Motivation and Context. Modern Internet-based services (e.g., home-banking, personal-training, healthcare) are delivered through Web-oriented software systems which run on multiple and different devices including computers, mobile devices, wearable devices, and smart TVs. They manage and exchange users’ personal data such as credit reports, locations, and health status. Therefore, the security of the system and its data are of crucial importance. Unfortunately, from security requirements elicitation to security testing, there are a number of challenges to be addressed to ensure the security of Web-oriented software systems. First, existing practices for capturing security requirements do not rely on templates that ensure the specification ...
Penetration testing is widely used in industry as a test method for web application security assessm...
Automated web application penetration testing has emerged as a trend. The computer was assigned the ...
Web applications are becoming more and more popular in means of modern information interaction, whic...
peer reviewedSecurity testing aims at verifying that the software meets its security properties. In ...
Security testing verifies that the data and the resources of software systems are protected from att...
Software security testing is an important technique for discovering software vulnerabilities that vi...
To facilitate communication among stakeholders, software security requirements are typically written...
Cross-site scripting (XSS) vulnerabilities are specific flaws related to web applications, in which ...
Abstract With the wide use of computer, software is also being used on a large scale and is becoming...
We present a metamorphic testing tool that alleviates the oracle problem in security testing. The to...
This article introduces a new method for knowledge-based security testing by logic programming and t...
Web applications have become integral part of everyday life, as they are used by a huge number of cu...
The goal of security testing is to detect those defects that could be exploited to conduct attacks. ...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
Abstract—Ensuring that a Web-based system respects its security requirements is a critical issue tha...
Penetration testing is widely used in industry as a test method for web application security assessm...
Automated web application penetration testing has emerged as a trend. The computer was assigned the ...
Web applications are becoming more and more popular in means of modern information interaction, whic...
peer reviewedSecurity testing aims at verifying that the software meets its security properties. In ...
Security testing verifies that the data and the resources of software systems are protected from att...
Software security testing is an important technique for discovering software vulnerabilities that vi...
To facilitate communication among stakeholders, software security requirements are typically written...
Cross-site scripting (XSS) vulnerabilities are specific flaws related to web applications, in which ...
Abstract With the wide use of computer, software is also being used on a large scale and is becoming...
We present a metamorphic testing tool that alleviates the oracle problem in security testing. The to...
This article introduces a new method for knowledge-based security testing by logic programming and t...
Web applications have become integral part of everyday life, as they are used by a huge number of cu...
The goal of security testing is to detect those defects that could be exploited to conduct attacks. ...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
Abstract—Ensuring that a Web-based system respects its security requirements is a critical issue tha...
Penetration testing is widely used in industry as a test method for web application security assessm...
Automated web application penetration testing has emerged as a trend. The computer was assigned the ...
Web applications are becoming more and more popular in means of modern information interaction, whic...