Complementary test selection criteria for model-based testing of security components

被引:0
作者
Julien Botella
Jean-François Capuron
Frédéric Dadeau
Elizabeta Fourneret
Bruno Legeard
Florence Schadle
机构
[1] Smartesting Solutions and Services,
[2] DGA Information Superiority,undefined
[3] FEMTO-ST Institute (UMR CNRS 6174) - University of Bourgogne Franche-Comté,undefined
来源
International Journal on Software Tools for Technology Transfer | 2019年 / 21卷
关键词
Model-based testing; Structural coverage; Test scenarios; Temporal properties; Security components;
D O I
暂无
中图分类号
学科分类号
摘要
This article presents a successful industrial application of a model-based testing approach to the validation of security components. We present a smart combination of three test selection criteria applied to testing security requirements of components such as Hardware Security Modules. This combination relies on the use of static test selection criteria, namely structural model coverage, complemented by dynamic test selection criteria, based on abstract test scenarios or temporal properties, designed to target corner cases of security functional requirements. Our approach is implemented in an industrial and scalable MBT tool. We evaluated and successfully applied it on three real-world security components. The outcome of these experiences showed that the three test selection criteria target distinct kinds of errors in the software and are able to reveal inconsistencies in the specification. Moreover, a 5-year experience of working with both manufacturers and evaluators of security components, along with other industrial collaborations, showed that the approach is easy to adopt in the industry and the time spent to learn the methodology is negligible with respect to its benefits. Finally, the approach can be completely applied in a more general context on systems that underlay thorough validation of compliance to specifications or audits.
引用
收藏
页码:425 / 448
页数:23
相关论文
共 53 条
[1]  
Cortier V(2006)A survey of algebraic properties used in cryptographic protocols J. Comput. Secur. 14 1-43
[2]  
Delaune S(2014)Model-based mutation testing from security protocols in HLPSL Softw. Test. Verif. Reliab. 25 684-711
[3]  
Lafourcade P(2010)An access control model based testing approach for smart card applications: results of the POSÉ project JIAS J. Inf. Assur. Secur. 5 335-351
[4]  
Dadeau F(2012)A taxonomy of model-based testing approaches Softw. Test. Verif. Reliab. 22 297-312
[5]  
Héam P-C(2011)Generating tests from B specifications and dynamic selection criteria FAC Form. Asp. Comput. 23 3-19
[6]  
Kheddam R(2013)A test-based security certification scheme for web services ACM Trans. Web 7 5:1-5:41
[7]  
Maatoug G(2010)Research on software security testing World Acad. Sci. Eng. Technol. 70 647-651
[8]  
Rusinowitch M(2015)Model-based security testing: a taxonomy and systematic classification Softw. Test. Verif. Reliab. 26 119-148
[9]  
Masson P-A(2008)Using model-checkers to generate and analyze property relevant test-cases Softw. Qual. J. 16 161-183
[10]  
Potet M-L(2008)j-POST: a Java Toolchain for property-oriented software testing Electron. Notes Theor. Comput. Sci. 220 29-41