Visible to the public Security Testing Based on Attack Patterns

TitleSecurity Testing Based on Attack Patterns
Publication TypeConference Paper
Year of Publication2014
AuthorsBozic, J., Wotawa, F.
Conference NameSoftware Testing, Verification and Validation Workshops (ICSTW), 2014 IEEE Seventh International Conference on
Date PublishedMarch
KeywordsAdaptation models, agile software development processes, attack pattern, attack patterns, cross-site scripting, Databases, HTML, Internet, model-based testing, program testing, security, security of data, security testing, Software, software prototyping, SQL Injection, Testing, UML state charts, UML state machine, Unified modeling language
Abstract

Testing for security related issues is an important task of growing interest due to the vast amount of applications and services available over the internet. In practice testing for security often is performed manually with the consequences of higher costs, and no integration of security testing with today's agile software development processes. In order to bring security testing into practice, many different approaches have been suggested including fuzz testing and model-based testing approaches. Most of these approaches rely on models of the system or the application domain. In this paper we suggest to formalize attack patterns from which test cases can be generated and even executed automatically. Hence, testing for known attacks can be easily integrated into software development processes where automated testing, e.g., for daily builds, is a requirement. The approach makes use of UML state charts. Besides discussing the approach, we illustrate the approach using a case study.

URLhttps://ieeexplore.ieee.org/document/6825631
DOI10.1109/ICSTW.2014.58
Citation Key6825631