Model-Based Fuzzing for Security Testing
|
|
|
- Stuart Richard
- 10 years ago
- Views:
Transcription
1 Model-Based Fuzzing for Security Testing Ina Schieferdecker, Jürgen Großmann, Martin Schneider Fraunhofer FOKUS 21 April 2012, Montreal, Canada
2 My Testing Context Research and Teaching at FU Berlin Applied research at Fraunhofer FOKUS Standardization at ETSI and OMG ITEA Project DIAMONDS Titel, Datum
3 Outline Introduction The Project Context Behavior Fuzzing with Sequence Diagrams Data Fuzzing with TTCN-3
4 Do you have a feeling about security?
5 Terminology Security testing Testing whether a system under test meets the specified security objectives. Model-based testing Model-based testing is an umbrella of approaches that generate tests from models. Model-based security testing Is an umbrella of approaches that generate tests from model, where the tests check if a system under test meets the specified security objectives. Model-based fuzzing is one of the approaches to randomize tests in a smart manner.
6 Risk, Vulnerabilities and Testing
7 Outline Introduction The Project Context Behavior Fuzzing with Sequence Diagrams Data Fuzzing with TTCN-3
8 DIAMONDS Objectives Security engineering is increasingly challenged by - the openness, - dynamics, and - distribution of networked systems Most verification and validation techniques for security have been developed in the framework of static or known configurations, with full or well-defined control of each component of the system This is not sufficient in networked systems, where control and observation of remote (sub) systems are dynamically invoked over the network Combination of active and passive security testing Usage of fuzz tests (for unknown issues) and functional tests (for security measures) Combination of risk analysis and test generation Integration of automated test generation, test execution and monitoring
9 ITEA2 DIAMONDS Project Diamonds will enable efficient and automated security testing methods of industrial relevance for highly secure systems in multiple domains (incl. e.g. banking, transport or telecommunication) Business Value Multiple Domains Pre-Standardization Work Novel Integration of Testing, Security and Risk-Analysis Expected Results Risk-driven Security Testing Methodology Model-Based Security Test Techniques Security Test Patterns Catalogue
10 Model-Based Testing in a Nutshell Test models enable objective test procedures, knowledge sustainment, test quality assessment, test reuse, and technology-independence
11 Model-Based Testing for Security Security objectives Security targets & scenarios Hypotheses Randomization Metrics Performance & Evaluation
12 Combination of Approaches Security Risk Analysis and Risk-Oriented Testing Model-Based Fuzz Testing (Randomized) Model-Based Security Testing Model-Based Functional Testing (Systematic) Test Automation (Execution)
13 Security Testing Framework Security Test Design Patterns Catalogue Test Designer Security- Oriented Risk Analysis Risk Engineer Test Models Security Testing Framework Security Engineer Vulnerability Databases Test Automation Engineer Functional and Fuzz Security Tests Monitoring Security Property Evaluation
14 Outline Introduction The Project Context Behavior Fuzzing with Sequence Diagrams Data Fuzzing with TTCN-3
15 Fuzz Testing Fuzzing originally describes the random generation of test vectors (Miller et. al. in the early 1990s). Fuzzing is about injecting invalid or random inputs in order - to reveal unexpected behaviour - to identify errors and expose potential vulnerabilities. Ideally, fuzzers generate semi-valid input data, i.e. input data that is invalid only in small portions. specified functionality negative input space (unlimited), target of random fuzzing Depending on fuzzer s knowledge about the protocol, fuzzers can generate totally invalid to semi-valid input data. target of model based fuzzing see also: Takanen, DeMott, Miller: Fuzzing for Software Security and Quality Assurance. Artech House, 2008.
