Skip to main content

Improving Security Testing with Usage-Based Fuzz Testing

  • Conference paper
  • First Online:
Book cover Risk Assessment and Risk-Driven Testing (RISK 2015)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9488))

Included in the following conference series:

  • 617 Accesses

Abstract

Along with the increasing importance of software systems for our daily life, attacks on these systems may have a critical impact. Since the number of attacks and their effects increases the more systems are connected, the secure operation of IT systems becomes a fundamental property. In the future, this importance will increase, due to the rise of systems that are directly connected to our environment, e.g., cyber-physical systems and the Internet of Things. Therefore, it is inevitable to find and fix security-relevant weaknesses as fast as possible. However, established automated security testing techniques such as fuzzing require significant computational effort. In this paper, we propose an approach to combine security testing with usage-based testing in order to increase the efficiency of security testing. The main idea behind our approach is to utilize that little tested parts of a system have a higher probability of containing security-relevant weaknesses than well tested parts. Since the execution of a system by users can also be to some degree being seen as testing, our approach plans to focus the fuzzing efforts such that little used functionality and/or input data are generated. This way, fuzzing is targeted on weakness-prone areas which in turn should improve the efficiency of the security testing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. I. E. Commission, IEC 61025 fault tree analysis (1990)

    Google Scholar 

  2. IEC 60812 analysis techniques for system reliability-procedure for failure mode and effects analysis (FMEA) (2006)

    Google Scholar 

  3. Schneier, B.: Attack trees. Dr. Dobbs J. 24(12), 21–29 (1999)

    Google Scholar 

  4. Lund, M.S., Solhaug, B., Stølen, K.: The CORAS approach. Springer Science & Business Media, Heidelberg (2010)

    MATH  Google Scholar 

  5. Takanen, A., DeMott, J., Miller, C.: Fuzzing for Software Security Testing and Quality Assurance Ser Artech House Information Security and Privacy Series. Artech House, Boston (2008). http://books.google.de/books?id=tMuAc_y9dFYC

    MATH  Google Scholar 

  6. Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. In: Proceedings of the Workshop of Parallel and Distributed Debugging, Academic Medicine, pp. ix–xxi (1990)

    Google Scholar 

  7. Schneider, M., Großmann, J., Tcholtchev, N., Schieferdecker, I., Pietschker, A.: Behavioral fuzzing operators for UML sequence diagrams. In: Haugen, Ø., Reed, R., Gotzhein, R. (eds.) SAM 2012. LNCS, vol. 7744, pp. 88–104. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. EC FP7 RASEN Project, FP7-316853, 2012–2015. www.rasenproject.eu

  9. Herbold, S.: Usage-based Testing of Event-driven Software. Ph.D. dissertation, Dissertation, Universität Göttingen, June 2012. (electronically published on http://webdoc.sub.gwdg.de/diss/2012/herbold/)

  10. Tonella, P., Ricca, F.: Statistical testing of web applications. J. Softw. Maintenance Evol. Res. Pract. 16(1–2), 103–127 (2004)

    Article  MATH  Google Scholar 

  11. EC FP7 MIDAS Project, FP7-316853, 2012–2015. www.midas-project.eu

  12. Herbold, F.G.S.: Patrick Harms. Autoquest (2014). Accessed on https://autoquest.informatik.uni-goettingen.de/

  13. Schneider, M.: Fuzzino (2013). Accessed on https://github.com/fraunhoferfokus/Fuzzino

Download references

Acknowledgment

This work was partially funded by the EU FP 7 projects MIDAS (no. 318786) and RASEN (no. 316853).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin A. Schneider .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Schneider, M.A., Herbold, S., Wendland, MF., Grabowski, J. (2015). Improving Security Testing with Usage-Based Fuzz Testing. In: Seehusen, F., Felderer, M., Großmann, J., Wendland, MF. (eds) Risk Assessment and Risk-Driven Testing. RISK 2015. Lecture Notes in Computer Science(), vol 9488. Springer, Cham. https://doi.org/10.1007/978-3-319-26416-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26416-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26415-8

  • Online ISBN: 978-3-319-26416-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics