Testing for software vulnerability using environment perturbation

被引:19
|
作者
Du, WL [1 ]
Mathur, AP [1 ]
机构
[1] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
关键词
security testing; security flaws; fault injection; environment perturbation;
D O I
10.1109/ICDSN.2000.857596
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program's inappropriate interactions with the environment and triggered by user's malicious perturbation on the environment (which we call an environment fault), we view the security testing problem as the problem of testing for the fault-tolerance properties of a software system. We consider each environment perturbation as a fault and the resulting security compromise a failure in the toleration of such faults. Our approach is based on the well known technique of fault injection. Environment faults are injected into the system under test and system behavior observed. The failure to tolerate faults is an indicator of a potential security flaw in the system. An Environment-Application interaction (EAI)fault model is proposed which guides us to decide what faults to inject. Based on EAI, we have developed a security testing methodology, and apply it to several applications. We successfully identified a number of vulnerabilities include vulnerabilities in Windows NT operating system.
引用
收藏
页码:603 / 612
页数:10
相关论文
共 50 条
  • [1] Testing for software vulnerability using environment perturbation
    Du, WL
    Mathur, AP
    [J]. QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2002, 18 (03) : 261 - 272
  • [2] Vulnerability Testing of Software Using Extended EAI Model
    Zeng, Fanping
    Li, Ling
    Li, Juan
    Wang, Xufa
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 4, PROCEEDINGS, 2009, : 261 - 265
  • [3] Automated Software Vulnerability Testing Using Deep Learning Methods
    Kuznetsov, Alexandr
    Yeromin, Yehor
    Shapoval, Oleksiy
    Chernov, Kyrylo
    Popova, Mariia
    Serdukov, Kostyantyn
    [J]. 2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 837 - 841
  • [4] Software vulnerability prioritization using vulnerability description
    Ruchi Sharma
    Ritu Sibal
    Sangeeta Sabharwal
    [J]. International Journal of System Assurance Engineering and Management, 2021, 12 : 58 - 64
  • [5] Software vulnerability prioritization using vulnerability description
    Sharma, Ruchi
    Sibal, Ritu
    Sabharwal, Sangeeta
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2021, 12 (01) : 58 - 64
  • [6] Statistics of software vulnerability detection in certification testing
    Barabanov, A. V.
    Markov, A. S.
    Tsirlov, V. L.
    [J]. INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [7] GSM to UMTS Network Handover Vulnerability Testing Using Software-Defined Radio
    McAbee, Carson
    Tummala, Murali
    McEachen, John
    [J]. 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 5422 - 5431
  • [8] An Automated Environment for Hardware Testing Using PXI Instrumentation and LabVIEW Software
    Catic, Vladimir D.
    Lukic, Natalija M.
    Salom, Iva M.
    Ristic, Vukasin P.
    Kabovic, Milenko M.
    Nenadic, Nikola M.
    [J]. 2016 24TH TELECOMMUNICATIONS FORUM (TELFOR), 2016, : 625 - 628
  • [9] Visual testing software environment using Object-Oriented Programming
    Dai, JG
    Chen, GJ
    [J]. AUTOTESTCON 2000: IEEE SYSTEMS READINESS TECHNOLOGY CONFERENCE, PROCEEDINGS, 2000, : 328 - 333
  • [10] The Vulnerability Testing Method and Management for Software Source Code
    Min, Li
    Sen, Jing
    Bin, Dong
    Wei, Chen
    [J]. 2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 68 - 71