On the automation of security testing

Franz Wotawa*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Due to the still increasing interconnectedness of systems it is very much important to further strengthen activities towards assuring security requirements of those systems. Quality assurance methods like coding guidelines with a focus on security related issues, and static analysis tools are necessary but not sufficient because of the fact that security is a system property. Therefore, it is important to also perform system tests focusing on security threads. When carrying out in a manual way testing is very labor intensive and the question arise whether it is possible to automate security testing? In this paper we take up this question, discuss the underlying challenges, and introduce current work dealing with the automation of security testing. In particular, we present work on using combinatorial testing and AI planning for detecting vulnerabilities in systems. In addition, we discuss shortcomings of the present approaches, open research challenges and further research directions.

Original languageEnglish
Title of host publicationProceedings - 2016 International Conference on Software Security and Assurance, ICSSA 2016
PublisherInstitute of Electrical and Electronics Engineers
Pages11-16
Number of pages6
ISBN (Electronic)9781509043880
DOIs
Publication statusPublished - 21 Feb 2017
Event2016 International Conference on Software Security and Assurance, ICSSA 2016 - St. Polten, Austria
Duration: 24 Aug 201625 Aug 2016

Publication series

NameProceedings - 2016 International Conference on Software Security and Assurance, ICSSA 2016

Conference

Conference2016 International Conference on Software Security and Assurance, ICSSA 2016
CountryAustria
CitySt. Polten
Period24/08/1625/08/16

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'On the automation of security testing'. Together they form a unique fingerprint.

Cite this