DocumentCode
555430
Title
Systematizing security test case planning using functional requirements phrases
Author
Smith, Brian
Author_Institution
North Carolina State Univ., Raleigh, NC, USA
fYear
2011
fDate
21-28 May 2011
Firstpage
1136
Lastpage
1137
Abstract
Security experts use their knowledge to attempt attacks on an application in an exploratory and opportunistic way in a process known as penetration testing. However, building security into a product is the responsibility of the whole team, not just the security experts who are often only involved in the final phases of testing. Through the development of a black box security test plan, software testers who are not necessarily security experts can work proactively with the developers early in the software development lifecycle. The team can then establish how security will be evaluated such that the product can be designed and implemented with security in mind. The goal of this research is to improve the security of applications by introducing a methodology that uses the software system´s requirements specification statements to systematically generate a set of black box security tests. We used our methodology on a public requirements specification to create 137 tests and executed these tests on five electronic health record systems. The tests revealed 253 successful attacks on these five systems, which are used to manage the clinical records for approximately 59 million patients, collectively. If non-expert testers can surface the more common vulnerabilities present in an application, security experts can attempt more devious, novel attacks.
Keywords
formal specification; program testing; security of data; black box security test plan; functional requirements phrase; penetration testing; public requirements specification; requirements specification statement; security test case planning; software development lifecycle; software testing; Buildings; Medical services; Programming; Security; Software; Software engineering; Testing; requirements; security; testing; verification; vulnerabilities;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Engineering (ICSE), 2011 33rd International Conference on
Conference_Location
Honolulu, HI
ISSN
0270-5257
Print_ISBN
978-1-4503-0445-0
Electronic_ISBN
0270-5257
Type
conf
DOI
10.1145/1985793.1986019
Filename
6032612
Link To Document