Application penetration testing

被引:47
|
作者
Thompson, HH
机构
关键词
D O I
10.1109/MSP.2005.3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main considerations in software security testing in the application softwares is discussed. The potential attack risks and threats must be modeled in a security testing project. The testing production system must evaluate all the fine details to identify the potential attack. The testing process must be improved to tackle the problems caused by those bugs which escape the usual development and testing processes.
引用
收藏
页码:66 / 69
页数:4
相关论文
共 50 条
  • [11] Network penetration testing
    He, LW
    Bode, N
    EC2ND 2005, PROCEEDINGS, 2006, : 3 - +
  • [12] About penetration testing
    Bishop, Matt
    IEEE SECURITY & PRIVACY, 2007, 5 (06) : 84 - 87
  • [13] Depth of Penetration testing
    James, B
    CERAMIC ARMOR MATERIALS BY DESIGN, 2002, 134 : 165 - 172
  • [14] Methodology for Penetration Testing
    Alisherov, Farkhod A.
    Sattarova, Feruza Y.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2009, 2 (02): : 43 - 50
  • [15] Software penetration testing
    Arkin, B
    Stender, S
    McGraw, G
    IEEE SECURITY & PRIVACY, 2005, 3 (01) : 84 - 87
  • [16] Penetration Testing in a Box
    Epling, Lee
    Hinkel, Brandon
    Hu, Yi
    PROCEEDINGS OF THE 2015 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE, 2015,
  • [17] Penetration testing: A duet
    Geer, D
    Harthorne, J
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 185 - 195
  • [18] A Systematic Approach to Web Application Penetration Testing Using TTCN-3
    Stepien, Bernard
    Xiong, Pulei
    Peyton, Liam
    E-TECHNOLOGIES: TRANSFORMATION IN A CONNECTED WORLD, 2011, 78 : 1 - 16
  • [19] A Survey on Penetration Path Planning in Automated Penetration Testing
    Chen, Ziyang
    Kang, Fei
    Xiong, Xiaobing
    Shu, Hui
    APPLIED SCIENCES-BASEL, 2024, 14 (18):
  • [20] Automatic generation algorithm of penetration graph in penetration testing
    Qiu, Xue
    Wang, Shuguang
    Jia, Qiong
    Xia, Chunhe
    Lv, LiangShuang
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 531 - 537