• 제목/요약/키워드: security testing

검색결과 374건 처리시간 0.022초

User Interface Design & Evaluation of Mobile Applications

  • Samrgandi, Najwa
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.55-63
    • /
    • 2021
  • The design functionality put forward by mapping the interactiveness of information. The presentation of such information with the user interface model indicates that the guidelines, concepts, and workflows form the deliverables and milestones for achieving a visualized design, therefore forming the right trend is significant to ensure compliance in terms of changing consideration and applying evaluation in the early stages. It is evidenced that prototype design is guided by improvement specifications, includes modes, and variables that increase improvements. The study presents five user interface testing methods. The testing methods are heuristic evaluation, perspective-based user interface testing, cognitive walkthrough, pluralistic walkthrough, and formal usability inspection. It appears that the five testing methods can be combined and matched to produce reasonable results. At last, the study presents different mobile application designs for student projects besides the evaluation of mobile application designs to consider the user needs and usability.

Minimize Web Applications Vulnerabilities through the Early Detection of CRLF Injection

  • Md. Mijanur Rahman;Md. Asibul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.199-202
    • /
    • 2023
  • Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). Email injection, also known as email header injection, is another way that can be used to modify the behavior of emails. The Open Web Application Security Project (OWASP) is an organization that studies vulnerabilities and ranks them based on their level of risk. According to OWASP, CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. Automated testing can help to quickly identify CRLF vulnerabilities, and is particularly useful for companies to test their applications before releasing them. However, CRLF vulnerabilities can also lead to the discovery of other high-risk vulnerabilities, and it fosters a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against known vulnerabilities. Although there has been a significant amount of research on other types of injection attacks, such as Structure Query Language Injection (SQL Injection). There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Security automation is an important issue for companies trying to protect themselves against security threats. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance their security.

Android App Reuse Analysis using the Sequential Hypothesis Testing

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.11-18
    • /
    • 2016
  • Due to open source policy, Android systems are exposed to a variety of security problems. In particular, app reuse attacks are detrimental threat to the Android system security. This is because attacker can create core malign components and quickly generate a bunch of malicious apps by reusing these components. Hence, it is very imperative to discern whether Android apps contain reused components. To meet this need, we propose an Android app reuse analysis technique based on the Sequential Hypothesis Testing. This technique quickly makes a decision with a few number of samples whether a set of Android apps is made through app reuse. We performed experimental study with 6 malicious app groups, 1 google and 1 third-party app group such that each group consists of 100 Android apps. Experimental results demonstrate that our proposed analysis technique efficiently judges Android app groups with reused components.

Analysis of Blockchain Network and Cryptocurrency Safety Issues

  • Taegyu Lee
    • International journal of advanced smart convergence
    • /
    • 제12권3호
    • /
    • pp.40-50
    • /
    • 2023
  • Blockchain is a technology designed to prevent tampering with digital documents or information, safeguarding transaction data and managing it in a structured manner. This proves beneficial in addressing issues of trust and data protection in B2B, B2C, and C2B transactions. Blockchain finds utility not only in financial transactions but also across diverse industrial sectors. This study outlines significant cases and responses that jeopardize the security of blockchain networks and cryptocurrency technology. Additionally, it analyzes safety and risk factors related to blockchain and proposes effective testing methods to preemptively counter these challenges. Furthermore, this study presents key security evaluation metrics for blockchain to ensure a balanced assessment. Additionally, it provides evaluation methods and various test case models for validating the security of blockchain and cryptocurrency transaction services, making them easily applicable to the testing process.

모바일 RFID 미들웨어 품질 평가 모델 (Quality Testing Model of Mobile RFID Middleware)

  • 정혜정
    • 정보학연구
    • /
    • 제10권4호
    • /
    • pp.85-93
    • /
    • 2007
  • RFID applied in many area. I think that RFID enlarge for our life more and more. The application technology of RFID change the Mobile RFID using mobile phone and PDF etc. I think, Mobile RFID enlarge application technology gradually. In this paper, we propose the quality measurement metrics for mobile RFID middleware. I propose the quality testing model for interoperability and security of mobile RFID middleware. We examine the international standard for mobile RFID and software testing. In this paper, I proposed the evaluation model of mobile RFID middleware on the basis of international standard ISO/IEC 9126-2 and ISO/IEC 25000 series.

