Gui-Based Testing of Boundary Overflow Vulnerability
Loading...
Files
Date
2009
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Institute of Electrical and Electronics Engineers Inc.
Open Access Color
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or access to stored data. In order to countermeasure this well-known vulnerability issue, this paper focuses on input validation of graphical user interfaces (GUI). The approach proposed generates test cases for numerical inputs based on GUI specification through decision tables. If boundary overflow error(s) are detected, the source code will be analyzed to localize and correct the encountered error(s) automatically.
Description
33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009; Seattle, WA; United States; 20 July 2009 through 24 July 2009
Keywords
Graphical user interfaces, Input validation, Overflow errors, Source codes, Violation of constraints, Source codes, Violation of constraints, Input validation, Graphical user interfaces, Overflow errors
Fields of Science
0502 economics and business, 05 social sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Citation
Tuğlular, T., Müftüoğlu, C. A., Kaya, Ö., Belli, F., and Linschulte, M. (2009, July 20-24). GUI-based testing of boundary overflow vulnerability. Paper presented at the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009. doi:10.1109/COMPSAC.2009.189
WoS Q
N/A
Scopus Q
Q4

OpenCitations Citation Count
3
Source
33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009
Volume
2
Issue
Start Page
539
End Page
544
PlumX Metrics
Citations
CrossRef : 3
Scopus : 5
Captures
Mendeley Readers : 11
Google Scholar™


