Strengthening Web Application Security: A Penetration Regression Test Selection Algorithm for Early Detection of Buffer Overflow Vulnerability

Saved in:
Bibliographic Details
Title: Strengthening Web Application Security: A Penetration Regression Test Selection Algorithm for Early Detection of Buffer Overflow Vulnerability
Authors: Shilpa R. G.
Source: International Journal of Intelligent Systems and Applications in Engineering; Vol. 12 No. 21s (2024); 3073 – 3079
Publisher Information: International Journal of Intelligent Systems and Applications in Engineering, 2024.
Publication Year: 2024
Subject Terms: Branch coverage, Buffer overflow, Code coverage, Penetration testing, Regression testing, Regression test selection, Security testing, Vulnerability
Description: Web applications are prime targets for security breaches, making rigorous regression testing essential to prevent adverse impacts from modifications or enhancements. The aim of regression testing is to ensure that improvements or modifications to a program's functionality do not adversely affect its current operations. Regression testing is essential as it reduces the size of the test suite, thus reducing the time and effort for testing as a system or application is modified. Regression test selection methods are used widely in functional testing but not addressed in context with penetration or security testing. The traditional regression testing techniques and code coverage (branch coverage) based test adequacy measurements, are found to be inadequate. This paper proposes a novel algorithm for penetration regression test selection along with extended branch coverage criteria predominantly focusing on buffer overflow vulnerability. The algorithm is based on the control-flow structure of the program. Additionally this approach provides a systematic method to detect buffer overflow vulnerability in the unit testing phase of early software development life cycle for the practitioners.
Document Type: Article
File Description: application/pdf
Language: English
ISSN: 2147-6799
Access URL: https://www.ijisae.org/index.php/IJISAE/article/view/5963
Rights: CC BY SA
Accession Number: edsair.issn21476799..448cf39306fb6516f2a967b3473f883f
Database: OpenAIRE
Description
Abstract:Web applications are prime targets for security breaches, making rigorous regression testing essential to prevent adverse impacts from modifications or enhancements. The aim of regression testing is to ensure that improvements or modifications to a program's functionality do not adversely affect its current operations. Regression testing is essential as it reduces the size of the test suite, thus reducing the time and effort for testing as a system or application is modified. Regression test selection methods are used widely in functional testing but not addressed in context with penetration or security testing. The traditional regression testing techniques and code coverage (branch coverage) based test adequacy measurements, are found to be inadequate. This paper proposes a novel algorithm for penetration regression test selection along with extended branch coverage criteria predominantly focusing on buffer overflow vulnerability. The algorithm is based on the control-flow structure of the program. Additionally this approach provides a systematic method to detect buffer overflow vulnerability in the unit testing phase of early software development life cycle for the practitioners.
ISSN:21476799