Constrained Adversarial Learning and its applicability to Automated Software Testing: a systematic review

03/14/2023
by   João Vitorino, et al.
0

Every novel technology adds hidden vulnerabilities ready to be exploited by a growing number of cyber-attacks. Automated software testing can be a promising solution to quickly analyze thousands of lines of code by generating and slightly modifying function-specific testing data to encounter a multitude of vulnerabilities and attack vectors. This process draws similarities to the constrained adversarial examples generated by adversarial learning methods, so there could be significant benefits to the integration of these methods in automated testing tools. Therefore, this systematic review is focused on the current state-of-the-art of constrained data generation methods applied for adversarial learning and software testing, aiming to guide researchers and developers to enhance testing tools with adversarial learning methods and improve the resilience and robustness of their digital systems. The found constrained data generation applications for adversarial machine learning were systematized, and the advantages and limitations of approaches specific for software testing were thoroughly analyzed, identifying research gaps and opportunities to improve testing tools with adversarial attack methods.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/18/2018

Learning to Repair Software Vulnerabilities with Generative Adversarial Networks

Motivated by the problem of automated repair of software vulnerabilities...
research
07/05/2020

Adversarial Learning in the Cyber Security Domain

In recent years, machine learning algorithms, and more specially, deep l...
research
07/01/2020

Fundamental Limits of Adversarial Learning

Robustness of machine learning methods is essential for modern practical...
research
05/04/2021

A Review on Oracle Issues in Machine Learning

Machine learning contrasts with traditional software development in that...
research
07/04/2022

Hessian-Free Second-Order Adversarial Examples for Adversarial Learning

Recent studies show deep neural networks (DNNs) are extremely vulnerable...
research
12/28/2021

Associative Adversarial Learning Based on Selective Attack

A human's attention can intuitively adapt to corrupted areas of an image...
research
08/01/2023

Artifact: Measuring and Mitigating Gaps in Structural Testing

The artifact used for evaluating the experimental results of Measuring a...

Please sign up or login with your details

Forgot password? Click here to reset