학술논문

Security Threat Identification and Testing
Document Type
Conference
Source
2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST) Software Testing, Verification and Validation (ICST), 2015 IEEE 8th International Conference on. :1-8 Apr, 2015
Subject
Computing and Processing
Protocols
Unified modeling language
Authentication
Testing
Business
Engines
Language
ISSN
2159-4848
Abstract
Business applications are more and more collaborative (cross-domains, cross-devices, service composition). Security shall focus on the overall application scenario including the interplay between its entities/devices/services, not only on the isolated systems within it. In this paper we propose the Security Threat Identification And TEsting (STIATE) toolkit to support development teams toward security assessment of their under-development applications focusing on subtle security logic flaws that may go undetected by using current industrial technology. At design-time, STIATE supports the development teams toward threat modeling and analysis by identifying automatically potential threats (via model checking and mutation techniques) on top of sequence diagrams enriched with security annotations (including WHAT-IF conditions). At run-time, STIATE supports the development teams toward testing by exploiting the identified threats to automatically generate and execute test cases on the up and running application. We demonstrate the usage of the STIATE toolkit on an application scenario employing the SAML Single Sign-On multi-party protocol, a well-known industrial security standard largely studied in previous literature.