Exploring Software Security Test Generation Techniques: Challenges and Opportunities

被引:0
|
作者
Alenezi, Mamdouh [1 ]
Akour, Mohammed [1 ,2 ]
Basit, Hamid Abdul [1 ]
机构
[1] Prince Sultan Univ, Comp Sci Dept, Riyadh 11586, Saudi Arabia
[2] Yarmouk Univ, Informat Syst Dept, Irbid 21163, Jordan
关键词
Security Test Generation Techniques; SLR; Techniques Weaknesses and strengths; SYMBOLIC EXECUTION;
D O I
10.46300/9109.2021.15.11
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Ensuring the security of the software has raised concerns from the research community which triggered numerous approaches that tend to eliminate it. The process of ensuring the security of software includes the introduction of processes in the Software Development Life Cycle where one of them is testing after the software is developed. Manually testing software for security is a labor-intensive task. Therefore, it is required to automate the process of testing by generating test cases by automated techniques. In this paper, we review various software security test case generation approaches and techniques. We try to explore and classify the most eminent techniques for test case generation. The techniques are summarized and presented briefly to covers all researches work that has been done in the targeted classification. Moreover, this paper aims to depict the sound of security in the current state of the art of test case generation. The findings are summarized and discussed where the opportunities and challenges are revealed narratively. Although the paper intends to provide a comprehensive view of the research in test case generation, there was a noticeable lack in the test case generation from the security perspectives.
引用
收藏
页码:106 / 121
页数:16
相关论文
共 50 条
  • [11] Large language models for qualitative research in software engineering: exploring opportunities and challenges
    Muneera Bano
    Rashina Hoda
    Didar Zowghi
    Christoph Treude
    Automated Software Engineering, 2024, 31
  • [12] Security for cyberspace:challenges and opportunities
    Jiang-xing WU
    Jian-hua LI
    Xin-sheng JI
    FrontiersofInformationTechnology&ElectronicEngineering, 2018, 19 (12) : 1459 - 1461
  • [13] Opportunities and Challenges: Security in eHealth
    Sabnis, Suhasini
    Charles, Doug
    BELL LABS TECHNICAL JOURNAL, 2012, 17 (03) : 105 - 111
  • [14] Crowdsourcing Security - Opportunities and Challenges
    Mohan, Lalit S.
    Reddy, Y. R.
    2018 IEEE/ACM 11TH INTERNATIONAL WORKSHOP ON COOPERATIVE AND HUMAN ASPECTS OF SOFTWARE ENGINEERING (CHASE), 2018, : 37 - 40
  • [15] Security for cyberspace: challenges and opportunities
    Wu, Jiang-xing
    Li, Jian-hua
    Ji, Xin-sheng
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (12) : 1459 - 1461
  • [16] Challenges and Opportunities for Sustainable Software
    Lago, Patricia
    2015 IEEE/ACM FIFTH INTERNATIONAL WORKSHOP ON PRODUCT LINE APPROACHES IN SOFTWARE ENGINEERING (PLEASE 2015), 2015, : 1 - 2
  • [17] Software Analytics: Challenges and Opportunities
    Guerrouj, Latifa
    Baysal, Olga
    Lo, David
    Khomh, Foutse
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C), 2016, : 902 - 903
  • [18] Security for cyberspace: challenges and opportunities
    Jiang-xing Wu
    Jian-hua Li
    Xin-sheng Ji
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1459 - 1461
  • [19] A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
    Diana Levshun
    Igor Kotenko
    Artificial Intelligence Review, 2023, 56 : 8547 - 8590
  • [20] Opinion mining for national security: techniques, domain applications, challenges and research opportunities
    Razali, Noor Afiza Mat
    Malizan, Nur Atiqah
    Hasbullah, Nor Asiakin
    Wook, Muslihah
    Zainuddin, Norulzahrah Mohd
    Ishak, Khairul Khalil
    Ramli, Suzaimah
    Sukardi, Sazali
    JOURNAL OF BIG DATA, 2021, 8 (01)