16 Categorization of Fuzzers dumb smart Random-based fuzzers generate randomly input data. They don t know nearly anything about the SUT s protocol. fuzzed input: HdmxH&k dd#**&% Template-based fuzzers use existing traces (files, ) and fuzz parts of the recorded data. template: GET /index.html fuzzed input: GE? /index.html, GET /inde?.html Block-based fuzzers break individual protocol messages down in static (grey) and variable (white) parts and fuzz only the variable part. GET /index.html only the (white) part gets fuzzed fuzzed input: GET /inde?.html, GET /index.&%ml Dynamic Generation/Evolution-based fuzzers learn the protocol of the SUT from feeding the SUT with data and interpreting its responses, e.g. using evolutionary algorithms. While learning the protocol, these fuzzers implicitly run fuzzing. Model-based fuzzers employ a model of the protocol. The model is executed on- or offline to generate complex interactions with the SUT. Thus, it is possible to fuzz data after passing a particular point (e. g. after authentication).
17 Model-Based Fuzz Testing Random fuzzing: has close to zero awareness of the tested interface Mutation-based fuzzing: mutate existing data samples to create test data, breaks the syntax of the tested interface into blocks of data, which it semi-randomly mutates. Model-based fuzz testing: - Uses models of the input domain (protocol models, e.g. context-free grammars), for generating systematic non-random test cases - In security testing purposes, the models are augmented with intelligent and optimized anomalies that will trigger the vulnerabilities in code. - Finds defects which human testers would fail to find Ari Takanen, Jared D. DeMott, and Charles Miller: Fuzzing for Software Security Testing and Quality Assurance; ISBN Copyright 2008 PROTOS project.
18 Mutation Testing & Fuzzing Mutation testing is used for two purposes: to assess a software component for anomalous inputs, to assess the quality of test cases for finding specific defects, to simulate usage situations that are difficult to test. There are two types of mutation testing: a) Data Fault Injection This is traditional data fuzzing submitting invalid or semi-valid input data to the SUT. b) Code Fault Injection on the side of the SUT Code Fault Injection is the modification of the SUT s code by adding typical programming errors. That way quality of test suites can be assessed. Besides the above-mentioned types of mutation testing, the operational interface of the SUT can be stimulated in an invalid way. This type of mutation testing is called behaviour fuzzing.
19 Banking Domain Case Study: Banknote Processing Machines
20 Banking Domain Case Study: Olymp Currency Processing Network CP = Currency Processor RS = Reconciliation Station CC = Control Center VMS = Vault Management System external peripherals external peripherals CP CP CP CC WAN LAN CC Firewall CC / GW RS RS VMS Data Flow : VMS deposit data CP configure & monitor CP CC CC Shift + Reject data updated Shift + Reject data RS RS RS
21 Banking Domain Case Study: TTCN-3 based Test Architecture Test Goal Integration testing of any configurable subsystem. Overview Components not part of the system under test (SUT) are replaced by the tester. The system is stimulated and observed by sending and receiving the C# objects. Challenges C/C# interoperability between tester and SUT. C# object type representation in TTCN-3 Transfer between TTCN-3 messages and C# object representations. Tester (TTCN-3) Interoperability Layer (managed C++) SA Implementation (C#) Software Bus Software Bus Comp. 3 Comp. 3 Comp. 4 Comp. 5
22 Banking Domain Case Study: Processing Steps Risk Analysis Modeling Test Generation TTCN-3 Code Generation Test Execution
