Mutation Analysis for Security Tests Qualification

  • Authors:
  • Tejeddine Mouelhi;Yves Le Traon;Benoit Baudry

  • Affiliations:
  • GET ENST-Bretagne;GET ENST-Bretagne;IRISA- 35042 Rennes

  • Venue:
  • TAICPART-MUTATION '07 Proceedings of the Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we study how mutation analysis can be adapted to qualify test cases aiming at testing a security policy. The objective is to make test cases efficient to reveal erroneous implementations of a security policy. The notion of security policy testing is studied and mutation operators are defined in relation with the security rules. To make the approach applicable in practice we discus and empirically rank the security mutation operators from the most to the least difficult to kill. The empirical study is a library software, which is implemented with a typical 3-tier architecture.