5th International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011; Jeju Island; South Korea; 27 June 2011 through 29 June 2011As part of network security testing an administrator needs to know whether the firewall enforces the security policy as expected or not. In this setting black-box testing and evaluation methodologies can be helpful. In this paper we employ a simple mutation operation namely flipping a bit to generate mutant firewall policies and use them to evaluate our previously proposed weighted test case selection method for firewall testing. In the previously proposed firewall testing approach abstract test cases that are automatically generated from firewall decision diagrams are instantiated b...
ABSTRACT As security requirements of software often change, developers may modify security policies ...
In today's global world, most corporations are bound to have an Internet presence. This phenomenon h...
Negative testing deals with an important problem of assessing a system ability to handle unexpected ...
We propose a combined approach for test case generation to uncover errors both in firewall software ...
Firewall tests have to be performed to verify that the firewall works as specified. In this work, a ...
34th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 201...
Abstract — Firewall development and implementation are constantly being improved to accommodate high...
The implementation of network security devices such as firewalls and IDSs are constantly being impro...
This paper proposes an all encompassing test methodology for firewalls. It extends the life cycle mo...
This paper proposes an all encompassing test methodology for firewalls. It extends the life cycle mo...
Security has become, nowadays, a major concern for the or-ganizations as the majority of its applica...
3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009...
International audienceFirewalls are an important means to secure critical ICT infrastructures. As co...
The empirical assessment of test techniques plays an important role in software testing research. On...
Firewall is a system that secures a network, shielding it from access by unauthorized users. A firew...
ABSTRACT As security requirements of software often change, developers may modify security policies ...
In today's global world, most corporations are bound to have an Internet presence. This phenomenon h...
Negative testing deals with an important problem of assessing a system ability to handle unexpected ...
We propose a combined approach for test case generation to uncover errors both in firewall software ...
Firewall tests have to be performed to verify that the firewall works as specified. In this work, a ...
34th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 201...
Abstract — Firewall development and implementation are constantly being improved to accommodate high...
The implementation of network security devices such as firewalls and IDSs are constantly being impro...
This paper proposes an all encompassing test methodology for firewalls. It extends the life cycle mo...
This paper proposes an all encompassing test methodology for firewalls. It extends the life cycle mo...
Security has become, nowadays, a major concern for the or-ganizations as the majority of its applica...
3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009...
International audienceFirewalls are an important means to secure critical ICT infrastructures. As co...
The empirical assessment of test techniques plays an important role in software testing research. On...
Firewall is a system that secures a network, shielding it from access by unauthorized users. A firew...
ABSTRACT As security requirements of software often change, developers may modify security policies ...
In today's global world, most corporations are bound to have an Internet presence. This phenomenon h...
Negative testing deals with an important problem of assessing a system ability to handle unexpected ...