23 Development: Behaviour Fuzzing of UML Sequence Diagrams In current state of the art, behaviour fuzzing is done only in small portions using state machines: - by fuzzing the message type, - by reordering messages and - by inserting, repeating and dropping messages. The motivation for behaviour fuzzing is that vulnerabilities can be revealed not only when invalid input data is accepted and processed by the SUT, but also by stimulating the SUT with invalid sequences of messages. To start with, we fuzz existing functional test cases. A real-world example is given in [Tak10] where a vulnerability in Apache web server was found by repeating the host header message in an HTTP request. [Tak10] Takahisa, K.; Miyuki, H.; Kenji, K.: "AspFuzz: A state-aware protocol fuzzer based on application-layer protocols," Computers and Communications (ISCC), 2010 IEEE Symposium on, vol., no., pp , June 2010
24 Development: Behaviour Fuzzing of UML Sequence Diagrams Test cases are generated by fuzzing valid sequence diagrams, e.g. functional test cases. Behaviour fuzzing is realized by changing the order and appearance of messages in two ways: - By rearranging messages. This enables straight-lined sequences to be fuzzed. Fuzzing operations are for example remove, move or repeat a message. - By utilising control structures of UML 2 sequence diagrams, such as combined fragments, guards, constraints and invariants. This allows more sophisticated and specific behaviour fuzzing. By applying one ore more fuzzing operations to a valid sequence, invalid sequences (= behaviour fuzzing test cases) are generated. valid sequence Behaviour Fuzzing invalid sequence Client Apache Fuzzer Apache 1: GET /infotext.html HTTP/1.1 2: Host: Repeat Message 2: Host 1: GET /infotext.html HTTP/1.1 2: Host: 3: Host:
25 Original vs. Fuzzed TTCN-3 Code Starting with Known Behaviour Original Test Case SYSTEM INITIALIZATION var integer i, v_total, v_rjc; f_mtcsetup_cp_rs(cprsstartingmode:all); AUTHENTICATION f_cp_logon("op1"); CONFIGURATION f_cp_selectprocessingmodeus ( ); f_cp_selectdenominationus ( ); f_cp_selectoperationmodeus ( ); f_cp_selectstackingmodeus ( ); COUNTING f_cp_bnprocessing( ); f_cp_bnprocessingwithbarcode ( ); f_cp_bnprocessingwithwarning ( );... COMPLETION f_cp_endshift(); Fuzzed Test Case SYSTEM INITIALIZATION var integer i, v_total, v_rjc; f_mtcsetup_cp_rs(cprsstartingmode:all); f_cp_selectstackingmodeus ( ); AUTHENTICATION f_cp_logon("op1"); CONFIGURATION f_cp_selectprocessingmodeus ( ); f_cp_selectdenominationus ( ); f_cp_selectoperationmodeus ( ); COUNTING f_cp_bnprocessing( ); f_cp_bnprocessingwithbarcode ( ); f_cp_bnprocessingwithwarning ( );... COMPLETION f_cp_endshift();
26 Behavior Fuzzing Banking Domain Case Study Results so far Running successfully over 30 test cases, no weaknesses found Challenges Test execution takes more than 15 minutes per test case, optimization is needed Test evaluation and assessment is difficult (system crashes, error modes, etc.) Large number of generated test cases incl. duplicates (commutative equal combinations, e.g. the combination of the fuzzing operations move message A, remove message A is equal to remove message A ) Outlook Optimized test generation (risk and security-oriented test generation, avoiding duplicates) Combination with data fuzzing methods Remove Defining metrics and coverage criteria number of test cases number of fuzzing operations per test case Repeat Move Remove, Repeat Remove, Move Repeat, Move Remove, Repeat, Move
27 Outline Introduction The Project Context Behavior Fuzzing with Sequence Diagrams Data Fuzzing with TTCN-3
28 Test Execution with TTCN-3 TTCN-3: Testing and Test Control Notation Abstract test specification Data templates allow unlimited structuring and reusability of test data Matching mechanism to compare an oracle to response data Communication paradigms: message and procedure oriented ports Parallel test components Concrete test implementation adapter and codec (coder/decoder of data types) Test System Test Management (TM) Component Handling (CH) System Adapter (SA) (SA) System under Test TTCN-3 Executable (TE) Test Logging(TL) Coding Decoding (CD) Platform Adapter (PA) Official web page: Standard: Tool: TTworkbench:
