MOBSTECO - Model-Based Security Testing of Clouds
MOBSTECO - Model-Based Security Testing of Clouds
Disciplines
Computer Sciences (100%)
Keywords
-
Model-Based Security Tests,
Model-Based Testing,
Model-Based Security,
Penetration Testing
In recent years Cloud computing became one of the most successful computing paradigms. It changed the way we consume IT by unlocking novel uses of software and hardware resulting in a growing rate of outsourcing IT by hardware and software infrastructures. However, as a recent study of the Ponemon Institute from 2011 shows, security is still a requirement neglected most of the time. This is also confirmed by a 2013 Cloud Security Alliance report, listing the top nine threats to Cloud computing, among them well-known threats like data breaches, account hijacking or insecure application interfaces. This variety of threats results from Cloud computing`s openness and diversity of usage. Thus, security is a core requirement to Cloud services. Besides, assuring the security of a Cloud computing environment is not a onetime task, it is a task to be performed during the complete lifespan of the Cloud. This is motivated by the fact that Clouds undergo daily changes in terms of newly deployed applications and offered services. Tracking such changes at a central point is crucial for assuring security. This tracking of changes is essential for the involved parties, i.e. service providers and service consumers, to accurately test either their cloud infrastructure in case of service providers or their process integration in case of service consumers. Model-based approaches are particularly promising as they are capable of involving different technologies and a high degree of evolution. However, so far, this potential has not been unlocked. Additionally, at the time, due to unspecified negative security requirements of Cloud applications, properly evaluating its security is a precarious task. The core goal of MOBSTECO is to develop a novel security testing method for cloud deployments, applicable to both, cloud customers and cloud service providers. Our approach will be model based to provide as much independence from frequently changing technologies and to support continuous testing. In using models, we also define a central point, where all information concerning the Cloud Under Test coalesces. In addition, MOBSTECO will be risk and knowledge based to address the problem of negative requirements testing. The approach will incorporate automated risk analysis based on a scalable vulnerability knowledge base to prioritize tests and model analysis to guarantee high-quality test models by tool supported reviewing and checking techniques. The high-level system and security models will be transformed into an executable test model that is directly executed and annotated with test results. For generating effective test data we plan to use a custom fuzzer, supporting the generation of different kinds of test data, depending on specific attacks executed within a negative test. MOBSTECO will deliver a generic and systematic risk-driven model-based security testing approach for cloud- based applications configurable via fuzzing and a vulnerability knowledge base employing logic programming.
In recent years Cloud computing became one of the most successful computing paradigms. It changed the way we consume IT by unlocking novel uses of software and hardware resulting in a growing rate of outsourcing IT by hardware and software infrastructures. However, as a recent study of the Ponemon Institute shows, security is still a requirement neglected most of the time. This is also confirmed by the Cloud Security Alliance report, listing the top nine threats to Cloud computing, among them well-known threats like data breaches, account hijacking or insecure application interfaces. This variety of threats results from Cloud computings openness and diversity of usage. Thus, security is a core requirement to Cloud services. Besides, assuring the security of a Cloud computing environment is not a onetime task, it is a task to be performed during the complete lifespan of the Cloud. This is motivated by the fact that Clouds undergo daily changes in terms of newly deployed applications and offered services. Tracking such changes at a central point is crucial for assuring security. This tracking of changes is essential for the involved parties, i.e. service providers and service consumers, to accurately test either their cloud infrastructure in case of service providers or their process integration in case of service consumers. Model- based approaches are particularly promising as they are capable of involving different technologies and a high degree of evolution. However, so far, this potential has not been unlocked. Additionally, at the time, due to unspecified negative security requirements of Cloud applications, properly evaluating its security is a precarious task. The core goal of MOBSTECO was to develop a novel security testing method for cloud deployments, applicable to both, cloud customers and cloud service providers. Our approach is model based to provide as much independence from frequently changing technologies and to support continuous testing. In using models, we also define a central point, where all information concerning the Cloud Under Test coalesces. In addition, MOBSTECO is risk and knowledge based to address the problem of negative requirements testing. The approach incorporates automated risk analysis based on a scalable vulnerability knowledge base to prioritize tests and model analysis to guarantee high-quality test models by tool supported reviewing and checking techniques. The high-level system and security models are transformed into an executable test model that is directly executed and annotated with test results. For generating effective test data we use a custom fuzzer, supporting the generation of different kinds of test data, depending on specific attacks executed within a negative test. MOBSTECO delivers a generic and systematic risk-driven model-based security testing approach for cloud-based applications configurable via fuzzing and a vulnerability knowledge base employing logic programming.
