Exploring Software Security Test Generation Techniques: Challenges and Opportunities

被引:0
|
作者
Alenezi, Mamdouh [1 ]
Akour, Mohammed [1 ,2 ]
Basit, Hamid Abdul [1 ]
机构
[1] Prince Sultan Univ, Comp Sci Dept, Riyadh 11586, Saudi Arabia
[2] Yarmouk Univ, Informat Syst Dept, Irbid 21163, Jordan
来源
INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES | 2021年 / 15卷
关键词
Security Test Generation Techniques; SLR; Techniques Weaknesses and strengths; SYMBOLIC EXECUTION;
D O I
10.46300/9109.2021.15.11
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Ensuring the security of the software has raised concerns from the research community which triggered numerous approaches that tend to eliminate it. The process of ensuring the security of software includes the introduction of processes in the Software Development Life Cycle where one of them is testing after the software is developed. Manually testing software for security is a labor-intensive task. Therefore, it is required to automate the process of testing by generating test cases by automated techniques. In this paper, we review various software security test case generation approaches and techniques. We try to explore and classify the most eminent techniques for test case generation. The techniques are summarized and presented briefly to covers all researches work that has been done in the targeted classification. Moreover, this paper aims to depict the sound of security in the current state of the art of test case generation. The findings are summarized and discussed where the opportunities and challenges are revealed narratively. Although the paper intends to provide a comprehensive view of the research in test case generation, there was a noticeable lack in the test case generation from the security perspectives.
引用
收藏
页码:106 / 121
页数:16
相关论文
共 50 条
  • [21] Opinion mining for national security: techniques, domain applications, challenges and research opportunities
    Noor Afiza Mat Razali
    Nur Atiqah Malizan
    Nor Asiakin Hasbullah
    Muslihah Wook
    Norulzahrah Mohd Zainuddin
    Khairul Khalil Ishak
    Suzaimah Ramli
    Sazali Sukardi
    Journal of Big Data, 8
  • [22] A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
    Levshun, Diana
    Kotenko, Igor
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (08) : 8547 - 8590
  • [23] Coverage-directed test generation with model checkers: Challenges and opportunities
    Devaraj, G
    Heimdahl, MPE
    Liang, DL
    PROCEEDINGS OF THE 29TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, 2005, : 455 - 462
  • [24] 4th International Workshop on Software Security: Challenges, Opportunities, and Lessons Learned
    Mahmood, Sajjad
    Alshayeb, Mohammad
    Niazi, Mahmood
    ACM International Conference Proceeding Series, 2024,
  • [25] Test software generation productivity and code quality improvement by applying software engineering techniques
    Vock, Stefan
    Schmid, Markus
    von Staudt, Hans Martin
    2006 IEEE INTERNATIONAL TEST CONFERENCE, VOLS 1 AND 2, 2006, : 27 - +
  • [26] Exploring the Opportunities and Challenges of Open Source Software and Its Economic Impact on the Cybersecurity Market
    Alsharif, Ismail
    Khelifi, Adel
    SMART TECHNOLOGIES AND INNOVATION FOR A SUSTAINABLE FUTURE, 2019, : 115 - 127
  • [27] Virtualization Techniques: Challenges and Opportunities
    Bouali, Lyes
    Abd-Elrahman, Emad
    Afifi, Hossam
    Bouzefrane, Samia
    Daoui, Mehammed
    MOBILE, SECURE, AND PROGRAMMABLE NETWORKING (MSPN 2016), 2016, 10026 : 49 - 62
  • [28] SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing
    Dangwal, Deeksha
    Cowan, Meghan
    Alaghi, Armin
    Lee, Vincent T.
    Reagen, Brandon
    Trippel, Caroline
    PROCEEDINGS OF THE 9TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2020, 2020,
  • [29] Opportunities and Challenges of Trip Generation Data Collection Techniques Using Cellular Networks
    Bojic, Iva
    Yoshimura, Yuji
    Ratti, Carlo
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (03) : 204 - 209
  • [30] Open RAN security: Challenges and opportunities
    Liyanage, Madhusanka
    Braeken, An
    Shahabuddin, Shahriar
    Ranaweera, Pasika
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 214