Software testing techniques (2nd ed.)
Software testing techniques (2nd ed.)
ASN.1: communication between heterogeneous systems
ASN.1: communication between heterogeneous systems
Fault-oriented Software Robustness Assessment for Multicast Protocols
NCA '03 Proceedings of the Second IEEE International Symposium on Network Computing and Applications
Integrated TCP/IP Protocol Software Testing for Vulnerability Detection
ICCNMC '03 Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing
SCL: a language for security testing of network applications
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
Random testing of formal software models and induced coverage
Proceedings of the 1st international workshop on Random testing
Is adaptive random testing really better than random testing
Proceedings of the 1st international workshop on Random testing
The TXL source transformation language
Science of Computer Programming - The fourth workshop on language descriptions, tools, and applications (LDTA'04)
Lightweight State Based Mutation Testing for Security
TAICPART-MUTATION '07 Proceedings of the Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION
Mutation Testing of Protocol Messages Based on Extended TTCN-3
AINA '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications
Using a model-based test generator to test for standard conformance
IBM Systems Journal
Linguistic security testing for text communication protocols
TAIC PART'10 Proceedings of the 5th international academic and industrial conference on Testing - practice and research techniques
Hi-index | 0.01 |
Security testing of network applications is an essential task that must be carried out prior to the release of software to the market. Since factors such as time-to-market constraints limit the scope or depth of the testing, it is difficult to carry out exhaustive testing prior to the release of the software. As a consequence, flaws may remain undiscovered by the software vendor, which may be discovered by those of malicious intent. In this paper, we report the results of an empirical evaluation of applying a security testing approach and framework, previously tested in an academic setting, to the Distributed Relational Database Architecture (DRDA®) protocol as implemented by the IBM®DB2®Database for Linux®, Unix®, and Windows®product.