Exploring Software Security Test Generation Techniques: Challenges and Opportunities

被引:0
|
作者
Alenezi, Mamdouh [1 ]
Akour, Mohammed [1 ,2 ]
Basit, Hamid Abdul [1 ]
机构
[1] Prince Sultan Univ, Comp Sci Dept, Riyadh 11586, Saudi Arabia
[2] Yarmouk Univ, Informat Syst Dept, Irbid 21163, Jordan
关键词
Security Test Generation Techniques; SLR; Techniques Weaknesses and strengths; SYMBOLIC EXECUTION;
D O I
10.46300/9109.2021.15.11
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Ensuring the security of the software has raised concerns from the research community which triggered numerous approaches that tend to eliminate it. The process of ensuring the security of software includes the introduction of processes in the Software Development Life Cycle where one of them is testing after the software is developed. Manually testing software for security is a labor-intensive task. Therefore, it is required to automate the process of testing by generating test cases by automated techniques. In this paper, we review various software security test case generation approaches and techniques. We try to explore and classify the most eminent techniques for test case generation. The techniques are summarized and presented briefly to covers all researches work that has been done in the targeted classification. Moreover, this paper aims to depict the sound of security in the current state of the art of test case generation. The findings are summarized and discussed where the opportunities and challenges are revealed narratively. Although the paper intends to provide a comprehensive view of the research in test case generation, there was a noticeable lack in the test case generation from the security perspectives.
引用
收藏
页码:106 / 121
页数:16
相关论文
共 50 条
  • [1] Exploring cross-layer techniques for security: Challenges and opportunities in wireless networks
    Thamilarasu, Geethapriya
    Sridhar, Ramalingain
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3208 - 3213
  • [2] Security Challenges and Opportunities of Software-Defined Networking
    Dacier, Marc C.
    Koenig, Hartmut
    Cwalinski, Radoslaw
    Kargl, Frank
    Dietrich, Sven
    IEEE SECURITY & PRIVACY, 2017, 15 (02) : 96 - 100
  • [3] Challenges and opportunities in next-generation cyberspace security
    Park, Jong Hyuk
    Gritzalis, Stefanos
    Cheng, Bo-Chao
    Zhang, Ning
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 455 - 456
  • [4] Strength, Trust, and Harmony: The Challenges and Opportunities of Software Supply Chain Security
    Rosen, Trevor
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SOFTWARE SUPPLY CHAIN OFFENSIVE RESEARCH AND ECOSYSTEM DEFENSES, SCORED 2022, 2022, : 1 - 1
  • [5] Opportunities and Challenges of Software-Defined Mobile Networks in Network Security
    Liyanage, Madhusanka
    Abro, Ahmed Bux
    Ylianttila, Mika
    Gurtov, Andrei
    IEEE SECURITY & PRIVACY, 2016, 14 (04) : 34 - 44
  • [6] Software Test Case Generation Tools and Techniques: A Review
    Verma, Abhishek Singh
    Choudhary, Ankur
    Tiwari, Shailesh
    INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2023, 8 (02) : 293 - 315
  • [7] Preparing Next Generation of Software Engineers for Future Societal Challenges and Opportunities
    Dodig-Crnkovic, Gordana
    7TH INTERNATIONAL WORKSHOP ON SOCIAL SOFTWARE ENGINEERING (SSE 2015), 2015, : 49 - 52
  • [8] Software Security Test Data Generation Based on Genetic Algorithms
    Li, Qiong
    Li, Jinhua
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 369 - 372
  • [9] Exploring ChatGPT for next-generation information retrieval: Opportunities and challenges
    Huang, Yizheng
    Huang, Jimmy X.
    WEB INTELLIGENCE, 2024, 22 (01) : 31 - 44
  • [10] Large language models for qualitative research in software engineering: exploring opportunities and challenges
    Bano, Muneera
    Hoda, Rashina
    Zowghi, Didar
    Treude, Christoph
    AUTOMATED SOFTWARE ENGINEERING, 2024, 31 (01)