recent advances in model-based testing

M Utting, B Legeard, F Bouquet, E Fourneret… - Advances in …, 2016‏ - Elsevier
This chapter gives an overview of the field of model-based testing (MBT), particularly the
recent advances in the last decade. It gives a summary of the MBT process, the modeling …

Model‐based security testing: a taxonomy and systematic classification

M Felderer, P Zech, R Breu, M Büchler… - Software testing …, 2016‏ - Wiley Online Library
Model‐based security testing relies on models to test whether a software system meets its
security requirements. It is an active research field of high relevance for industrial …

Metamorphic testing for web system security

NB Chaleshtari, F Pastore, A Goknil… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
Security testing aims at verifying that the software meets its security properties. In modern
Web systems, however, this often entails the verification of the outputs generated when …

Towards agile security assurance

K Beznosov, P Kruchten - Proceedings of the 2004 workshop on New …, 2004‏ - dl.acm.org
Agile development methodologies are gaining acceptance in the software industry. If they
are to be used for constructing security-critical solutions, what do we do about assurance …

Model-based security testing

I Schieferdecker, J Grossmann, M Schneider - arxiv preprint arxiv …, 2012‏ - arxiv.org
Security testing aims at validating software system requirements related to security
properties like confidentiality, integrity, authentication, authorization, availability, and non …

A threat model‐based approach to security testing

A Marback, H Do, K He… - Software: Practice and …, 2013‏ - Wiley Online Library
Software security issues have been a major concern in the cyberspace community, so a
great deal of research on security testing has been performed, and various security testing …

Metamorphic security testing for web systems

PX Mai, F Pastore, A Goknil… - 2020 IEEE 13th …, 2020‏ - ieeexplore.ieee.org
Security testing verifies that the data and the resources of software systems are protected
from attackers. Unfortunately, it suffers from the oracle problem, which refers to the …

Test case generation by OCL mutation and constraint solving

BK Aichernig, PAP Salas - Fifth International Conference on …, 2005‏ - ieeexplore.ieee.org
Fault-based testing is a technique where testers anticipate errors in a system under test in
order to assess or generate test cases. The idea is to have enough test cases capable of …

Testing security properties of protocol implementations-a machine learning based approach

G Shu, D Lee - … on Distributed Computing Systems (ICDCS'07), 2007‏ - ieeexplore.ieee.org
Security and reliability of network protocol implementations are essential for communication
services. Most of the approaches for verifying security and reliability, such as formal …