A Rapid Review on Fuzz Security Testing for Software Protocol Implementations.
Alessandro MarchettoPublished in: ICTSS (2023)
Keyphrases
- security protocols
- cryptographic protocols
- software testing
- security analysis
- test cases
- authentication protocol
- security model
- software implementation
- development lifecycle
- software development
- security requirements
- software systems
- mobile payment
- information security
- key agreement protocol
- key exchange protocol
- security properties
- security threats
- access control
- security mechanisms
- secure routing
- secure multiparty computation
- computer systems
- denial of service attacks
- physical layer
- testing process
- key distribution
- network security
- key management
- key establishment
- security vulnerabilities
- security services
- test suite
- security policies
- communication protocols
- mutual authentication
- virtual private network
- iso iec
- homomorphic encryption
- communication protocol
- key agreement
- intrusion detection
- sensitive data
- software architecture
- tcp ip
- provably secure
- application layer
- mobile agent system
- software maintenance
- network layer