Critical Review on Software Testing: Security Perspective

被引:0
|
作者
Khan, Mohd Waris [1 ]
Pandey, Dhirendra [1 ]
Khan, Suhel Ahmad [2 ]
机构
[1] BBAU, Dept Informat Technol, Lucknow, Uttar Pradesh, India
[2] Integral Univ, Dept Comp Applicat, Lucknow, Uttar Pradesh, India
关键词
Security testing; Security factors; Security Testing Profile (STP);
D O I
10.1007/978-981-10-3433-6_86
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software plays a crucial role in day to day life; hence its security and reliability cannot be neglected. Creating a secure software system is not just to secure sensitive and confidential information but it needed to establish a system which could stand true on the benchmark set for being a secure software system and further derive a roadmap to construct impregnable and efficient software. In order to fulfill this criterion, security testing is vital for the development of a secure software system as it pursue all the aspects of SDLC. Security should form an integral part of a SDLC, hence to maximize and maintain the defenses of a software system and to keep its development cost in limits, Security Testing Profile (STP) provides a reliable platform for testing software. STP is an uncharted territory and more progress can be made in this area, which may help in developing robust software systems.
引用
收藏
页码:714 / 723
页数:10
相关论文
共 50 条
  • [41] ACCEPTANCE TESTING - THE CRITICAL PROBLEM IN SOFTWARE ACQUISITION
    BRANNIGAN, V
    [J]. IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 1985, 32 (04) : 295 - 299
  • [42] A Survey of Software Clone Detection From Security Perspective
    Zhang, Haibo
    Sakurai, Kouichi
    [J]. IEEE ACCESS, 2021, 9 : 48157 - 48173
  • [43] METHOD FOR CRITICAL CURRENT TESTING - SOFTWARE CORRECTIONS
    SIDDALL, MB
    SMATHERS, DB
    [J]. IEEE TRANSACTIONS ON MAGNETICS, 1989, 25 (02) : 1823 - 1826
  • [44] Software testing for safety-critical applications
    Wang, LF
    Tan, KC
    [J]. IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE, 2005, 8 (02) : 38 - 47
  • [45] Report: Functional Security Testing Closing the Software - Security Testing Gap: A Case from a Telecom Provider
    Zuccato, Albin
    Kogler, Clemens
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 185 - 194
  • [46] Software Security Testing via Misuse Case Modeling
    Khamaiseh, Samer
    Xu, Dianxiang
    [J]. 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 534 - 541
  • [47] Security Testing for Naval Ship Combat System Software
    Yi, Cheol-Gyu
    Kim, Young-Gab
    [J]. IEEE ACCESS, 2021, 9 : 66839 - 66851
  • [48] Non-Operational Testing of Software for Security Issues
    Subramani, Shweta
    Vouk, Mladen
    Williams, Laurie
    [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2013, : 21 - 22
  • [49] Software Security Testing of Web Applications Based on SSD
    Hui, Zhanwei
    Huang, Song
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 93 : 527 - 534
  • [50] A Framework for Testing Hardware-Software Security Architectures
    Dwoskin, Jeffrey S.
    Gomathisankaran, Mahadevan
    Chen, Yu-Yuan
    Lee, Ruby B.
    [J]. 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 387 - 397