Exploring Software Security Test Generation Techniques: Challenges and Opportunities

被引:0
|
作者
Alenezi, Mamdouh [1 ]
Akour, Mohammed [1 ,2 ]
Basit, Hamid Abdul [1 ]
机构
[1] Prince Sultan Univ, Comp Sci Dept, Riyadh 11586, Saudi Arabia
[2] Yarmouk Univ, Informat Syst Dept, Irbid 21163, Jordan
关键词
Security Test Generation Techniques; SLR; Techniques Weaknesses and strengths; SYMBOLIC EXECUTION;
D O I
10.46300/9109.2021.15.11
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Ensuring the security of the software has raised concerns from the research community which triggered numerous approaches that tend to eliminate it. The process of ensuring the security of software includes the introduction of processes in the Software Development Life Cycle where one of them is testing after the software is developed. Manually testing software for security is a labor-intensive task. Therefore, it is required to automate the process of testing by generating test cases by automated techniques. In this paper, we review various software security test case generation approaches and techniques. We try to explore and classify the most eminent techniques for test case generation. The techniques are summarized and presented briefly to covers all researches work that has been done in the targeted classification. Moreover, this paper aims to depict the sound of security in the current state of the art of test case generation. The findings are summarized and discussed where the opportunities and challenges are revealed narratively. Although the paper intends to provide a comprehensive view of the research in test case generation, there was a noticeable lack in the test case generation from the security perspectives.
引用
收藏
页码:106 / 121
页数:16
相关论文
共 50 条
  • [31] Security in Internet of Things: Opportunities and Challenges
    Sha, Kewei
    Wei, Wei
    Yang, Andrew T.
    Shi, Weisong
    2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 512 - 518
  • [32] VANET security and forensics: Challenges and opportunities
    Abassi, Ryma
    WILEY INTERDISCIPLINARY REVIEWS: FORENSIC SCIENCE, 2019, 1 (02):
  • [33] Challenges and opportunities in biometric security: A survey
    Arora, Shefali
    Bhatia, M. P. S.
    INFORMATION SECURITY JOURNAL, 2022, 31 (01): : 28 - 48
  • [34] National Security Dilemmas: Challenges and Opportunities
    Black, Jeremy
    JOURNAL OF MILITARY HISTORY, 2010, 74 (02): : 660 - 661
  • [35] A survey of DeFi security: Challenges and opportunities
    Li, Wenkai
    Bu, Jiuyang
    Li, Xiaoqi
    Peng, Hongli
    Niu, Yuanzheng
    Zhang, Yuqing
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 10378 - 10404
  • [37] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [38] Water Security: Research Challenges and Opportunities
    Bakker, Karen
    SCIENCE, 2012, 337 (6097) : 914 - 915
  • [39] Software Architecture in Practice: Challenges and Opportunities
    Wan, Zhiyuan
    Zhang, Yun
    Xia, Xin
    Jiang, Yi
    Lo, David
    PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 1457 - 1469
  • [40] Towards a software museum: Challenges and opportunities
    Bauer, FL
    HISTORY OF COMPUTING: SOFTWARE ISSUES, 2002, : 261 - 262