TY - GEN
T1 - On the automation of security testing
AU - Wotawa, Franz
PY - 2017/2/21
Y1 - 2017/2/21
N2 - Due to the still increasing interconnectedness of systems it is very much important to further strengthen activities towards assuring security requirements of those systems. Quality assurance methods like coding guidelines with a focus on security related issues, and static analysis tools are necessary but not sufficient because of the fact that security is a system property. Therefore, it is important to also perform system tests focusing on security threads. When carrying out in a manual way testing is very labor intensive and the question arise whether it is possible to automate security testing? In this paper we take up this question, discuss the underlying challenges, and introduce current work dealing with the automation of security testing. In particular, we present work on using combinatorial testing and AI planning for detecting vulnerabilities in systems. In addition, we discuss shortcomings of the present approaches, open research challenges and further research directions.
AB - Due to the still increasing interconnectedness of systems it is very much important to further strengthen activities towards assuring security requirements of those systems. Quality assurance methods like coding guidelines with a focus on security related issues, and static analysis tools are necessary but not sufficient because of the fact that security is a system property. Therefore, it is important to also perform system tests focusing on security threads. When carrying out in a manual way testing is very labor intensive and the question arise whether it is possible to automate security testing? In this paper we take up this question, discuss the underlying challenges, and introduce current work dealing with the automation of security testing. In particular, we present work on using combinatorial testing and AI planning for detecting vulnerabilities in systems. In addition, we discuss shortcomings of the present approaches, open research challenges and further research directions.
UR - http://www.scopus.com/inward/record.url?scp=85015974929&partnerID=8YFLogxK
U2 - 10.1109/ICSSA.2016.9
DO - 10.1109/ICSSA.2016.9
M3 - Conference paper
AN - SCOPUS:85015974929
T3 - Proceedings - 2016 International Conference on Software Security and Assurance, ICSSA 2016
SP - 11
EP - 16
BT - Proceedings - 2016 International Conference on Software Security and Assurance, ICSSA 2016
PB - Institute of Electrical and Electronics Engineers
T2 - 2016 International Conference on Software Security and Assurance, ICSSA 2016
Y2 - 24 August 2016 through 25 August 2016
ER -