SPLIT: Security Protocol Interaction Testing in Practice

被引:0
|
作者
Simos, Dimitris E. [1 ]
机构
[1] SBA Res, Vienna, Austria
来源
ERCIM NEWS | 2016年 / 106期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The SPLIT project applies methods from the field of combinatorial (interaction) testing and model-based testing with the aim of providing quality assurance to software security protocols. The project thus makes a significant contribution towards protecting the information of communicating parties in a digitally connected society.
引用
下载
收藏
页码:38 / +
页数:2
相关论文
共 50 条
  • [21] Security analysis of OPC UA for Industry 4.0 - Testing a modern industry protocol
    Wichmann, Andre
    ATP EDITION, 2016, (7-8): : 40 - 45
  • [22] An XML-Based testing strategy for probing security vulnerabilities in the diameter protocol
    Wang, Daping
    BELL LABS TECHNICAL JOURNAL, 2007, 12 (03) : 79 - 93
  • [23] Split consensus for object security
    Lopriore, Lanfranco
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2023, 38 (05) : 327 - 341
  • [24] Hardware Security and Split Fabrication
    Alkabani, Yousra
    PROCEEDINGS OF 2016 11TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2016, : 59 - 64
  • [25] HUNTINGTON DISEASE PREDICTIVE TESTING PROTOCOL: A 5 YEAR REVIEW OF PRACTICE
    Goldsmith, Claire
    Boycott, Kym
    JOURNAL OF NEUROLOGY NEUROSURGERY AND PSYCHIATRY, 2018, 89 : A66 - A66
  • [26] Split testing PCBs
    Linforth, C.
    Printed Circuit Fabrication, 2001, 24 (04):
  • [27] Multilayer Split-protocol
    Rawal, Bharat S.
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 476 - 479
  • [28] Security vulnerabilities assessment of the X.509 protocol by syntax-based testing
    Turcotte, Y
    Tal, O
    Knight, S
    Dean, T
    MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1572 - 1578
  • [29] Model-Based Testing for Network Security Protocol for E-Banking Application
    Alaba, Fadele Ayotunde
    Hakak, Saqib
    Khan, Fawad Ali
    Adewale, Sulaimon Hakeem
    Rahmawati, Sri
    Patma, Tundung Subali
    Ritonga, Rajab
    Herawan, Tutut
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017, 2018, 672 : 740 - 751
  • [30] Analysis of SCADA Security using Penetration Testing: A case study on Modbus TCP Protocol
    Luswata, John
    Zavarsky, Pavol
    Swar, Bobby
    Zvabva, Davison
    2018 29TH BIENNIAL SYMPOSIUM ON COMMUNICATIONS (BSC), 2018,