Skip to main content

On the Value of Hybrid Security Testing

  • Conference paper
Security Protocols XVIII (Security Protocols 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7061))

Included in the following conference series:

  • 396 Accesses

Abstract

We propose a framework for designing a security tool that can take advantages from current approaches while increasing precision, scalability and debuggability. This could enable software developers to conduct comprehensive security testing automatically. The approaches we utilise are static, dynamic and taint analysis along with fuzzing. The rationale behind this is that the complexity of today’s applications makes the discovery of their vulnerabilities difficult using a single approach. Therefore, a combination of them is what is needed to move towards efficient security checking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pistoia, M., Erlingsson, U.: Programming languages and program analysis for security: a three-year retrospective. SIGPLAN Not. 43(12), 32–39 (2009)

    Article  Google Scholar 

  2. Telang, R., Wattal, S.: Impact of software vulnerability announcements on the market value of software vendors - an empirical investigation. In: Workshop on the Economics of Information Security, p. 677427. Harvard University, Cambridge (2005)

    Google Scholar 

  3. Howard, M., Leblanc, D.: Writing Secure Code. Microsoft Press, Redmond (2001)

    Google Scholar 

  4. Chess, B., McGraw, G.: Static analysis for security. IEEE Security Privacy 2, 76–79 (2004)

    Article  Google Scholar 

  5. Wheeler, D.A.: Flawfinder

    Google Scholar 

  6. Viega, J., Bloch, J.T., Kohno, Y., McGraw, G.: ITS4: A static vulnerability scanner for C and C++ code. In: Proceedings of the 16th Annual Computer Security Applications Conference, ACSAC 2000, p. 257. IEEE Computer Society, Washington, DC (2000)

    Google Scholar 

  7. Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A.: A first step towards automated detection of buffer overrun vulnerabilities. In: Network and Distributed System Security Symposium, pp. 3–17 (2000)

    Google Scholar 

  8. Ernst, M.D.: Static and Dynamic Analysis: Synergy and Duality. In: Workshop on Dynamic Analysis, Portland, OR, USA, pp. 24–27 (2003)

    Google Scholar 

  9. Reps, T., Ball, T., Das, M., Larus, J.: The use of program profiling for software maintenance with applications to the year 2000 problem. In: Jazayeri, M. (ed.) ESEC 1997 and ESEC-FSE 1997. LNCS, vol. 1301, pp. 432–449. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  10. Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley Professional (2007)

    Google Scholar 

  11. Godefroid, P., Kiezun, A., Levin, M.Y.: Grammar-based whitebox fuzzing. In: Proceedings of the 2008 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2008, pp. 206–215. ACM, New York (2008)

    Chapter  Google Scholar 

  12. Microsoft Corporation: The Microsoft Security Development Lifecycle (SDL): Process Guidance

    Google Scholar 

  13. Microsoft Corporation: Automated penetration testing with white-box fuzzing

    Google Scholar 

  14. Lanzi, A., Martignoni, L., Monga, M., Paleari, R.: A smart fuzzer for x86 executables. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems, SESS 2007, p. 7. IEEE Computer Society, Washington, DC (2007)

    Google Scholar 

  15. Ganesh, V., Leek, T., Rinard, M.: Taint-based directed whitebox fuzzing. In: Proceedings of the 31st International Conference on Software Engineering, ICSE 2009, pp. 474–484. IEEE Computer Society, Washington, DC (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aloteibi, S., Stajano, F. (2014). On the Value of Hybrid Security Testing. In: Christianson, B., Malcolm, J. (eds) Security Protocols XVIII. Security Protocols 2010. Lecture Notes in Computer Science, vol 7061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45921-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45921-8_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45920-1

  • Online ISBN: 978-3-662-45921-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics