skip to main content
10.1145/508791.508844acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Software security vulnerability testing in hostile environments

Published: 11 March 2002 Publication History

Abstract

Traditional Black box software testing can be effective at exposing some classes of software failures. Security class failures, however, do not tend to manifest readily using these techniques. The problem is that many security failures occur in stressed environments, which appear in the field, but are often neglected during testing because of the difficulty to simulate these conditions. Software can only be considered secure if it behaves securely under all operating environments. Hostile environment testing must thus be a part of any overall testing strategy. This paper describes this necessity and a black box approach for creating such environments in order to expose security vulnerabilities.

References

[1]
Bowden, T.;. Segal, M., "Remediation of Application-Specific Security Vulnerabilities at Runtime", IEEE Software, Vol. 17, No. 5, pp. 59-67, September/October 2000.
[2]
Houlihan, P., "Targeted software fault insertion," Proceedings of STAR EAST 2001 (Software Testing Analysis and Review), Software Quality Engineering, Inc., Orlando FL, 2001.
[3]
Richter, J., Programming Applications for Microsoft Windows, Microsoft Press, 1997.
[4]
Viega, J. and McGraw, G., Building Secure Software, Addison-Wesley, 2001.
[5]
Viega, J.; Kohno, T.; Potter, B., "Trust (and Mistrust) in Secure Applications", Communications of the ACM, Vol. 44, No. 2, pp. 31-36, February 2001.
[6]
Voas, J. and McGraw, G., Software fault injection: inoculating programs against errors, Wiley, NY, 1998.
[7]
Whittaker, J., "Software's invisible users," IEEE Software, Vol. 18, No. 3, pp. 84-88 (2001).

Cited By

View all
  • (2021)Enabling Efficient Common Criteria Security Evaluation for Connected Vehicles2021 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR51186.2021.9527905(234-240)Online publication date: 26-Jul-2021
  • (2019)Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile2019 IEEE Conference on Standards for Communications and Networking (CSCN)10.1109/CSCN.2019.8931344(1-7)Online publication date: Oct-2019
  • (2014)Fail-Secure Access ControlProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660307(1157-1168)Online publication date: 3-Nov-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '02: Proceedings of the 2002 ACM symposium on Applied computing
March 2002
1200 pages
ISBN:1581134452
DOI:10.1145/508791
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 March 2002

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fault injection
  2. software defect
  3. software failure
  4. software security
  5. software testing

Qualifiers

  • Article

Conference

SAC02
Sponsor:
SAC02: 2002 ACM Symposium on Applied Computing
March 11 - 14, 2002
Madrid, Spain

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Enabling Efficient Common Criteria Security Evaluation for Connected Vehicles2021 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR51186.2021.9527905(234-240)Online publication date: 26-Jul-2021
  • (2019)Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile2019 IEEE Conference on Standards for Communications and Networking (CSCN)10.1109/CSCN.2019.8931344(1-7)Online publication date: Oct-2019
  • (2014)Fail-Secure Access ControlProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660307(1157-1168)Online publication date: 3-Nov-2014
  • (2012)CONFUSecurity-Aware Systems Applications and Software Development Methods10.4018/978-1-4666-1580-9.ch009(152-167)Online publication date: 2012
  • (2011)A model-based attack injection approach for security validationProceedings of the 4th international conference on Security of information and networks10.1145/2070425.2070443(103-110)Online publication date: 14-Nov-2011
  • (2010)CONFUInternational Journal of Secure Software Engineering10.4018/jsse.20100701031:3(41-55)Online publication date: 1-Jul-2010
  • (2010)Configuration Fuzzing for Software Vulnerability Detection2010 International Conference on Availability, Reliability and Security10.1109/ARES.2010.22(525-530)Online publication date: Feb-2010
  • (2009)Fault Injection Technology for Software Vulnerability Testing Based on XenProceedings of the 2009 WRI World Congress on Software Engineering - Volume 0410.1109/WCSE.2009.172(206-210)Online publication date: 19-May-2009
  • (2009)Security Protocol Testing Using Attack TreesProceedings of the 2009 International Conference on Computational Science and Engineering - Volume 0210.1109/CSE.2009.206(690-697)Online publication date: 29-Aug-2009
  • (2009)A fault injection model-oriented testing strategy for component securityJournal of Central South University of Technology10.1007/s11771-009-0044-016:2(258-264)Online publication date: 14-Apr-2009
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media