  • PDF

퍼즈 테스팅을 통한 소프트웨어 회귀 버그 탐색 기법의 동향과 전망 (The Status Quo and Future of Software Regression Bug Discovery via Fuzz Testing)

  • 이광무;이병영
    • 정보보호학회논문지
    • /
    • 제31권5호
    • /
    • pp.911-917
    • /
    • 2021
  • 소프트웨어 패치가 빈번하게 이루어지는 최근의 추세에 따라, 소프트웨어 버그 역시 패치로 인해 유도되는 버그인 회귀 버그의 비중이 점차 증가하는 추세이다. 이에 산업계와 학계에서는 최근 자동 버그 탐지 방법으로 주목받고 있는 퍼즈 테스팅을 도입 및 개량하여 회귀 버그를 사전에 탐지하고자 하는 시도가 점차 활발해지고 있다. 이 논문에서는 회귀 버그 탐지를 위한 퍼즈 테스팅 연구의 현황에 대하여 살펴보고, 현재 기법들에 존재하는 한계를 참고삼아 향후 관련 연구의 방향에 대한 전망을 제시한다.

위협 헌팅 개념 정립 및 방어기법 비교분석에 관한 연구 (A Study on the Establishment of Threat Hunting Concept and Comparative Analysis of Defense Techniques)

  • 류호찬;정익래
    • 정보보호학회논문지
    • /
    • 제31권4호
    • /
    • pp.793-799
    • /
    • 2021
  • 위협 헌팅은 기존 보안 솔루션의 한계를 극복하기 위한 방어 기법이며, 최근 위협 헌팅에 대한 관심이 높아지고 있다. 위협 헌팅은 시스템 내부에 존재하는 위협을 식별 및 제거하는 기법으로 인식되고 있지만 그 정의가 명확하지 않기 때문에 모의 해킹, 침입 탐지, 침해사고 분석 등 다른 용어들과 혼용이 많이 발생하고 있다. 따라서 본 논문에서는 보고서 및 논문에서 발췌한 위협 헌팅의 정의를 비교 분석하여 그 의미를 명확히 하고 방어기법을 비교분석한다.

웹에서의 보안 위협과 시큐리티 스캐닝에 대한 분석 (Analyses of Security Scanning and Security Threat in Web Application Network)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.603-604
    • /
    • 2010
  • In this paper, we analyses a testing methodology that allows for harmless auditing, define three testing modes.heavy, relaxed, and safe modes, and report our results from two experiments. In the first, we compared the coverage and side effects of the three scanning modes using Web applications chosen from the different vulnerable in a previous static verification effort.

  • PDF

오픈 소스 C++에서의 유닛 테스팅 프레임워크에 관한 고찰 (A Study of Unit Testing Frameworks on Open Source C++)

  • 허석렬;손영호
    • 융합보안논문지
    • /
    • 제13권4호
    • /
    • pp.33-39
    • /
    • 2013
  • 소프트웨어 개발을 성공적으로 수행하기 위하여서 유닛 테스팅은 아주 필수 불가결한 요소이다. Python, Java, C# 등의 현대 컴퓨터 개발 언어에서는 유닛 테스팅을 용이하게 하기 위하여 다양한 기능을 제공하고 있다. 하지만, C++ 언어에 있어서는 워낙 많은 프레임워크를 제공하고 있는 관계로, 유닛 테스팅을 위한 프레임워크 선택이 결코 용이하지 않다. 이 논문에서는 C++ 언어에서의 유닛 테스팅을 위한 프레임워크를 집약된 test runner와 분리된 test runner의 두 그룹으로 나눠서 고찰하였다.

간섭계측 합성개구소나 성능 평가를 위한 해상 시험장 선정에 관한 연구 (The Study of Selecting a Test Area for Validating the Proposal Specification of InSAS(Interferometric Synthetic Aperture Sonar))

  • 박요섭;김성현;고지은
    • 한국군사과학기술학회지
    • /
    • 제25권4호
    • /
    • pp.329-338
    • /
    • 2022
  • This paper provides a case study of development testing and evaluation of design goal of Interferometric SAS (Synthetic Aperture Sonar) system that is developing supported by Civil-Military Technology Cooperation Center in offshore fields. For Deep water operating capabilities evaluation, We have surveyed candidate field, bathymetric mapping and target identification over 200 m depth, East Sea. In testing phase, We have provided environmental information of testing field include water column, seabed and weather condition in real time. And to compare excellency of developing InSAS, we have gather commercial imaging sonar system data with same target. This case study will support the Test Readiness Review of future underwater surveillance system developing via investigate marine testing field environment, testing facilities and planning.