- Universität Innsbruck - 100%
- Alexander Pretschner, Technische Universität München - Germany
- Ketil Stolen, SINTEFF Oslo - Norway
- Janos Sztipanovits, Vanderbilt University - USA
Research Output
- 749 Citations
- 30 Publications
-
2018
Title Comprehensibility of system models during test design: a controlled experiment comparing UML activity diagrams and state machines DOI 10.1007/s11219-018-9407-9 Type Journal Article Author Felderer M Journal Software Quality Journal Pages 125-147 Link Publication -
2017
Title A Lightweight Approach for Estimating Probability in Risk-Based Software Testing DOI 10.1007/978-3-319-57858-3_9 Type Book Chapter Author Ramler R Publisher Springer Nature Pages 115-128 -
2017
Title How is Security Testing Done in Agile Teams? A Cross-Case Analysis of Four Software Teams DOI 10.1007/978-3-319-57633-6_13 Type Book Chapter Author Cruzes D Publisher Springer Nature Pages 201-216 -
2017
Title Knowledge-based security testing of web applications by logic programming DOI 10.1007/s10009-017-0472-3 Type Journal Article Author Zech P Journal International Journal on Software Tools for Technology Transfer Pages 221-246 Link Publication -
2017
Title Evaluation of an Integrated Tool Environment for Experimentation in DSL Engineering DOI 10.1007/978-3-319-71440-0_9 Type Book Chapter Author Häser F Publisher Springer Nature Pages 147-168 -
2018
Title Current State of Research on Continuous Experimentation: A Systematic Mapping Study DOI 10.1109/seaa.2018.00062 Type Conference Proceeding Abstract Author Auer F Pages 335-344 -
2019
Title An analysis and classification of public information security data sources used in research and practice DOI 10.1016/j.cose.2018.12.011 Type Journal Article Author Sauerwein C Journal Computers & Security Pages 140-155 -
2019
Title Exploring Security in Software Architecture and Design DOI 10.4018/978-1-5225-6313-6 Type Book Publisher IGI Global -
2014
Title Software paradigms, assessment types and non-functional requirements in model-based integration testing DOI 10.1145/2601248.2601257 Type Conference Proceeding Abstract Author Häser F Pages 1-10 -
2014
Title A Risk Assessment Framework for Software Testing DOI 10.1007/978-3-662-45231-8_21 Type Book Chapter Author Felderer M Publisher Springer Nature Pages 292-308 -
2015
Title Integrating a Lightweight Risk Assessment Approach into an Industrial Development Process DOI 10.1007/978-3-319-27033-3_13 Type Book Chapter Author Pekar V Publisher Springer Nature Pages 186-198 -
2014
Title Test Process Improvement with Documentation Driven Integration Testing DOI 10.1109/quatic.2014.29 Type Conference Proceeding Abstract Author Häser F Pages 156-161 -
2014
Title Security Test Generation by Answer Set Programming DOI 10.1109/sere.2014.22 Type Conference Proceeding Abstract Author Zech P Pages 88-97 -
2014
Title A multiple case study on risk-based testing in industry DOI 10.1007/s10009-014-0328-z Type Journal Article Author Felderer M Journal International Journal on Software Tools for Technology Transfer Pages 609-625 -
2014
Title A taxonomy of risk-based testing DOI 10.1007/s10009-014-0332-3 Type Journal Article Author Felderer M Journal International Journal on Software Tools for Technology Transfer Pages 559-568 Link Publication -
2014
Title Security Risk Analysis by Logic Programming DOI 10.1007/978-3-319-07076-6_3 Type Book Chapter Author Zech P Publisher Springer Nature Pages 38-48 -
2016
Title Requirements for Integrating Defect Prediction and Risk-based Testing DOI 10.1109/seaa.2016.62 Type Conference Proceeding Abstract Author Ramler R Pages 359-362 -
2016
Title Is business domain language support beneficial for creating test case specifications: A controlled experiment DOI 10.1016/j.infsof.2016.07.001 Type Journal Article Author Häser F Journal Information and Software Technology Pages 52-62 -
2015
Title A process for mastering security evolution in the development lifecycle DOI 10.1007/s10009-015-0371-4 Type Journal Article Author Felderer M Journal International Journal on Software Tools for Technology Transfer Pages 245-250 -
2015
Title Model-based security testing: a taxonomy and systematic classification DOI 10.1002/stvr.1580 Type Journal Article Author Felderer M Journal Software Testing, Verification and Reliability Pages 119-148 -
2016
Title An integrated tool environment for experimentation in domain specific language engineering DOI 10.1145/2915970.2916010 Type Conference Proceeding Abstract Author Häser F Pages 1-5 -
2015
Title Risk orientation in software testing processes of small and medium enterprises: an exploratory and comparative study DOI 10.1007/s11219-015-9289-z Type Journal Article Author Felderer M Journal Software Quality Journal Pages 519-548 -
2015
Title A Bayesian Prediction Model for Risk-Based Test Selection DOI 10.1109/seaa.2015.37 Type Conference Proceeding Abstract Author Adorf H Pages 374-381 -
2015
Title An Exploratory Study on Risk Estimation in Risk-Based Testing Approaches DOI 10.1007/978-3-319-13251-8_3 Type Book Chapter Author Felderer M Publisher Springer Nature Pages 32-43 -
2015
Title Model-based regression testing by OCL DOI 10.1007/s10009-015-0408-8 Type Journal Article Author Zech P Journal International Journal on Software Tools for Technology Transfer Pages 115-131 -
2015
Title A systematic classification of security regression testing approaches DOI 10.1007/s10009-015-0365-2 Type Journal Article Author Felderer M Journal International Journal on Software Tools for Technology Transfer Pages 305-319 -
2015
Title A Process for Risk-Based Test Strategy Development and Its Industrial Evaluation DOI 10.1007/978-3-319-26844-6_26 Type Book Chapter Author Ramler R Publisher Springer Nature Pages 355-371 -
2015
Title Manual test case derivation from UML activity diagrams and state machines: A controlled experiment DOI 10.1016/j.infsof.2014.12.005 Type Journal Article Author Felderer M Journal Information and Software Technology Pages 1-15 -
2013
Title Integrating risk-based testing in industrial test processes DOI 10.1007/s11219-013-9226-y Type Journal Article Author Felderer M Journal Software Quality Journal Pages 543-575 -
2016
Title Chapter One Security Testing A Survey DOI 10.1016/bs.adcom.2015.11.003 Type Book Chapter Author Felderer M Publisher Elsevier Pages 1-51 Link Publication