Security Testing Based on Attack Patterns.
Josip BozicFranz WotawaPublished in: ICST Workshops (2014)
Keyphrases
- fault injection
- penetration testing
- security measures
- security vulnerabilities
- pattern mining
- information security
- malicious users
- fault model
- security threats
- security risks
- security policies
- countermeasures
- malicious attacks
- authentication protocol
- key exchange protocol
- cyber attacks
- denial of service attacks
- java card
- encryption algorithm
- security issues
- test cases
- intrusion detection
- security management
- access control
- dos attacks
- cyber security
- security analysis
- network security
- sequential patterns
- authentication mechanism
- buffer overflow