Vulnerability Coverage as an Adequacy Testing Criterion

06/14/2020
by   Shuvalaxmi Dass, et al.
0

Mainstream software applications and tools are the configurable platforms with an enormous number of parameters along with their values. Certain settings and possible interactions between these parameters may harden (or soften) the security and robustness of these applications against some known vulnerabilities. However, the large number of vulnerabilities reported and associated with these tools make the exhaustive testing of these tools infeasible against these vulnerabilities infeasible. As an instance of general software testing problem, the research question to address is whether the system under test is robust and secure against these vulnerabilities. This paper introduces the idea of “vulnerability coverage,” a concept to adequately test a given application for a certain classes of vulnerabilities, as reported by the National Vulnerability Database (NVD). The deriving idea is to utilize the Common Vulnerability Scoring System (CVSS) as a means to measure the fitness of test inputs generated by evolutionary algorithms and then through pattern matching identify vulnerabilities that match the generated vulnerability vectors and then test the system under test for those identified vulnerabilities. We report the performance of two evolutionary algorithms (i.e., Genetic Algorithms and Particle Swarm Optimization) in generating the vulnerability pattern vectors.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/14/2020

Vulnerability Coverage for Secure Configuration

We present a novel idea on adequacy testing called “vulnerability covera...
research
06/30/2020

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

The existence of a security vulnerability in a system does not necessari...
research
11/26/2020

Why Charles Can Pen-test: an Evolutionary Approach to Vulnerability Testing

Discovering vulnerabilities in applications of real-world complexity is ...
research
09/27/2022

Family-Based Fingerprint Analysis: A Position Paper

Thousands of vulnerabilities are reported on a monthly basis to security...
research
05/14/2023

NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time Profiling

The effectiveness and efficiency of 5G software stack vulnerability and ...
research
06/01/2017

Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing

Taint-style vulnerabilities comprise a majority of fuzzer discovered pro...
research
09/16/2022

Web Application Weakness Ontology Based on Vulnerability Data

Web applications are becoming more ubiquitous. All manner of physical de...

Please sign up or login with your details

Forgot password? Click here to reset