29 TTCN-3 Multi-Part Standard ETSI ES ETSI ES ETSI ES ETSI ES ETSI ES ETSI ES ETSI ES ETSI ES ETSI ES ETSI ES TTCN-3 Core Language (CL) TTCN-3 Tabular Presentation Format (TFT) TTCN-3 Graphical Presentation Format (GFT) TTCN-3 Operational Semantics TTCN-3 Runtime Interface (TRI) TTCN-3 Control Interfaces (TCI) Integration of ASN.1 Integration of IDL Integration of XML TTCN-3 Documentation TTCN-3 Extension packages ETSI ES x - Advanced Parametrization - Behaviour Types - Configuration and Deployment Support - Performance and Real Time Testing - Extended Runtime Adaptation Standard available for download at Also standardized by the ITU-T as ITU-T Z.140
30 TTCN-3 designed for interface, service, protocol,, system testing System Under Test (SUT) TTCN-3 Test Case Port Port.send(Stimulus) Port.receive(Response) Assignment of a Test Verdict
31 TTCN-3 static and dynamic test configurations SUT TTCN-3 Test Case create start TC MTC TCs start create TC create start
32 Major language elements of TTCN-3 notation (1) Module Definitions Imports Data Types Test Data Test Configuration Test Behavior Importing definitions from other modules defined in TTCN-3 or other languages User defined data types (messages, PDUs, information elements, ) Test data transmitted/expected during test execution (templates, values) Definition of the test components and communication ports Specification of the dynamic test behavior
33 Major language elements of TTCN-3 notation (2) Type definitions: boolean, integer, float, bitstring, charstring, octectstring, hexstring record, set, enumeration, union Programming constucts: message: send/receive procedure: call/getcall, reply/getreply, raise/catch if-then-else, loops: for, while, do-while functions, alternatives component/port/timer control Predefined functions: type conversion, lengthof (string), sizeof (records), Overview: e.g. TTCN-3 Quick Reference Card xxx relevant for data fuzzing
34 TTCN-3 Template Define test data for information sent to and received from the SUT - Type-based templates - Signature templates - Global and local templates - Inline templates - Modified templates - Template matching mechanisms 34
35 Main TTCN-3 Matching Mechanisms 35
36 General Considerations Providing a light-weight extension for TTCN-3 to maximize the usability of the extension for existing TTCN-3 users Matching mechanisms can be used with a new special mechanisms fuzz( ) for templates to be sent Supporting repeatability of fuzz test cases performed via TTCN-3 a seed can be used to support repeatability when generating fuzzed data
37 New Mechanism fuzz( ) fuzz can be used instead of values to define a list of values or templates Only for templates to be sent A single value will be selected when sending a template or invoking the valueof operation Has one or two arguments: 1. shall be of the type return by fuzz and can be a concrete value or a matching mechanism 2. optional charstring denoting a fuzzing generator or operator. Loop to repeat a test case with different fuzz data to be realized in the module control part
38 New Mechanism fuzz( ) Example: type record mydata { charstring field1, octetstring field2, integer field3 } template mytype mydata := { field1 := fuzz(?, UnicodeUtf8ThreeCharGenerator"), field2 := '12AB'O, field3 := fuzz(123) } field1 retrieves a value that is generated by UnicodeUtf8ThreeCharGenerator field3 retrieves a value generated by applying appropriate fuzzing operators to the number 123
39 Maintaining Repeatability of Test Cases Fuzz data is often randomly generated which interferes with repeatability of test cases. In order to maintain repeatability of test cases, a seed is used for randomly generated or mutated fuzz testing values: The seed is optional. It can be read and set using two predefined functions getseed and setseed.
