Skip to main content

Towards Incorporation of Software Security Testing Framework in Software Development

  • Conference paper
Book cover Software Engineering and Computer Systems (ICSECS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 179))

Included in the following conference series:

Abstract

The aim of this paper is to provide secure software using security testing approach. The researchers have reviewed and analyzed the software testing frameworks and software security testing frameworks to efficiently incorporate both of them. Later, the researchers proposed to fully utilize the acceptance testing in software testing framework to achieve by incorporating it in software security testing framework. This incorporation is able to improve the security attribute needed during requirement stage of software development process. The advantage of acceptance test is to expose the system of the real situation, including vulnerability, risk, impacts and the intruders which provide a various set of security attribute to the requirement stage. This finding is recommended to establish a baseline in formulating the test pattern to achieve effective test priority.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Thompson, H.H.: Why Security Testing Is Hard. J. Security & Privacy 1(4), 83–86 (2003)

    Article  Google Scholar 

  2. Venter, H.S., Eloff, J.H.P., Li, Y.L.: Standardising Vulnerability Categories. J. Computers & Security 27(3-4), 71–83 (2008)

    Article  Google Scholar 

  3. Jiwnani, K., Zelkowitz, M.: Maintaining Software With A Security Perspective. In: International Conference on Software Maintenance, pp. 194–203 (2002)

    Google Scholar 

  4. Cho, H.: Using Metaprogramming to Implement a Testing Framework. In: ACM SouthEast Regional Conference. ACM, USA (2009)

    Google Scholar 

  5. Misra, S.: An Empirical Framework For Choosing An Effective Testing Technique For Software Test Process Management. J. Information Technology Management 16(4), 19–26 (2005)

    Google Scholar 

  6. Royce, W.W.: Managing The Development of Large Software Systems. In: IEEE Western Electronic Show and Convention, pp. 1–9 (1970)

    Google Scholar 

  7. Rational Unified Process: Best Practices for Software Development Teams. Rational Software White Paper (2001)

    Google Scholar 

  8. Boehm, B., Brown, W., Turner, R.: Spiral Development Of Software-Intensive Systems Of Systems. In: 27th International Conference of Software Engineering (2005)

    Google Scholar 

  9. Ko, A.J., Myers, B.A.: A Framework And Methodology For Studying The Causes Of Software Errors In Programming Systems. J. Visual Languages & Computing 16(1-2), 41–84 (2005)

    Article  Google Scholar 

  10. Mustafa, K., Khan, R.A.: Software Testing: Concepts and Practices. Alpha Science (2007)

    Google Scholar 

  11. Potter, B., McGraw, G.: Software Security Testing. J. Security & Privacy 2(5), 81–85 (2004)

    Article  Google Scholar 

  12. Boehm, B.: A Spiral Model of Software Development and Enhancement. ACM SIGSOFT Software Engineering Notes 11(4), 14–24 (1986)

    Article  Google Scholar 

  13. Craig, R.D., Jaskiel, S.P.: Systematic Software Testing. Artech House Publishers, Boston (2002)

    MATH  Google Scholar 

  14. Microsoft Security Development Lifecycle (SDL) Version 5.0, M. Library, Microsoft, http://msdn.microsoft.com/en-us/library/cc307748.aspx

  15. Myers, G.J.: The Art of Software Testing. Wiley, New York (1979)

    MATH  Google Scholar 

  16. Tondel, I.A., Jaatun, M.G., Jensen, J.: Learning from Software Security Testing. In: 8th IEEE International Conference on Software Testing Verification and Validation Workshop, pp. 286–294. IEEE Computer Society, Washington (2008)

    Google Scholar 

  17. Pu-Lin, Y., Jin-Cherng, L.: Toward Precise Measurements Using Software Normalization. In: Proceedings of the 21st International Conference on Software Engineering, pp. 736–737. ACM, Los Angeles (1999)

    Google Scholar 

  18. Xu, L., Xu, B.: A Framework for Web Application Testing. In: International Conference on Cyberworlds, pp. 300–305. IEEE Computer Society, Washington (2004)

    Google Scholar 

  19. Jing, G., Yuqing, L.: Agent-based Distributed Automated Testing Executing Framework. In: International Conference on Computational Intelligence and Software Engineering, pp. 1–5. IEEE Press, Wuhan (2009)

