skip to main content
10.1145/508791.508844acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Software security vulnerability testing in hostile environments

Published:11 March 2002Publication History

ABSTRACT

Traditional Black box software testing can be effective at exposing some classes of software failures. Security class failures, however, do not tend to manifest readily using these techniques. The problem is that many security failures occur in stressed environments, which appear in the field, but are often neglected during testing because of the difficulty to simulate these conditions. Software can only be considered secure if it behaves securely under all operating environments. Hostile environment testing must thus be a part of any overall testing strategy. This paper describes this necessity and a black box approach for creating such environments in order to expose security vulnerabilities.

References

  1. Bowden, T.;. Segal, M., "Remediation of Application-Specific Security Vulnerabilities at Runtime", IEEE Software, Vol. 17, No. 5, pp. 59-67, September/October 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Houlihan, P., "Targeted software fault insertion," Proceedings of STAR EAST 2001 (Software Testing Analysis and Review), Software Quality Engineering, Inc., Orlando FL, 2001.Google ScholarGoogle Scholar
  3. Richter, J., Programming Applications for Microsoft Windows, Microsoft Press, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Viega, J. and McGraw, G., Building Secure Software, Addison-Wesley, 2001.Google ScholarGoogle Scholar
  5. Viega, J.; Kohno, T.; Potter, B., "Trust (and Mistrust) in Secure Applications", Communications of the ACM, Vol. 44, No. 2, pp. 31-36, February 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Voas, J. and McGraw, G., Software fault injection: inoculating programs against errors, Wiley, NY, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Whittaker, J., "Software's invisible users," IEEE Software, Vol. 18, No. 3, pp. 84-88 (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Software security vulnerability testing in hostile environments

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '02: Proceedings of the 2002 ACM symposium on Applied computing
        March 2002
        1200 pages
        ISBN:1581134452
        DOI:10.1145/508791

        Copyright © 2002 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 March 2002

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,650of6,669submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader