Security mutants for property-based testing

Matthias Büchler, Johan Oudinet, Alexander Pretschner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

21 Scopus citations

Abstract

The last decade has witnessed impressive progress in terms of dedicated approaches to formally analyzing security properties of models. However, related approaches to generating tests generally rely on purely syntactic test selection criteria. In this paper, we consider models of protocols and describe an approach to generate tests from security properties. Security-specific mutation operators are defined and used to introduce potential security-specific leaks into the model. Then, if the leak is confirmed by a model analyzer, a test case for the security property is generated. We present examples for security-relevant mutants at the model level and show how they correspond to security-flawed implementations, thus providing evidence that model-level mutants are indeed useful for doing security testing.

Original languageEnglish
Title of host publicationTests and Proofs - 5th International Conference, TAP 2011, Proceedings
Pages69-77
Number of pages9
DOIs
StatePublished - 2011
Externally publishedYes
Event5th International Conference on Tests and Proofs, TAP 2011 - Zurich, Switzerland
Duration: 30 Jun 20111 Jul 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6706 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Tests and Proofs, TAP 2011
Country/TerritorySwitzerland
CityZurich
Period30/06/111/07/11

Keywords

  • Mutation
  • Property-based testing
  • Security protocols
  • Test generation

Fingerprint

Dive into the research topics of 'Security mutants for property-based testing'. Together they form a unique fingerprint.

Cite this