Publication | Closed Access
An automated approach for identifying potential vulnerabilities in software
85
Citations
7
References
2002
Year
Unknown Venue
Software MaintenanceSoftware Fault InjectionEngineeringInformation SecuritySoftware EngineeringSource Code AnalysisSoftware AnalysisFormal VerificationVulnerability AnalysisVulnerability Assessment (Computing)Software Source CodeSystems EngineeringSystem SecurityComputer ScienceAutomated ApproachSecurity ViolationsSoftware DesignSecurity Testing MethodSoftware SecurityProgram AnalysisSoftware TestingFault AttackFault Injection
The paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injection analysis approach. The work is based on the well understood premise that a large proportion of security violations result from errors in software source code and configuration. The methodology employs software fault injection to force anomalous program states during the execution of software and observes their corresponding effects on system security. If insecure behaviour is detected, the perturbed location that resulted in the violation is isolated for further analysis and possibly retrofitting with fault tolerant mechanisms.
| Year | Citations | |
|---|---|---|
Page 1
Page 1