40 Data Fuzzing Approach Make traditional data fuzzing widely available - allow an easy integration into tools - without deep knowledge about fuzz data generation Allow data fuzzing without the need for - making familiar with a specific fuzzing tool - integrating further fuzzing tools into the test process Approach: - don t reinvent the wheel, use the potential of existing fuzzing tools: Peach Sulley OWASP WebScarab - extract their fuzzing generators and operators into a library (reimplementation in Java)
41 Data Fuzzing Library with TTCN-3 Allows generation and mutation-based fuzzing Platform independent: the library is implemented on Java running on many platforms Language independent: the library provides an XML-based interface Efficient: the user can decide - which fuzzing operators shall be used allows adjusting of the library to fit specific requirements, e.g. only generate fuzz testing values based on valid values (for instance taken from functional testing) - how many values shall be generated by the library avoids transmission of billions of values at once Communicative: the fuzzing library tells you which fuzzing operators are used, so you can request more values only from this fuzzing operator if one fuzz testing value generated by a specific fuzzing operator found bugs in your software
42 Tool Architecture
43 Generators and Operators Generators Peach Sulley StringCaseMutator O UnicodeStringsMutator G UnicodeBomMutator G UnicodeBadUtf8Mutator G UnicodeUtf8ThreeCharMutator G StringMutator G PathMutator G HostnameMutator G FilenameMutator G BadIpAddress G BadNumbers G BadDate G BadTime G FiniteRandomNumbersMutator G String Repetition O SQL Injection G Command Injection G Format String G Generators Peach Sulley OWASP WebScarab Delimiter RegExExpander Numerical Edge Case Mutator G G Numerical Variance Mutator LongString G G/O O G
44 DataFuzzing Banking Domain Case Study Results yet to come
45 Summary Security testing - Is needed and challenging - Requires additional approaches for MBT - Ongoing work Systematic and automated security testing - Model-based fuzzing using models on the data and behaviour that is being mutated in such a way that the number of test cases are significantly reduced our approach is to fuzz functional tests - Risk-oriented testing uses risk analysis results for test identification, test selection and test assessment to prioritize and optimize the test process our approach is to extend CORAS and combine it with Fokus!MBT - Security test pattern catalogue capturing expert knowledge on what to test in which context (kind of system, security goal) and allow the reuse of this knowledge within a slightly different context our approach is to relate vulnerabilities and test patterns
46 Selected References A. Takanen, J. DeMott, Ch. Miller (2008). Fuzzing for Software Security Testing and Quality Assurance. Artech House. J. DeMott, R. Enbody, W. Punch. (2007) Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing. A. Takanen. (2009) Fuzzing: the Past, the Present and the Future. SSTIC 09. Y. Hsu, G. Shu and D. Lee. A Model-based Approach to Security Flaw Detection of Network Protocol Implementation, IEEE ICNP, Sh. Becker, H. Abdelnur, R. State, Th. Engel. An Autonomic Testing Framework for IPv6 Configuration Protocols. AIMS 2010: 4th International Conference on Autonomous Infrastructure, Management and Security, pp S. Bekrar, C. Bekrar, R. Groz, L. Mounier. Finding Software Vulnerabilities by Smart Fuzzing Fourth IEEE International Conference on Software Testing, Verification and Validation
47 Thank you for your attention! Further Questions?
48 Contact Prof. Dr.-Ing. Ina Schieferdecker Phone: Mobile: fokus.fraunhofer.de FOKUS Fraunhofer Institute for Open Communication Systems FOKUS Kaiserin-Augusta-Allee Berlin, Germany Tel: +49 (30) Fax: +49 (30) Web:
Automatic Test Data Generation for TTCN-3 using CTE
Automatic Test Data Generation for TTCN-3 using CTE Zhen Ru Dai, Peter H. Deussen, Maik Busch, Laurette Pianta Lacmene, Titus Ngwangwen FraunhoferInstitute for Open Communication Systems (FOKUS) Kaiserin-Augusta-Allee
TECHNICAL REPORT Methods for Testing and Specification (MTS); Security Testing; Basic Terminology
TR 101 583 V1.1.1 (2015-03) TECHNICAL REPORT Methods for Testing and Specification (MTS); Security Testing; Basic Terminology 2 TR 101 583 V1.1.1 (2015-03) Reference DTR/MTS-101583 SecTest_Terms Keywords
Introduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
Model-Based Vulnerability Testing for Web Applications
Model-Based Vulnerability Testing for Web Applications F. Lebeau, B. Legeard, F. Peureux, A. VERNOTTE FEMTO-ST Institute / University of Franche-Comté UMR CNRS 6174, 25030 Besancon, France. Smartesting
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
dominique <dot> toupin <at> ericsson <dot> com GYORGY <dot> RETHY <at> ericsson <dot> com
dominique toupin ericsson com GYORGY RETHY ericsson com About me Tool Manager at Ericsson, helping Ericsson sites to develop better software efficiently Telecommunication
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
How To Test A Web Based Application Automatically
A General Framework for Testing Web-Based Applications Saeed Abrishami, Mohsen Kahani Computer Engineering Department, Ferdowsi University of Mashhad [email protected] r, [email protected] Abstract Software
The GO4IT IPv6 Test Tool and Associated services. Alain Vouffo FOKUS (Fraunhofer Institute for Open Communication Systems) [email protected].
