Exploring Software Security Test Generation Techniques: Challenges and Opportunities

被引:0
|
作者
Alenezi, Mamdouh [1 ]
Akour, Mohammed [1 ,2 ]
Basit, Hamid Abdul [1 ]
机构
[1] Prince Sultan Univ, Comp Sci Dept, Riyadh 11586, Saudi Arabia
[2] Yarmouk Univ, Informat Syst Dept, Irbid 21163, Jordan
来源
INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES | 2021年 / 15卷
关键词
Security Test Generation Techniques; SLR; Techniques Weaknesses and strengths; SYMBOLIC EXECUTION;
D O I
10.46300/9109.2021.15.11
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Ensuring the security of the software has raised concerns from the research community which triggered numerous approaches that tend to eliminate it. The process of ensuring the security of software includes the introduction of processes in the Software Development Life Cycle where one of them is testing after the software is developed. Manually testing software for security is a labor-intensive task. Therefore, it is required to automate the process of testing by generating test cases by automated techniques. In this paper, we review various software security test case generation approaches and techniques. We try to explore and classify the most eminent techniques for test case generation. The techniques are summarized and presented briefly to covers all researches work that has been done in the targeted classification. Moreover, this paper aims to depict the sound of security in the current state of the art of test case generation. The findings are summarized and discussed where the opportunities and challenges are revealed narratively. Although the paper intends to provide a comprehensive view of the research in test case generation, there was a noticeable lack in the test case generation from the security perspectives.
引用
收藏
页码:106 / 121
页数:16
相关论文
共 50 条
  • [41] Open Source Software: Opportunities and challenges
    Sahraoui, S
    Al-Nahas, N
    Innovations Through Information Technology, Vols 1 and 2, 2004, : 779 - 782
  • [42] International migration and security: Opportunities and challenges
    Nyers, Peter
    Guild, Elspeth
    van Seirn, Joanne
    MILLENNIUM-JOURNAL OF INTERNATIONAL STUDIES, 2007, 36 (01): : 154 - 155
  • [43] National Security Dilemmas: Challenges and Opportunities
    Cobb, Adam
    RUSI JOURNAL, 2009, 154 (06): : 104 - 105
  • [44] Opportunities and challenges in tracing security breaches
    Gertz, M
    INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS V, 2003, 124 : 223 - 226
  • [45] National Security Dilemmas: Challenges and Opportunities
    Stigler, Andrew L.
    NAVAL WAR COLLEGE REVIEW, 2010, 63 (01) : 155 - 156
  • [46] Open software in chemistry: Challenges and opportunities
    Soito, Laura
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2017, 253
  • [47] ChatGPT for Software Development: Opportunities and Challenges
    Rahmaniar, Wahyu
    IT PROFESSIONAL, 2024, 26 (03) : 80 - 86
  • [48] Software Defined Radio: Challenges and Opportunities
    Ulversoy, Tore
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (04): : 531 - 550
  • [49] Security Challenges and Opportunities of Cloud FPGAs
    Tahoori, Mehdi B.
    PROCEEDINGS OF THE 2023 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2023, 2023, : 1 - 1
  • [50] International Migration and Security: Opportunities and Challenges
    Tanrisever, Oktay
    COMPARATIVE SOCIOLOGY, 2007, 6 (1-2) : 238 - 240