Scholarly Research Excellence

Digital Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29024


Select areas to restrict search in scientific publication database:
10496
Comparative Analysis and Evaluation of Software Vulnerabilities Testing Techniques
Abstract:
Software and applications are subjected to serious and damaging security threats, these threats are increasing as a result of increased number of potential vulnerabilities. Security testing is an indispensable process to validate software security requirements and to identify security related vulnerabilities. In this paper we analyze and compare different available vulnerabilities testing techniques based on a pre defined criteria using analytical hierarchy process (AHP). We have selected five testing techniques which includes Source code analysis, Fault code injection, Robustness, Stress and Penetration testing techniques. These testing techniques have been evaluated against five criteria which include cost, thoroughness, Ease of use, effectiveness and efficiency. The outcome of the study is helpful for researchers, testers and developers to understand effectiveness of each technique in its respective domain. Also the study helps to compare the inner working of testing techniques against a selected criterion to achieve optimum testing results.
Digital Object Identifier (DOI):

References:

[1] (CERT/CC), C. C. C. "Cataloged vulnerabilities." from http://www.cert.org/stats/
[2] Antunes, N. and M. Vieira (2009). Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services. Dependable Computing, 2009. PRDC '09. 15th IEEE Pacific Rim International Symposium on.
[3] Aznar Bellver Jeronimo, C. R., Roberto, Romero Civera, Agustin (2011). "New Spanish Banking Conglomerates.Application of the Analytic Hierarchy Process (AHP) to their Market Value "International Research Journal of Finance and Economics (78).
[4] Bieman, J. M., D. Dreilinger, et al. (1996). Using fault injection to increase software test coverage. Seventh International Symposium on Software Reliability Engineering, 1996. Proceedings.
[5] Database, N. V. (2012). "National Vulnerability Database Version 2.2." Retrieved 10/08/2012, 2012, from http://nvd.nist.gov/.
[6] IEEE (1986). ANSI/IEEE Standard 1008-1987, IEEE Standard for Software Unit Testing.
[7] IEEE (1990). IEEE Standards Collection: Glossary of Software Engineering Terminology, IEEE Standard 610.12-1990.
[8] Khan, M. A. and M. Sadiq (2011). Analysis of black box software testing techniques: A case study. Current Trends in Information Technology (CTIT), 2011 International Conference and Workshop on.
[9] Lavenhar, C. M. a. S. R. "Code Analysis Tools - Overview." Retrieved 02/06/2012, from at https://buildsecurityin.us- cert.gov/bsi/articles/tools/code/263-BSI.html.
[10] Lavenhar, S. (2006). "code Analysis." Retrieved 01/06/2012, from https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/code/214- BSI.html.
[11] Mitre. (2012). "Common vulnerability managment database." Retrieved 10/08/2012.
[12] Romero-Mariona, J., H. Ziv, et al. (2010). Increasing Trustworthiness through Security Testing Support. Social Computing (SocialCom), 2010 IEEE Second International Conference on.
[13] Rothermel, G. and M. J. Harrold (1996). "Analyzing regression test selection techniques." Software Engineering, IEEE Transactions on 22(8): 529-551.
[14] Saaty, T. (1980). The Analytic Hierarchy Process. New York, McGraw Hill.
[15] Savola, R. and K. Karppinen (2007). Practical Security Testing of Telecommunications Software--A Case Study. Telecommunications, 2007. AICT 2007. The Third Advanced International Conference on.
[16] Shahriar, H. and M. Zulkemine (2009). Automatic Testing of Program Security Vulnerabilities. Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International.
[17] Thomas, L., X. Weifeng, et al. (2011). Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing. Computer Software and Applications Conference Workshops (COMPSACW), 2011 IEEE 35th Annual.
[18] Weyuker, E. J. (1993). Can we measure software testing effectiveness? Software Metrics Symposium, 1993. Proceedings., First International.
[19] Will Radosevich , C. C. M. (2009). "Black Box Security Testing Tools." Retrieved 31/05/2012, 2012, from https://buildsecurityin.us- cert.gov/bsi/articles/tools/black-box/261-BSI.html.
[20] Wyk, G. J. a. K. v. (2009). "White Box Testing." Retrieved 31/05/2012, 2012, from https://buildsecurityin.us-cert.gov/bsi/articles/best- practices/white-box/259-BSI.html.
[21] Wyk, K. R. v. (2007). "Adapting Penetration Testing for Software Development Purposes." Retrieved 03/06/2012, 2012, from https://buildsecurityin.us-cert.gov/bsi/articles/best¬practices/penetration/655-BSI.html.
[22] Wysopal, C. (2009). White Box Better Than Black Box Retrieved 31/05/2012, 2012, from http://www.veracode.com/blog/2009/10/white¬box-better-than-black-box/.
Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007