Security Test Cases

2011 ◽  
pp. 197-236
Keyword(s):  
Author(s):  
Mamdouh Alenezi ◽  
Mohammed Akour ◽  
Hamid Abdul Basit

Ensuring the security of the software has raised concerns from the research community which triggered numerous approaches that tend to eliminate it. The process of ensuring the security of software includes the introduction of processes in the Software Development Life Cycle where one of them is testing after the software is developed. Manually testing software for security is a labor-intensive task. Therefore, it is required to automate the process of testing by generating test cases by automated techniques. In this paper, we review various software security test case generation approaches and techniques. We try to explore and classify the most eminent techniques for test case generation. The techniques are summarized and presented briefly to covers all researches work that has been done in the targeted classification. Moreover, this paper aims to depict the sound of security in the current state of the art of test case generation. The findings are summarized and discussed where the opportunities and challenges are revealed narratively. Although the paper intends to provide a comprehensive view of the research in test case generation, there was a noticeable lack in the test case generation from the security perspectives


1994 ◽  
Vol 144 ◽  
pp. 503-505
Author(s):  
R. Erdélyi ◽  
M. Goossens ◽  
S. Poedts

AbstractThe stationary state of resonant absorption of linear, MHD waves in cylindrical magnetic flux tubes is studied in viscous, compressible MHD with a numerical code using finite element discretization. The full viscosity tensor with the five viscosity coefficients as given by Braginskii is included in the analysis. Our computations reproduce the absorption rates obtained by Lou in scalar viscous MHD and Goossens and Poedts in resistive MHD, which guarantee the numerical accuracy of the tensorial viscous MHD code.


2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.


Author(s):  
S.-S. Lee ◽  
J.-S. Seo ◽  
N.-S. Cho ◽  
S. Daniel

Abstract Both photo- and thermal emission analysis techniques are used from the backside of the die colocate defect sites. The technique is important in that process and package technologies have made front-side analysis difficult or impossible. Several test cases are documented. Intensity attenuation through the bulk of the silicon does not compromise the usefulness of the technique in most cases.


Projections ◽  
2020 ◽  
Vol 14 (1) ◽  
pp. 58-74
Author(s):  
Héctor J. Pérez

AbstractThis article explores the use of the plot twist in screen fictions. This is a largely unexplored area, as interest in this phenomenon has largely focused on the so-called “plot twist movie,” which is an older narrative tradition. In order to explain this aesthetic phenomenon, it draws on the model of surprise originally proposed by the cognitive psychologists Wulf Meyer, Rainer Reisenzein, and Achim Schützwohl. Plot twists are characterized by three distinct but intimately intertwined temporal segments and their corresponding functions, which are explained by this model. The objective of this article is to explore how cognitive-emotional interactions shape the aesthetic viewing experience and to identify how that experience relates to shows’ artistic qualities. Game of Thrones (S01 and S03), Homeland (S01), and Westworld (S01) will be used as test cases. In each of the three plot segments, there are specific processes that distinguish the experience of surprise as an aesthetic phenomenon.


Sign in / Sign up

Export Citation Format

Share Document