The GO4IT IPv6 Test Tool and Associated services Alain Vouffo FOKUS (Fraunhofer Institute for Open Communication Systems) [email protected] Roadmap Motivations Introduction The GO4IT IPv6 Test
Automated Target Testing with TTCN-3: Experiences from WiMAX Call Processing Features
Automated Target Testing with TTCN-3: Experiences from WiMAX Call Processing Features By Bhaskar Rao G Srinath Y Sridhar Y Jitesh M Motorola India Pvt Ltd, Hyderabad [email protected] 23 November
Development and Industrial Application of Multi-Domain Security Testing Technologies. Innovation Sheet Model Inference Assisted Evolutionary Fuzzing
Development and Industrial Application of Multi-Domain Security Testing Technologies Innovation Sheet Model Inference Assisted Evolutionary Fuzzing Description The technique dynamically analyzes the application
NTP-PoCT: A conformance test tool for push-to-talk over cellular network
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2008; 8:673 686 Published online 29 January 2007 in Wiley InterScience (www.interscience.wiley.com).496 NTP-PoCT: A conformance
Risk Assessment and Security Testing Johannes Viehmann 2015 of Large Scale Networked Systems with RACOMAT
Risk Assessment and Security Testing Johannes Viehmann 2015 of Large Scale Networked Systems with RACOMAT Overview Risk Assessment and Security Testing of Large Scale Networked Systems with RACOMAT Table
Distributed Load Tests with TTCN-3
Distributed Load Tests with TTCN-3 George Din 1, Sorin Tolea 1, Ina Schieferdecker 1,2 1 Fraunhofer FOKUS, MOTION Kaiserin-Augusta-Allee 31 10589 Berlin, Germany 2 Technical University Berlin, Faculty
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Introduction to TTCN-3
Introduction to TTCN-3 Colin Willcock Nokia Research Center 1 NOKIA TTCN-3 Intro.ppt/ 07.11.2002 /C. Willcock Overview Introduction TTCN Testing Background Future Testing Challenges The TTCN-3 Language
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Review of Mobile Applications Testing with Automated Techniques
Review of Mobile Testing with Automated Techniques Anureet Kaur Asst Prof, Guru Nanak Dev University, Amritsar, Punjab Abstract: As the mobile applications and mobile consumers are rising swiftly, it is
A Brief Overview of Software Testing Techniques and Metrics
A Brief Overview of Software Techniques and Metrics Anitha.A Programmer, School of Computer Studies (PG), RVS college of Arts & science, Coimbatore, India. Abstract: Software is the process of executing
UML-based Test Generation and Execution
UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA [email protected] ABSTRACT
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE TIGRAN HAKOBYAN SUJAL PATEL VANDANA MURALI INTRODUCTION Common Object Request
Compliance and Requirement Traceability for SysML v.1.0a
1. Introduction: Compliance and Traceability for SysML v.1.0a This document provides a formal statement of compliance and associated requirement traceability for the SysML v. 1.0 alpha specification, which
The Advantages of Block-Based Protocol Analysis for Security Testing
The Advantages of Block-Based Protocol Analysis for Security Testing Dave Aitel Immunity,Inc. 111 E. 7 th St. Suite 64, NY NY 10009, USA [email protected] February, 4 2002 Abstract. This paper describes
Testing automation of projects in telecommunication domain
Testing automation of projects in telecommunication domain Alexey Veselov, Vsevolod Kotlyarov Saint-Petersburg State Polytechnic University, Saint-Petersburg, Russia [email protected], [email protected]
3.4 Rikke Kuipers, Ari Takanen/ Fuzzing embedded devices
3.4 Rikke Kuipers, Ari Takanen/ Fuzzing embedded devices 3.4.1 Rikke Kuipers Rikke is a security specialist, has a network engineering background at several ISPs and the public broadcasting platform in
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Model Driven Testing AGEDIS Architecture Interfaces and Tools
Model Driven Testing AGEDIS Architecture Interfaces and Tools Alan Hartman Kenneth Nagin IBM Haifa Research Laboratory Haifa University Campus Haifa 31905 ISRAEL {hartman, nagin}@il.ibm.com Page 1 of 11
What is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
Automated Model Based Testing for an Web Applications
Automated Model Based Testing for an Web Applications Agasarpa Mounica, Lokanadham Naidu Vadlamudi Abstract- As the development of web applications plays a major role in our day-to-day life. Modeling the
Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1
Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter
Architecture Design & Sequence Diagram. Week 7
Architecture Design & Sequence Diagram Week 7 Announcement Reminder Midterm I: 1:00 1:50 pm Wednesday 23 rd March Ch. 1, 2, 3 and 26.5 Hour 1, 6, 7 and 19 (pp.331 335) Multiple choice Agenda (Lecture)
Rotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Utilizing Domain-Specific Modelling for Software Testing
Utilizing Domain-Specific Modelling for Software Testing Olli-Pekka Puolitaival, Teemu Kanstrén VTT Technical Research Centre of Finland Oulu, Finland {olli-pekka.puolitaival, teemu.kanstren}@vtt.fi Abstract
protocol fuzzing past, present, future
protocol fuzzing past, present, future luiz eduardo senior systems & security engineer leduardo (at) musecurity.com Hack in the Box 07 - Kuala Lumpur Mu Security, Inc. All Rights Reserved Copyright 2007
Applying 4+1 View Architecture with UML 2. White Paper
Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was
Detecting SQL Injection Vulnerabilities in Web Services
Detecting SQL Injection Vulnerabilities in Web Services Nuno Antunes, {nmsa, mvieira}@dei.uc.pt LADC 2009 CISUC Department of Informatics Engineering University of Coimbra Outline n Web Services n Web
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES By Michael Crouse Dr. Errin W. Fulp, Ph.D., Advisor Abstract The increasingly high volume of users on the web and their use of web
Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.
Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended
GUI Test Automation How-To Tips
www. routinebot.com AKS-Labs - Page 2 - It s often said that First Impression is the last impression and software applications are no exception to that rule. There is little doubt that the user interface
Oracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
How To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
My First TTCN-3 Project with TTworkbench
My First TTCN-3 Project with TTworkbench A first steps guide including instructions for download and installation, detailed description of functionalities, test case behavior, test case execution, and
Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
Software Architecture Document
Software Architecture Document Natural Language Processing Cell Version 1.0 Natural Language Processing Cell Software Architecture Document Version 1.0 1 1. Table of Contents 1. Table of Contents... 2
Static Analysis of Dynamic Properties - Automatic Program Verification to Prove the Absence of Dynamic Runtime Errors
Static Analysis of Dynamic Properties - Automatic Program Verification to Prove the Absence of Dynamic Runtime Errors Klaus Wissing PolySpace Technologies GmbH Argelsrieder Feld 22 82234 Wessling-Oberpfaffenhofen
A Framework of Model-Driven Web Application Testing
A Framework of Model-Driven Web Application Testing Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu Software Engineering Institute, School of Computer Science and Engineering, Beihang University, China
Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
Bug hunting. Vulnerability finding methods in Windows 32 environments compared. FX of Phenoelit
Bug hunting Vulnerability finding methods in Windows 32 environments compared FX of Phenoelit The goal: 0day What we are looking for: Handles network side input Runs on a remote system Is complex enough
Software Development Kit
Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice
High Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Test Management Tool for Risk-based Security Testing
Test Management Tool for Risk-based Security Testing Michael Berger (Fraunhofer FOKUS) [email protected] Outline Introduction to traceability Test Management Tool requirement and concept
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
Easy configuration of NETCONF devices
Easy configuration of NETCONF devices David Alexa 1 Tomas Cejka 2 FIT, CTU in Prague CESNET, a.l.e. Czech Republic Czech Republic [email protected] [email protected] Abstract. It is necessary for developers
The Hacker Strategy. Dave Aitel [email protected]. Security Research
1 The Hacker Strategy Dave Aitel [email protected] Security Research Who am I? CTO, Immunity Inc. History: NSA->@stake -> Immunity Responsible for new product development Vulnerability Sharing Club
ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year!
