An approach for guiding developers in the choice of security solutions and in the generation of concrete test cases

被引:0
|
作者
Sébastien Salva
Loukmen Regainia
机构
[1] University Clermont Auvergne,IUT of Clermont
[2] University Clermont Auvergne,Ferrand
来源
Software Quality Journal | 2019年 / 27卷
关键词
Security; Security patterns; Attack-defense trees; Test case generation;
D O I
暂无
中图分类号
学科分类号
摘要
This paper tackles the problems of choosing security solutions and writing concrete security test cases for software, which are two tasks of the software life cycle requiring time, expertise and experience. We propose in this paper a method, based upon the notion of knowledge base, for helping developers devise more secure applications from the threat modelling step up to the testing one. The first stage of the approach consists of the acquisition and integration of publicly available security data into a data store. This one is used to assist developers in the design of attack-defense trees expressing the attacker possibilities to compromise an application and the defenses that may be implemented. These defenses are given under the form of security pattern combinations, a security pattern being a generic and reusable solution to design more secure applications. In the second stage, these trees are used to guide developers in the test case generation. Test verdicts show whether an application is vulnerable to the threats modelled by an ADTree and whether the consequences of the chosen security patterns are observed from the application (a consequence leading to some observable events partly showing that a pattern is correctly implemented). We applied this approach to web applications and evaluated it on 24 participants. The results are very encouraging in terms of the two criteria: comprehensibility and effectiveness.
引用
收藏
页码:675 / 701
页数:26
相关论文
共 11 条
  • [1] An approach for guiding developers in the choice of security solutions and in the generation of concrete test cases
    Salva, Sebastien
    Regainia, Loukmen
    SOFTWARE QUALITY JOURNAL, 2019, 27 (02) : 675 - 701
  • [2] Towards a Test Cases Generation Method for Security Policies
    Abbassi, Ryma
    El Fatmi, Sihem Guemara
    2009 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2009, : 41 - 46
  • [3] Automated Generation of Test Cases for Smart Contract Security Analyzers
    Kim, Ki Byung
    Lee, Jonghyup
    IEEE ACCESS, 2020, 8 : 209377 - 209392
  • [4] Attack scenario based approach to security test generation
    He, Ke
    Li, Xiao-Hong
    Feng, Zhi-Yong
    Marback, Aaron
    Tianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, 2011, 44 (04): : 344 - 352
  • [5] A Model-based Approach for Test Cases Generation
    Silva, J. C.
    Silva, J. L.
    Campos, J. C.
    Saraiva, J. A.
    PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013), 2013,
  • [6] Design of attack generation test-suite based scenario for security solutions testing
    Kim, HK
    Choi, YS
    Seo, DI
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 676 - 679
  • [7] Natural Language Generation Approach for Automated Generation of Test Cases from Logical Specification of Requirements
    Sharma, Richa
    Biswas, K. K.
    EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2014, 2015, 551 : 125 - 139
  • [8] Automatic Generation of Test Cases for REST APIs: a Specification-Based Approach
    Ed-douibi, Hamza
    Canovas Izquierdo, Javier Luis
    Cabot, Jordi
    2018 IEEE 22ND INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2018), 2018, : 181 - 190
  • [9] An Approach for Supporting System-level Test Scenarios Generation from Textual Use Cases
    Some, Stephane S.
    Cheng, Xu
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 724 - 729
  • [10] Automated generation of test cases from contract-oriented specifications: A CSP-based approach
    Belhaouari, Hakim
    Peschanski, Frederic
    11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 219 - 228