Advertisement

Search-Based Secure Software Testing: A Survey

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 731)

Abstract

In today’s era, each software developer is developing enormous products consisting non-functional requirements but fails to provide security. Metaheuristic search is used to estimate the test cases with the help of fitness functions, search-based secure software testing (SBST) Security is not possible without the vulnerabilities in the software. The overall objective is to study various vulnerabilities and various metaheuristic techniques. The results of the survey highlighted the numerous fitness functions that could lead to security, further tools were mentioned for various vulnerability scans. The research questions and corresponding solutions to enlighten the scenario are provided in this survey.

Keywords

Security Non-functional requirements Metaheuristic Vulnerability scan Search-based testing 

References

  1. 1.
    Grosso, C.D., Antoniol, G., Penta, M.D., Galinier, P., Merlo, E.: Improving network applications security: a new heuristic to generate stress testing data. In: GECCO. Proceedings of the Seventh Annual Conference on Genetic and Evolutionary Computation, pp. 1037–1043. ACM (2005)Google Scholar
  2. 2.
    Blum, C., Roli, A.: Metaheuristics in combinatorial optimization: overview and conceptual comparison. ACM Comput. Surv. 35, 263–308 (2003)Google Scholar
  3. 3.
    Antoniol, G.: Search Based Software Testing for Software Security: Breaking Code to Make it Safer, pp. 87–100. IEEE (2009)Google Scholar
  4. 4.
    Gu, T., Shi, Y.-S., Fang, Y.: Research on software security testing. World Acad. Sci. Eng. Technol. 70, 647–651 (2010)Google Scholar
  5. 5.
    Avancini, A., Ceccato, M.: Security testing of web applications: a search based approach for cross-site scripting vulnerabilities. In: 11th IEEE International Working Conference on Source Code Analysis and Manipulation, pp. 85–94 (2011)Google Scholar
  6. 6.
    Hamishagi, V.S.: Software security: a vulnerability activity revisit. In: Third International Conference on Availability, Reliability and Security, pp. 866–872. IEEE (2008)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceAIACTRNew DelhiIndia

Personalised recommendations