Application penetration testing

被引:47
|
作者
Thompson, HH
机构
关键词
D O I
10.1109/MSP.2005.3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main considerations in software security testing in the application softwares is discussed. The potential attack risks and threats must be modeled in a security testing project. The testing production system must evaluate all the fine details to identify the potential attack. The testing process must be improved to tackle the problems caused by those bugs which escape the usual development and testing processes.
引用
收藏
页码:66 / 69
页数:4
相关论文
共 50 条
  • [31] Modeling and testing of snow penetration
    Lee, Jonah H.
    Huang, Daisy
    JOURNAL OF TERRAMECHANICS, 2015, 59 : 35 - 47
  • [32] TESTING BY PENETRATION RESISTANCE.
    Bungey, J.H.
    Concrete (London), 1981, 15 (01): : 30 - 32
  • [33] Horizontal cone penetration testing
    Broere, W
    van Tol, AF
    GEOTECHNICAL SITE CHARACTERIZATION, VOLS 1 AND 2, 1998, : 989 - 994
  • [34] Penetration Testing in IoT Network
    Johari, Rahul
    Kaur, Ishveen
    Tripathi, Reena
    Gupta, Kanika
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [35] Automating Penetration Testing with MeTeOr
    Cerreta, Michele
    Costa, Gabriele
    9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 718 - 725
  • [36] POTASSIUM: Penetration Testing as a Service
    Li, Richard
    Abendroth, Dallin
    Lin, Xing
    Guo, Yuankai
    Baek, Hyun-wook
    Eide, Eric
    Ricci, Robert
    Van der Merwe, Jacobus
    ACM SOCC'15: PROCEEDINGS OF THE SIXTH ACM SYMPOSIUM ON CLOUD COMPUTING, 2015, : 30 - 42
  • [37] CRiPT: Cryptography in Penetration Testing
    Ahuja, Sachin
    Johari, Rahul
    Khokhar, Chetna
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 95 - 106
  • [38] Penetration Testing Artificial Intelligence
    Tjoa, Simon
    Buttinger, Christina
    Holzinger, Katharina
    Kieseberg, Peter
    ERCIM NEWS, 2020, (123): : 36 - 37
  • [39] An automated method of penetration testing
    Qiu, Xue
    Xia, Chunhe
    Wang, Shuguang
    Xia, Qingxin
    Jia, Qiong
    2014 IEEE COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP), 2014, : 211 - 216
  • [40] Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition
    Meyers, Benjamin S.
    Almassari, Sultan Fahad
    Keller, Brandon N.
    Meneely, Andrew
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2022, 31 (03)