Results 11 to 20 of about 1,298,703 (336)
Enterprise environment modeling for penetration testing on the OpenStack virtualization platform
The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal ...
Vincent Karovic +3 more
doaj +1 more source
Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models
Smart production ecosystems are a valuable target for attackers. In particular, due to the high level of connectivity introduced by Industry 4.0, attackers can potentially attack individual components of production systems from the outside.
Anne Borcherding +2 more
doaj +1 more source
A methodology for testing virtualisation security [PDF]
There is a growing interest in virtualisation due to its central role in cloud computing, virtual desktop environments and Green IT. Data centres and cloud computing utilise this technology to run multiple operating systems on one physical server, thus ...
Coull, Natalie +2 more
core +2 more sources
An Intelligent Fuzzing Data Generation Method Based on Deep Adversarial Learning
Fuzzing (Fuzz testing) can effectively identify security vulnerabilities in software by providing a large amount of unexpected input to the target program. An important part of fuzzing test is the fuzzing data generation.
Zhihui Li +4 more
doaj +1 more source
API Security Testing: The Challenges of Security Testing for Restful APIs
Modern web applications and software systems have shifted to relying on RESTful APIs, which are more susceptible to security threats such as injection attacks, authentication attacks, and data breaches. This article discusses the difficulties of performing security testing on RESTful APIs, such as input validation, authentication, and authorisation. It
Sattam J Alharbi, Tarek Moulahi
openaire +1 more source
ICT Security and Security Testing Aspects [PDF]
This paper provides an overview of the activities of Security & Privacy Working Group (S&P WG) of the Global ICT Standardisation Forum of India (GISFI). Today telecommunications has become "the utility" of human society and thus is the life-line for not only citizens of India but also for the economy.
Anand Raghawa Prasad, Mayur Dave
openaire +2 more sources
Security Aspect in Software Testing Perspective: A Systematic Literature Review
Background: Software testing and software security have become one of the most important parts of an application. Many studies have explored each of these topics but there is a gap wherein the relation of software security and software testing in general
Halim Wildan Awalurahman +3 more
doaj +1 more source
Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary [PDF]
We study the information-theoretic model of stegosystem with an active adversary, where unlike a passive adversary he can not only read but also write. The legitimate sender as well as the adversary can embed or not a message in the sending data.
Mariam Haroutunian +2 more
doaj +3 more sources
The Impact of IPv6 on Penetration Testing [PDF]
In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6.
Boer, Pieter-Tjerk de +3 more
core +3 more sources
Extending MUD Profiles Through an Automated IoT Security Testing Methodology
Defining the intended behaviour of IoT devices is considered as a key aspect to detect and mitigate potential security attacks. In this direction, the Manufacturer Usage Description (MUD) has been recently standardised to reduce the attack surface of a ...
Sara Nieves Matheu +3 more
doaj +1 more source

