期刊文献+

一种基于EAI模型的软件安全测试方法 被引量:3

A method of fault injection software testing based on EAI model
下载PDF
导出
摘要 研究了一种用于测试软件安全的基于EAI(Environment Application Interaction Model)模型的软件错误注入测试方法,提出了用包裹函数实现软件错误注入的安全测试方法及实现方法.对四个应用软件进行了实际测试,实验结果表明,该方法是有效的. Software security testing is an important method to assure the security of information.In the Environment Application Interaction Model(EAI Model),a system is composed of an application and its running environment. By injecting faults into the environment,some errors may be triggered,thus the security of the software can be tested.In this paper,we introduce the security testing method of fault injection software testing based on EAI model.We present a security testing method to carry out fault injection based on wrap functions,and use the method to test four kinds of software.The results show that our method is efficient.
作者 曾凡平
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第z1期304-305,316,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
关键词 EAI模型 错误注入 包裹函数 EAI model fault injection wrap functions
  • 相关文献

参考文献4

  • 1虞翊,吴芳美.黑箱条件下的软件测试充分性与揭错能力分析[J].计算机工程,2001,27(6):74-76. 被引量:8
  • 2[3]Du Wenliang,Mathur A P.Testing for software vulnerability using environment perturbation [J].Quality and Reliability Engineering International,2002,18(3):261-272
  • 3[4]Stevens W R.UNIX网络编程[M].施振川译.北京:清华大学出版社,2001.
  • 4[5]http://www.gd-info.com/down/info/139.htm

二级参考文献3

共引文献7

同被引文献27

  • 1司倩然,闫国英.航天测控软件缺陷管理与分析系统设计[J].飞行器测控学报,2010,29(6):54-59. 被引量:4
  • 2单锦辉,姜瑛,孙萍.软件测试研究进展[J].北京大学学报(自然科学版),2005,41(1):134-145. 被引量:138
  • 3Du Wenliang, Mathur A P. Testing for software vul2 nerability using environment perturbation [J]. Quality and Reliability Engineering International, 2002,18 (3) : 261-272
  • 4Kiezales G, Lamping J, Menhdhekar A, et al. Aspect-Oriented Programming [J]//Proceedings of ECOOP'97, Lecture Notes in Computer Science. Vol. 1241, Springer , 1997 : 220-242
  • 5Belblidia N, Debbabi M, Hanna A. AOP Extension for Security Testing of Programs[J] //Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, CCECE' 2006. May 2006:647-650
  • 6Litehfield D,Anley C. The database hacker's handbook [M]. Wiley Publishing Inc, 2005
  • 7Anley C. Advanced SQL injection in SOL server applications [EB/OL]. http://www.creangel, corn/papers/advanced_sql-injection. pdf, An NGS Software Insight Security Research (NISR) Publication, 2002
  • 8AspectJ Web Site. http://www, eclipse, org/aspectj
  • 9Leveson N G. Software safety: why, what, and how[J]. ACM Computing Surveys, 1986,18(2):125-163.
  • 10Ericson C A II. Hazard analysis techniques for system safety[M]. Hoboken:John Wiley &. Sons, Inc. , 2005: 151-277.

引证文献3

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部