ITDUMPS QUESTION & ANSWER Accurate study guides, High passing rate! IT dumps provides update free of charge in one year! HTTP://WWW.ITDUMPS.COM Exam : 70-549(C++) Title : PRO:Design & Develop Enterprise
Basic Unix/Linux 1. Software Testing Interview Prep
Basic Unix/Linux 1 Programming Fundamentals and Concepts 2 1. What is the difference between web application and client server application? Client server application is designed typically to work in a
business transaction information management
business transaction information management What CAM Is The CAM specification provides an open XML based system for using business rules to define, validate and compose specific business documents from
Requirements engineering
Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: [email protected] Jun-Jang Jeng IBM T.J. Watson
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 6, July - August 2006 On Assuring Software Quality and Curbing Software
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Combining Security Risk Assessment and Security Testing based on Standards
Jürgen Großmann (FhG Fokus) Fredrik Seehusen (SINTEF ICT) Combining Security Risk Assessment and Security Testing based on Standards 3 rd RISK Workshop at OMG TC in Berlin, 2015-06-16 3 rd RISK Workshop
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Model-Based Testing of Web Applications using NModel
Model-Based Testing of Web Applications using NModel Juhan Ernits 1, Rivo Roo 2, Jonathan Jacky 3, and Margus Veanes 4 1 University of Birmingham, UK [email protected] 2 Reach-U Ltd,Tartu, Estonia
Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements
Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements
TEST AUTOMATION FRAMEWORK
TEST AUTOMATION FRAMEWORK Twister Topics Quick introduction Use cases High Level Description Benefits Next steps Twister How to get Twister is an open source test automation framework. The code, user guide
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
Real World Web Service Testing For Web Hackers
Real World Web Service Testing For Web Hackers TOM ESTON» Senior Security Consultant SecureState» Web Application / Network Penetration Tester» Founder of SocialMediaSecurity.com» Previous Security Research
Fuzzing in Microsoft and FuzzGuru framework
Fuzzing in Microsoft and FuzzGuru framework OWASP-IL May-2007 John Neystadt [email protected] Lead Program Manager Forefront Edge, Microsoft Agenda Overview Introduction to Fuzzing FuzzGuru Architecture
Levels of Software Testing. Functional Testing
Levels of Software Testing There are different levels during the process of Testing. In this chapter a brief description is provided about these levels. Levels of testing include the different methodologies
A JDF-enabled Workflow Simulation Tool
A JDF-enabled Workflow Simulation Tool Claes Buckwalter Keywords: Workflow, software framework, simulation, JDF Abstract: Job Definition Format (JDF) is a relatively young industry standard that specifies
Design by Contract beyond class modelling
Design by Contract beyond class modelling Introduction Design by Contract (DbC) or Programming by Contract is an approach to designing software. It says that designers should define precise and verifiable
Service-oriented Development of Federated ERP Systems
Service-oriented Development of Federated ERP Systems Nico Brehm, Jorge Marx Gómez Department of Computer Science, Carl von Ossietzky University Oldenburg, Ammerländer Heerstrasse 114-118, 26129 Oldenburg,
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA Dr. Stephan Beirer [email protected] Sichere ebusiness
Model-based Testing: Next Generation Functional Software Testing
Model-based Testing: Next Generation Functional Software Testing By Dr. Bruno Legeard Model-based testing (MBT) is an increasingly widely-used technique for automating the generation and execution of tests.
Instrumentation Software Profiling
Instrumentation Software Profiling Software Profiling Instrumentation of a program so that data related to runtime performance (e.g execution time, memory usage) is gathered for one or more pieces of the
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
What is Fuzzing: The Poet, the Courier, and the Oracle
What is Fuzzing: The Poet, the Courier, and the Oracle Fuzzing is well established as an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed
Advanced TTCN-3 Test Suite validation with Titan
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 2. pp. 273 281 doi: 10.14794/ICAI.9.2014.2.273 Advanced TTCN-3 Test Suite validation
