Metamorphic Security Testing for Web Systems
- 1. University of Luxembourg
Description
Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior. In many situations where potential vulnerabilities are tested, a test oracle may not exist, or it might be impractical due to the many inputs for which specific oracles have to be defined. In this paper, we propose a metamorphic testing approach that alleviates the oracle problem in security testing. It enables engineers to specify metamorphic relations (MRs) that capture security properties of the system. Such MRs are then used to automate testing and detect vulnerabilities. We provide a catalog of 22 system-agnostic MRs to automate security testing in Web systems. Our approach targets 39% of the OWASP security testing activities not automated by state-of-the-art techniques. It automatically detected 10 out of 12 vulnerabilities affecting two widely used systems, one commercial and the other open source (Jenkins).
This pakage provides replicability material for the above-mentioned results.
Files
CatologOfMetamorphicRelations.pdf
Files
(12.0 GB)
Name | Size | Download all |
---|---|---|
md5:ecff57a7817ce4a63fb72cd564aecc19
|
166.1 kB | Preview Download |
md5:cd921d8989c81b6642b286591091542f
|
24.1 MB | Preview Download |
md5:df8f72a824b8110bdd491effcfa57fde
|
15.2 MB | Preview Download |
md5:d137d769e004dca108d030d2c5ed715b
|
270.4 MB | Download |
md5:04169561927de52597035078165fa8ce
|
91.5 kB | Preview Download |
md5:ac0e42cbca43e10cfcfb0a583589ce88
|
15.4 MB | Preview Download |
md5:eeb254d80cb12aa3af3ccbcc063da7fd
|
91.7 kB | Preview Download |
md5:73281b0750f0cce48d236ba2a457f53f
|
5.8 GB | Download |
md5:f67ebd658251b9640007538325664abb
|
41.4 kB | Preview Download |
md5:f2a87fef8dc46f454a3c76f8d8f4de19
|
13.8 kB | Download |
md5:44948b9071c21ee38194f0f0d616b65a
|
51.5 kB | Preview Download |
md5:0edb600a2ccdce5ebfed104bd2e71466
|
71.8 kB | Preview Download |
md5:ffaaec9e61412fdff9e15e09b48e7163
|
5.9 GB | Download |
md5:f2a36cab2c287801b9c08a2ea3ff7606
|
183.6 kB | Preview Download |
Additional details
Related works
- Is supplement to
- Conference paper: 10.1109/ICST46399.2020.00028 (DOI)