An Integrated Algorithm in Component Security Testing

نویسنده

  • Sukhdip Singh
چکیده

Component testing provides easy identification of bugs, threats, defects, vulnerabilities etc. and if component testing is performed beforehand it will be a very big help. But since the component based system are made up of third party components and these third party components are the collection of the specifications or the black box components, therefore the source code is not visible to the developer or the tester. Testing becomes difficult as a result of it. It is at this point that the mutation testing approach and various fault based injection approach comes into picture. When component testing is performed with the help of mutation testing and fault based injection techniques it generates a number of records, details called as monitor logs. These monitor logs are checked for the existence of any insecure or vulnerable component with the help of string searching algorithm. The existing string searching algorithm has results which can be improved hence a new integrated algorithm known as proposed algorithm is proposed. Keywordscomponent testing; vulnerabilities; monitor logs; string searching.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Low Power March Memory Test Algorithm for Static Random Access Memories (TECHNICAL NOTE)

Memories are most important building blocks in many digital systems. As the Integrated Circuits requirements are growing, the test circuitry must grow as well. There is a need for more efficient test techniques with low power and high speed. Many Memory Built in Self-Test techniques have been proposed to test memories. Compared with combinational and sequential circuits memory testing utilizes ...

متن کامل

Embedded Memory Test Strategies and Repair

The demand of self-testing proportionally increases with memory size in System on Chip (SoC). SoC architecture normally occupies the majority of its area by memories. Due to increase in density of embedded memories, there is a need of self-testing mechanism in SoC design. Therefore, this research study focuses on this problem and introduces a smooth solution for self-testing.  In the proposed m...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Modelling of some soil physical quality indicators using hybrid algorithm principal component analysis - artificial neural network

One of the important issues in the analysis of soils is to evaluate their features. In estimation of the hardly available properties, it seems the using of Data mining is appropriate. Therefore, the modelling of some soil quality indicators, using some of the early features of soil which have been proved by some researchers, have been considered. For this purpose, 140 disturbed and 140 undistur...

متن کامل

An Algorithm Based on Theory of Constraints and Branch and Bound for Solving Integrated Product-Mix-Outsourcing Problem

One of the most important decision making problems in many production systems is identification and determination of products and their quantities according to available resources. This problem is called product-mix. However, in the real-world situations, for existing constrained resources, many companies try to provide some products from external resources to achieve more profits. In this pape...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017