    Google Scholar 

  20. Tsai, W.T., Wei, X., Chen, Y., Paul, R.: A Robust Testing Framework for Verifying Web Services by Completeness and Consistency Analysis. In: Proceedings of the IEEE International Workshop, pp. 159–166. IEEE Computer Society, Washington (2005)

    Google Scholar 

  21. Xie, T., Taneja, K., Kale, S., Marinov, D.: Towards a Framework for Differential Unit Testing of Object-Oriented Programs. In: 2nd International Workshop on Automation of Software Test. IEEE Computer Society, Minneapolis (2007)

    Google Scholar 

  22. Chen, R., Garde, S., Beale, T., Nystrom, M., Karlsson, D., Klein, G.O., Ahlfedlt, H.: An Archetype-based Testing Framework. J. Studies in Health Technology and Informatic 136, 401–406 (2008)

    Google Scholar 

  23. Tang, J., Lo, E.: A Lightweight Framework For Testing Database Applications. In: Symposium on Applied Computing. ACM, New Zealand (2010)

    Google Scholar 

  24. Lin, Y., Zhang, J., Gray, J.: A Testing Framework for Model Transformations. In: Model-Driven Software Development - Research and Practice in Software Engineering, pp. 219–236. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  25. Werner, E., Grabowski, J., Troschutz, S., Zeiss, B.: A TTCN-3-based Web Service Test Framework. In: Software Engineering Workshops, pp. 375–382 (2008)

    Google Scholar 

  26. Villarroel, R., Fernández-Medina, E., Piattini, M.: Secure Information Systems Development - A Survey And Comparison. J. Computers & Security 24(4), 308–321 (2005)

    Article  Google Scholar 

  27. Igure, V.M., Williams, R.D.: Taxonomies of Attacks and Vulnerabilities in Computer Systems. J. IEEE Communication Surveys & Tutorials 10(1), 6–19 (2008)

    Article  Google Scholar 

  28. Maatta, J., Harkonen, J., Jokinen, T., Mottonen, M., Belt, P., Muhos, M., Haapasalo, H.: Managing Testing Activities In Telecommunications: A Case Study. J. Eng. Technol. Manage. 26, 73–96 (2009)

    Article  Google Scholar 

  29. Lamsweerde, A.v., Brohez, S., Landtsheer, R.D., Janssens, D.: From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. In: Requirements for High Assurance Systems, pp. 49–56 (2003)

    Google Scholar 

  30. Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models To Access Control Infrastructures. ACM Transactions on Software Engineering and Methodology (TOSEM) 15(1), 39–91 (2006)

    Article  Google Scholar 

  31. Yu, E., Liu, L.: Modelling Trust In The i* Strategic Actors Framework. In: Proceedings of the 3rd Workshop on Deception, Fraud and Trust in Agent Societies. LNCS, pp. 175–194. Springer, London (2001)

    Google Scholar 

  32. Giorgini, P., Massacci, F., Mylopoulus, J., Zannone, N.: Modeling Security Requirements Through Ownership, Permission And Delegation. In: 13th IEEE International Conference on Requirements Engineering Proceedings, pp. 167–176. IEEE Computer Society, USA (2005)

    Chapter  Google Scholar 

  33. Mead, N.R., Stehney, T.: Security Quality Requirements Engineering (SQUARE) Methodology. In: Proceedings of the 2005 Workshop On Software Engineering For Secure Systems- Building Trustworthy Applications, pp. 1–7. ACM, New York (2005)

    Chapter  Google Scholar 

  34. Mellado, D., Fernández-Medina, E., Piattini, M.: A Common Criteria Based Security Requirements Engineering Process For The Development Of Secure Information Systems. Computer Standards & Interfaces 29(2), 244–253 (2007)

    Article  Google Scholar 

  35. Haley, C.B., Laney, R., Moffett, J.D.: Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering 34(1), 133–155 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hassan, N.H., Selamat, S.R., Sahib, S., Hussin, B. (2011). Towards Incorporation of Software Security Testing Framework in Software Development. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22170-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22169-9

  • Online ISBN: 978-3-642-22170-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics