Skip to main content
Top
Published in: International Journal on Software Tools for Technology Transfer 3/2015

01-06-2015 | ESE

A systematic classification of security regression testing approaches

Authors: Michael Felderer, Elizabeta Fourneret

Published in: International Journal on Software Tools for Technology Transfer | Issue 3/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The openness of modern IT systems and their permanent change make it challenging to keep these systems secure. A combination of regression and security testing called security regression testing, which ensures that changes made to a system do not harm its security, are therefore of high significance and the interest in such approaches has steadily increased. In this article we present a systematic classification of available security regression testing approaches based on a solid study of background and related work to sketch which parts of the research area seem to be well understood and evaluated, and which ones require further research. For this purpose we extract approaches relevant to security regression testing from computer science digital libraries based on a rigorous search and selection strategy. Then, we provide a classification of these according to security regression approach criteria: abstraction level, security issue, regression testing techniques, and tool support, as well as evaluation criteria, for instance evaluated system, maturity of the system, and evaluation measures. From the resulting classification we derive observations with regard to the abstraction level, regression testing techniques, tool support as well as evaluation, and finally identify several potential directions of future research.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lehman, M.: On understanding laws, evolution, and conservation in the large-program lifecycle. J. Syst. Softw. 1, 213–221 (1980) Lehman, M.: On understanding laws, evolution, and conservation in the large-program lifecycle. J. Syst. Softw. 1, 213–221 (1980)
2.
go back to reference Lehman, M.: Software’s future: managing evolution. IEEE Softw. 15(1), 40–44 (1998)CrossRef Lehman, M.: Software’s future: managing evolution. IEEE Softw. 15(1), 40–44 (1998)CrossRef
3.
go back to reference Felderer, M., Katt, B., Kalb, P., Jürjens, J., Ochoa, M., Paci, F., Tran, L.M.S., Tun, T.T., Yskout, K., Scandariato, R., Piessens, F., Vanoverberghe, D., Fourneret, E., Gander, M., Solhaug, B., Breu, R.: Evolution of security engineering artifacts: a state of the art survey. Int. J. Secure Softw. Eng. 5(4), 48–97 (2014) Felderer, M., Katt, B., Kalb, P., Jürjens, J., Ochoa, M., Paci, F., Tran, L.M.S., Tun, T.T., Yskout, K., Scandariato, R., Piessens, F., Vanoverberghe, D., Fourneret, E., Gander, M., Solhaug, B., Breu, R.: Evolution of security engineering artifacts: a state of the art survey. Int. J. Secure Softw. Eng. 5(4), 48–97 (2014)
4.
go back to reference Graves, T.L., Harrold, M.J., Kim, J.M., Porter, A., Rothermel, G.: An empirical study of regression test selection techniques. ACM Trans. Softw. Eng. Methodol. 10(2), 184–208 (2001)CrossRefMATH Graves, T.L., Harrold, M.J., Kim, J.M., Porter, A., Rothermel, G.: An empirical study of regression test selection techniques. ACM Trans. Softw. Eng. Methodol. 10(2), 184–208 (2001)CrossRefMATH
6.
go back to reference Alnatheer, A., Gravell, A.M., Argles, D.: Agile security issues: an empirical study. In: Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. ESEM ’10, pp. 58:1–58:1. New York, NY, USA, ACM (2010) Alnatheer, A., Gravell, A.M., Argles, D.: Agile security issues: an empirical study. In: Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. ESEM ’10, pp. 58:1–58:1. New York, NY, USA, ACM (2010)
7.
go back to reference Kongsli, V.: Towards agile security in web applications. In: Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications. OOPSLA ’06, pp. 805–808. New York, NY, USA, ACM (2006) Kongsli, V.: Towards agile security in web applications. In: Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications. OOPSLA ’06, pp. 805–808. New York, NY, USA, ACM (2006)
8.
go back to reference Rothermel, G., Harrold, M.J.: Analyzing regression test selection techniques. IEEE Trans. Softw. Eng. 22(8), 529–551 (1996)CrossRef Rothermel, G., Harrold, M.J.: Analyzing regression test selection techniques. IEEE Trans. Softw. Eng. 22(8), 529–551 (1996)CrossRef
9.
go back to reference Graves, T.L., Harrold, M.J., Kim, J.M., Porter, A., Rothermel, G.: An empirical study of regression test selection techniques. ACM Trans. Softw. Eng. Methodol. 10, 184–208 (2001)CrossRefMATH Graves, T.L., Harrold, M.J., Kim, J.M., Porter, A., Rothermel, G.: An empirical study of regression test selection techniques. ACM Trans. Softw. Eng. Methodol. 10, 184–208 (2001)CrossRefMATH
10.
go back to reference Fahad, M., Nadeem, A.: A survey of uml based regression testing. In: Intelligent Information Processing IV. Springer pp. 200–210 (2008) Fahad, M., Nadeem, A.: A survey of uml based regression testing. In: Intelligent Information Processing IV. Springer pp. 200–210 (2008)
11.
go back to reference Biswass, S., Mall, R., Satpathy, M., Sukurman, S.: Regression test selection techniques: a survey. Informatica 35(3), 289–321 (2011) Biswass, S., Mall, R., Satpathy, M., Sukurman, S.: Regression test selection techniques: a survey. Informatica 35(3), 289–321 (2011)
12.
go back to reference Yoo, S., Harman, M.: Regression testing minimisation, selection and prioritisation: a survey. Softw. Test. Verif. Reliab. 1(1), 121–141 (2010) Yoo, S., Harman, M.: Regression testing minimisation, selection and prioritisation: a survey. Softw. Test. Verif. Reliab. 1(1), 121–141 (2010)
13.
go back to reference Singh, Y., Kaur, A., Suri, B., Singhal, S.: Systematic literature review on regression test prioritization techniques. Informatica (Slovenia) 36(4), 379–408 (2012) Singh, Y., Kaur, A., Suri, B., Singhal, S.: Systematic literature review on regression test prioritization techniques. Informatica (Slovenia) 36(4), 379–408 (2012)
14.
go back to reference Schieferdecker, I., Grossmann, J., Schneider, M.: Model-based security testing. In: Proceedings 7th Workshop on Model-based testing (2012) Schieferdecker, I., Grossmann, J., Schneider, M.: Model-based security testing. In: Proceedings 7th Workshop on Model-based testing (2012)
15.
go back to reference Ammann, P., Offutt, J.: Introduction to Software Testing. Cambridge University Press, Cambridge (2008)CrossRefMATH Ammann, P., Offutt, J.: Introduction to Software Testing. Cambridge University Press, Cambridge (2008)CrossRefMATH
16.
go back to reference Bourque, P., Dupuis, R. (eds.): Software Engineering Body of Knowledge (SWEBOK). IEEE Computer Society, EUA (2004) Bourque, P., Dupuis, R. (eds.): Software Engineering Body of Knowledge (SWEBOK). IEEE Computer Society, EUA (2004)
17.
go back to reference ISO/IEC: Information technology—open systems interconnection—conformance testing methodology and framework. International ISO/IEC multi-part standard No. 9646 (1994) ISO/IEC: Information technology—open systems interconnection—conformance testing methodology and framework. International ISO/IEC multi-part standard No. 9646 (1994)
18.
go back to reference Xie, Q., Memon, A.M.: Designing and comparing automated test oracles for GUI-based software applications. ACM Trans. Softw. Eng. Methodol. (TOSEM) 16(1), 4 (2007)CrossRef Xie, Q., Memon, A.M.: Designing and comparing automated test oracles for GUI-based software applications. ACM Trans. Softw. Eng. Methodol. (TOSEM) 16(1), 4 (2007)CrossRef
19.
go back to reference Utting, M., Legeard, B.: Practical Model-Based Testing: A Tools Approach. Morgan Kaufmann Publishers Inc., San Francisco (2007) Utting, M., Legeard, B.: Practical Model-Based Testing: A Tools Approach. Morgan Kaufmann Publishers Inc., San Francisco (2007)
20.
go back to reference Zander, J., Schieferdecker, I., Mosterman, P.J.: Model-Based Testing for Embedded Systems. CRC Press, USA (2011) Zander, J., Schieferdecker, I., Mosterman, P.J.: Model-Based Testing for Embedded Systems. CRC Press, USA (2011)
21.
go back to reference IEEE: Standard Glossary of Software Engineering Terminology. IEEE (1990) IEEE: Standard Glossary of Software Engineering Terminology. IEEE (1990)
22.
go back to reference Leung, H.K.N., White, L.: Insights into regression testing (software testing). In: Proceedings Conference on Software Maintenance 1989, pp. 60–69. IEEE (1989) Leung, H.K.N., White, L.: Insights into regression testing (software testing). In: Proceedings Conference on Software Maintenance 1989, pp. 60–69. IEEE (1989)
23.
go back to reference Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: Proceedings of the 2002 conference of the Centre for Advanced Studies on Collaborative research, IBM Press, 1. (2002) Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: Proceedings of the 2002 conference of the Centre for Advanced Studies on Collaborative research, IBM Press, 1. (2002)
24.
go back to reference Frankl, P.G., Rothermel, G., Sayre, K., Vokolos, F.I.: An empirical comparison of two safe regression test selection techniques. In: Proceedings of the 2003 International Symposium on Empirical Software Engineering. ISESE ’03, pp. 195. Washington, DC, USA, IEEE Computer Society (2003) Frankl, P.G., Rothermel, G., Sayre, K., Vokolos, F.I.: An empirical comparison of two safe regression test selection techniques. In: Proceedings of the 2003 International Symposium on Empirical Software Engineering. ISESE ’03, pp. 195. Washington, DC, USA, IEEE Computer Society (2003)
25.
go back to reference Rothermel, G., Harrold, M.J., Dedhia, J.: Regression test selection for c++ software. Softw. Test. Verif. Reliab. 10(2), 77–109 (2000) Rothermel, G., Harrold, M.J., Dedhia, J.: Regression test selection for c++ software. Softw. Test. Verif. Reliab. 10(2), 77–109 (2000)
26.
go back to reference Mansour, N., Statieh, W.: Regression test selection for c# programs. Adv. Soft. Eng. 2009, pp. 1:1–1:16 (2009) Mansour, N., Statieh, W.: Regression test selection for c# programs. Adv. Soft. Eng. 2009, pp. 1:1–1:16 (2009)
27.
go back to reference Harrold, M.J., Jones, J.A., Li, T., Liang, D., Orso, A., Pennings, M., Sinha, S., Spoon, S.A., Gujarathi, A.: Regression test selection for java software. SIGPLAN Not. 36(11), 312–326 (2001)CrossRef Harrold, M.J., Jones, J.A., Li, T., Liang, D., Orso, A., Pennings, M., Sinha, S., Spoon, S.A., Gujarathi, A.: Regression test selection for java software. SIGPLAN Not. 36(11), 312–326 (2001)CrossRef
28.
go back to reference Briand, L., Labiche, Y., He, S.: Automating regression test selection based on uml designs. Inf. Softw. Technol. (Elsevier) 51(1), 16–30 (2009)CrossRef Briand, L., Labiche, Y., He, S.: Automating regression test selection based on uml designs. Inf. Softw. Technol. (Elsevier) 51(1), 16–30 (2009)CrossRef
29.
go back to reference Ural, H., Probert, R.L., Chen, Y.: Model based regression test suite generation using dependence analysis. In: Proceedings of the third international workshop on Advances in model-based testing. pp. 54–62 (2007) Ural, H., Probert, R.L., Chen, Y.: Model based regression test suite generation using dependence analysis. In: Proceedings of the third international workshop on Advances in model-based testing. pp. 54–62 (2007)
30.
go back to reference Fourneret, E., Bouquet, F., Dadeau, F., Debricon, S.: Selective test generation method for evolving critical systems. In: Proceedings of the 2011 IEEE 4th International Conference on Software Testing, Verification and Validation Workshops. ICSTW ’11, pp. 125–134. Washington, DC, USA, IEEE Computer Society (2011) Fourneret, E., Bouquet, F., Dadeau, F., Debricon, S.: Selective test generation method for evolving critical systems. In: Proceedings of the 2011 IEEE 4th International Conference on Software Testing, Verification and Validation Workshops. ICSTW ’11, pp. 125–134. Washington, DC, USA, IEEE Computer Society (2011)
31.
go back to reference Tahat, L.H., Bader, A., Vaysburg, B., Korel, B.: Requirement-based automated black-box test generation. In: Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development. COMPSAC ’01, Washington, DC, USA, IEEE Computer Society pp. 489–495 (2001) Tahat, L.H., Bader, A., Vaysburg, B., Korel, B.: Requirement-based automated black-box test generation. In: Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development. COMPSAC ’01, Washington, DC, USA, IEEE Computer Society pp. 489–495 (2001)
32.
go back to reference Yoo, S., Harman, M.: Pareto efficient multi-objective test case selection. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis. ISSTA ’07, pp. 140–150. New York, NY, USA, ACM (2007) Yoo, S., Harman, M.: Pareto efficient multi-objective test case selection. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis. ISSTA ’07, pp. 140–150. New York, NY, USA, ACM (2007)
33.
go back to reference Kim, J.M., Porter, A.: A history-based test prioritization technique for regression testing in resource constrained environments. In: Proceedings of the 24th International Conference on Software Engineering. ICSE ’02, pp. 119–129. New York, NY, USA, ACM (2002) Kim, J.M., Porter, A.: A history-based test prioritization technique for regression testing in resource constrained environments. In: Proceedings of the 24th International Conference on Software Engineering. ICSE ’02, pp. 119–129. New York, NY, USA, ACM (2002)
34.
go back to reference Fourneret, E., Cantenot, J., Bouquet, F., Legeard, B., Botella, J.: Setgam: Generalized technique for regression testing based on uml/ocl models. In: Software Security and Reliability (SERE), 2014 Eighth International Conference on. pp. 147–156. (2014) Fourneret, E., Cantenot, J., Bouquet, F., Legeard, B., Botella, J.: Setgam: Generalized technique for regression testing based on uml/ocl models. In: Software Security and Reliability (SERE), 2014 Eighth International Conference on. pp. 147–156. (2014)
35.
go back to reference Fischer, K., Raji, F., Chrusckicki, A.: A methodology for retesting modified software. In: National Tele. Conference B-6-3. pp. 1–6 (1981) Fischer, K., Raji, F., Chrusckicki, A.: A methodology for retesting modified software. In: National Tele. Conference B-6-3. pp. 1–6 (1981)
36.
go back to reference J., L., W., S.: Identification of program modifications and its applications in software maintentance. In: Conference on Software Maintenance. pp. 282–290 (1992) J., L., W., S.: Identification of program modifications and its applications in software maintentance. In: Conference on Software Maintenance. pp. 282–290 (1992)
37.
go back to reference Rothermel, G., Harrold, M.J.: A safe, efficient regression test selection technique. ACM Trans. Softw. Eng. Methodol. pp. 173–210 (1997) Rothermel, G., Harrold, M.J.: A safe, efficient regression test selection technique. ACM Trans. Softw. Eng. Methodol. pp. 173–210 (1997)
38.
go back to reference Vokolos, F.I., Frankl, P.G.: Empirical evaluation of the textual differencing regression testing technique. In: International Conference on Software Maintenance pp. 44–53 (1998) Vokolos, F.I., Frankl, P.G.: Empirical evaluation of the textual differencing regression testing technique. In: International Conference on Software Maintenance pp. 44–53 (1998)
39.
go back to reference Instruction, C.: 4009 national information assurance glossary, committee on national security systems, May 2003. Formerly NSTISSI 4009 (2003) Instruction, C.: 4009 national information assurance glossary, committee on national security systems, May 2003. Formerly NSTISSI 4009 (2003)
40.
go back to reference Tian-yang, G., Yin-sheng, S., You-yuan, F.: Research on software security testing. World Acad. Sci. Eng. Technol. Issure 69, 647–651 (2010) Tian-yang, G., Yin-sheng, S., You-yuan, F.: Research on software security testing. World Acad. Sci. Eng. Technol. Issure 69, 647–651 (2010)
41.
go back to reference Fink, G., Bishop, M.: Property-based testing: a new approach to testing for assurance. ACM SIGSOFT Softw. Eng. Notes 22, 74–80 (1997)CrossRef Fink, G., Bishop, M.: Property-based testing: a new approach to testing for assurance. ACM SIGSOFT Softw. Eng. Notes 22, 74–80 (1997)CrossRef
42.
go back to reference Arkin, B., Stender, S., McGraw, G.: Software penetration testing. Secur. Priv. IEEE 3(1), 84–87 (2005)CrossRef Arkin, B., Stender, S., McGraw, G.: Software penetration testing. Secur. Priv. IEEE 3(1), 84–87 (2005)CrossRef
43.
go back to reference Potter, B., McGraw, G.: Software security testing. Secur. Priv. IEEE 2(5), 81–85 (2004)CrossRef Potter, B., McGraw, G.: Software security testing. Secur. Priv. IEEE 2(5), 81–85 (2004)CrossRef
44.
go back to reference Botella, J., Legeard, B., Peureux, F., Vernotte, A.: Risk-based vulnerability testing using security test patterns. In: Proceedings of the 6\(^{th}\) International Symposium on Leveraging applications of formal methods, verification and validation (ISoLA’14), Part II. Volume 8803 of LNCS., pp. 337–352. Corfu, Greece, Springer (2014) Botella, J., Legeard, B., Peureux, F., Vernotte, A.: Risk-based vulnerability testing using security test patterns. In: Proceedings of the 6\(^{th}\) International Symposium on Leveraging applications of formal methods, verification and validation (ISoLA’14), Part II. Volume 8803 of LNCS., pp. 337–352. Corfu, Greece, Springer (2014)
45.
go back to reference Felderer, M., Schieferdecker, I.: A taxonomy of risk-based testing. Int. J. Softw. Tools Technol. Transf. 16(5), 559–568 (2014)CrossRef Felderer, M., Schieferdecker, I.: A taxonomy of risk-based testing. Int. J. Softw. Tools Technol. Transf. 16(5), 559–568 (2014)CrossRef
46.
go back to reference Engström, E., Runeson, P., Skoglund, M.: A systematic review on regression test selection techniques. Inf. Softw. Technol. 52(1), 14–30 (2010)CrossRef Engström, E., Runeson, P., Skoglund, M.: A systematic review on regression test selection techniques. Inf. Softw. Technol. 52(1), 14–30 (2010)CrossRef
47.
go back to reference Engström, E., Runeson, P.: A qualitative survey of regression testing practices. In: Product-Focused Software Process Improvement (PROFES 2010). pp. 3–16. Springer (2010) Engström, E., Runeson, P.: A qualitative survey of regression testing practices. In: Product-Focused Software Process Improvement (PROFES 2010). pp. 3–16. Springer (2010)
48.
go back to reference Felderer, M., Agreiter, B., Zech, P., Breu, R.: A classification for model-based security testing. In: The Third International Conference on Advances in system testing and validation lifecycle(VALID 2011). pp. 109–114 (2011) Felderer, M., Agreiter, B., Zech, P., Breu, R.: A classification for model-based security testing. In: The Third International Conference on Advances in system testing and validation lifecycle(VALID 2011). pp. 109–114 (2011)
49.
go back to reference Schieferdecker, I., Grossmann, J., Schneider, M.: Model-based security testing. In: Proceedings 7th Workshop on Model-Based Testing. (2012) Schieferdecker, I., Grossmann, J., Schneider, M.: Model-based security testing. In: Proceedings 7th Workshop on Model-Based Testing. (2012)
50.
go back to reference Pretschner, A., Holling, D., Eschbach, R., Gemmar, M.: A generic fault model for quality assurance. In: Proc. ACM/IEEE 16th Intl. Conf. on Model Driven Engineering Languages and Systems. (2013) Pretschner, A., Holling, D., Eschbach, R., Gemmar, M.: A generic fault model for quality assurance. In: Proc. ACM/IEEE 16th Intl. Conf. on Model Driven Engineering Languages and Systems. (2013)
51.
go back to reference Brereton, P., Kitchenham, B.A., Budgen, D., Turner, M., Khalil, M.: Lessons from applying the systematic literature review process within the software engineering domain. J. Syst. Softw. 80(4), 571–583 (2007)CrossRef Brereton, P., Kitchenham, B.A., Budgen, D., Turner, M., Khalil, M.: Lessons from applying the systematic literature review process within the software engineering domain. J. Syst. Softw. 80(4), 571–583 (2007)CrossRef
52.
go back to reference Petersen, K., Feldt, R., Mujtaba, S., Mattsson, M.: Systematic mapping studies in software engineering. In: 12th International Conference on Evaluation and Assessment in Software Engineering. Vol. 17 (2008) Petersen, K., Feldt, R., Mujtaba, S., Mattsson, M.: Systematic mapping studies in software engineering. In: 12th International Conference on Evaluation and Assessment in Software Engineering. Vol. 17 (2008)
53.
go back to reference Felderer, M., Kalb, P., Agreiter, B., Breu, R., Buyens, K., Farwick, M., Fourneret, E., Gander, M., Hafner, M., Innerhofer-Oberperfler, F., Jurjens, J., Martinelli, F., Ochoa, M., Paci, F., Scandariato, R., Schatz, B., Solhaug, B., Spitz, B., Steffen, M., Tran, T.M.T., Wagner, S., Yskout, K.: Survey on state of the art time awareness and management. Technical report, Deliverable 1.2 of the EternalS coordination action (FP7-247758) (2011) Felderer, M., Kalb, P., Agreiter, B., Breu, R., Buyens, K., Farwick, M., Fourneret, E., Gander, M., Hafner, M., Innerhofer-Oberperfler, F., Jurjens, J., Martinelli, F., Ochoa, M., Paci, F., Scandariato, R., Schatz, B., Solhaug, B., Spitz, B., Steffen, M., Tran, T.M.T., Wagner, S., Yskout, K.: Survey on state of the art time awareness and management. Technical report, Deliverable 1.2 of the EternalS coordination action (FP7-247758) (2011)
54.
go back to reference Qi, D., Roychoudhury, A., Liang, Z., Vaswani, K.: Darwin: An approach for debugging evolving programs. In: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering. ESEC/FSE ’09, pp. 33–42. ACM (2009) Qi, D., Roychoudhury, A., Liang, Z., Vaswani, K.: Darwin: An approach for debugging evolving programs. In: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering. ESEC/FSE ’09, pp. 33–42. ACM (2009)
55.
go back to reference Qi, D., Roychoudhury, A., Liang, Z., Vaswani, K.: Darwin: an approach to debugging evolving programs. ACM Trans. Softw. Eng. Methodol. 21(3), 19:1–19:29 (2012)CrossRef Qi, D., Roychoudhury, A., Liang, Z., Vaswani, K.: Darwin: an approach to debugging evolving programs. ACM Trans. Softw. Eng. Methodol. 21(3), 19:1–19:29 (2012)CrossRef
56.
go back to reference Vetterling, M., Wimmel, G., Wisspeintner, A.: Secure systems development based on the common criteria: The palme project. In: Proceedings of the 10th ACM SIGSOFT Symposium on Foundations of Software Engineering. SIGSOFT ’02/FSE-10, pp. 129–138. ACM (2002) Vetterling, M., Wimmel, G., Wisspeintner, A.: Secure systems development based on the common criteria: The palme project. In: Proceedings of the 10th ACM SIGSOFT Symposium on Foundations of Software Engineering. SIGSOFT ’02/FSE-10, pp. 129–138. ACM (2002)
57.
go back to reference Jaeger, T., Edwards, A., Zhang, X.: Consistency analysis of authorization hook placement in the linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2), 175–205 (2004)CrossRef Jaeger, T., Edwards, A., Zhang, X.: Consistency analysis of authorization hook placement in the linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2), 175–205 (2004)CrossRef
58.
go back to reference Bruno, M., Canfora, G., Penta, M., Esposito, G., Mazza, V.: Using test cases as contract to ensure service compliance across releases. In: Benatallah, B., Casati, F., Traverso, P., (eds) Service-Oriented Computing-ICSOC 2005. Volume 3826 of Lecture Notes in Computer Science. pp. 87–100 (2005) Bruno, M., Canfora, G., Penta, M., Esposito, G., Mazza, V.: Using test cases as contract to ensure service compliance across releases. In: Benatallah, B., Casati, F., Traverso, P., (eds) Service-Oriented Computing-ICSOC 2005. Volume 3826 of Lecture Notes in Computer Science. pp. 87–100 (2005)
59.
go back to reference Tóth, G., Kőszegi, G., Hornák, Z.: Case study: Automated security testing on the trusted computing platform. In: Proceedings of the 1st European Workshop on System Security. EUROSEC ’08, pp. 35–39. ACM (2008) Tóth, G., Kőszegi, G., Hornák, Z.: Case study: Automated security testing on the trusted computing platform. In: Proceedings of the 1st European Workshop on System Security. EUROSEC ’08, pp. 35–39. ACM (2008)
60.
go back to reference He, T., Jing, X., Kunmei, L., Ying, Z.: Research on strong-association rule based web application vulnerability detection. In: Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on. pp. 237–241 (2009) He, T., Jing, X., Kunmei, L., Ying, Z.: Research on strong-association rule based web application vulnerability detection. In: Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on. pp. 237–241 (2009)
61.
go back to reference Huang, C., Sun, J., Wang, X., Si, Y.: Selective regression test for access control system employing rbac. In: Park, J., Chen, H.H., Atiquzzaman, M., Lee, C., Kim, T.h., Yeo, S.S., (eds), Advances in Information Security and Assurance. Volume 5576 of Lecture Notes in Computer Science. pp. 70–79 (2009) Huang, C., Sun, J., Wang, X., Si, Y.: Selective regression test for access control system employing rbac. In: Park, J., Chen, H.H., Atiquzzaman, M., Lee, C., Kim, T.h., Yeo, S.S., (eds), Advances in Information Security and Assurance. Volume 5576 of Lecture Notes in Computer Science. pp. 70–79 (2009)
62.
go back to reference Felderer, M., Agreiter, B., Breu, R.: Evolution of security requirements tests for service-centric systems. In: Engineering Secure Software and Systems: Third International Symposium, ESSoS 2011, pp. 181–194. Springer (2011) Felderer, M., Agreiter, B., Breu, R.: Evolution of security requirements tests for service-centric systems. In: Engineering Secure Software and Systems: Third International Symposium, ESSoS 2011, pp. 181–194. Springer (2011)
63.
go back to reference Garvin, B.J., Cohen, M.B., Dwyer, M.B.: Using feature locality: Can we leverage history to avoid failures during reconfiguration? In: Proceedings of the 8th Workshop on Assurances for Self-adaptive Systems. ASAS ’11, pp. 24–33. ACM (2011) Garvin, B.J., Cohen, M.B., Dwyer, M.B.: Using feature locality: Can we leverage history to avoid failures during reconfiguration? In: Proceedings of the 8th Workshop on Assurances for Self-adaptive Systems. ASAS ’11, pp. 24–33. ACM (2011)
64.
go back to reference Kassab, M., Ormandjieva, O., Daneva, M.: Relational-model based change management for non-functional requirements: Approach and experiment. In: Research Challenges in Information Science (RCIS), 2011 Fifth International Conference on. pp. 1–9 (2011) Kassab, M., Ormandjieva, O., Daneva, M.: Relational-model based change management for non-functional requirements: Approach and experiment. In: Research Challenges in Information Science (RCIS), 2011 Fifth International Conference on. pp. 1–9 (2011)
65.
go back to reference Anisetti, M., Ardagna, C., Damiani, E.: A low-cost security certification scheme for evolving services. In: Web Services (ICWS), 2012 IEEE 19th International Conference on. pp. 122–129 (2012) Anisetti, M., Ardagna, C., Damiani, E.: A low-cost security certification scheme for evolving services. In: Web Services (ICWS), 2012 IEEE 19th International Conference on. pp. 122–129 (2012)
66.
go back to reference Huang, Y.C., Peng, K.L., Huang, C.Y.: A history-based cost-cognizant test case prioritization technique in regression testing. J. Syst. Softw. 85(3), 626–637 (2012). Novel approaches in the design and implementation of systems/software architectureCrossRefMathSciNet Huang, Y.C., Peng, K.L., Huang, C.Y.: A history-based cost-cognizant test case prioritization technique in regression testing. J. Syst. Softw. 85(3), 626–637 (2012). Novel approaches in the design and implementation of systems/software architectureCrossRefMathSciNet
67.
go back to reference Hwang, J., Xie, T., El Kateb, D., Mouelhi, T., Le Traon, Y.: Selection of regression system tests for security policy evolution, ACM Hwang, J., Xie, T., El Kateb, D., Mouelhi, T., Le Traon, Y.: Selection of regression system tests for security policy evolution, ACM
68.
go back to reference Kim, T., Chandra, R., Zeldovich, N.: Efficient patch-based auditing for web application vulnerabilities. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation. OSDI’12, pp. 193–206. USENIX Association (2012) Kim, T., Chandra, R., Zeldovich, N.: Efficient patch-based auditing for web application vulnerabilities. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation. OSDI’12, pp. 193–206. USENIX Association (2012)
69.
go back to reference Yu, Y.T., Lau, M.F.: Fault-based test suite prioritization for specification-based testing. Inf. Softw. Technol. 54(2), 179–202 (2012)CrossRef Yu, Y.T., Lau, M.F.: Fault-based test suite prioritization for specification-based testing. Inf. Softw. Technol. 54(2), 179–202 (2012)CrossRef
70.
go back to reference Viennot, N., Nair, S., Nieh, J.: Transparent mutable replay for multicore debugging and patch validation. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems. ASPLOS ’13, pp. 112–126. ACM (2013) Viennot, N., Nair, S., Nieh, J.: Transparent mutable replay for multicore debugging and patch validation. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems. ASPLOS ’13, pp. 112–126. ACM (2013)
71.
go back to reference Kitchenham, B.A., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. (2007) Kitchenham, B.A., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. (2007)
72.
go back to reference Korel, B., H.Tahat, L., Vaysburg, B.: Model based regression test reduction using dependence analysis. In: IEEE ICSM’02, 10. (2002) Korel, B., H.Tahat, L., Vaysburg, B.: Model based regression test reduction using dependence analysis. In: IEEE ICSM’02, 10. (2002)
73.
go back to reference Zech, P., Felderer, M., Kalb, P., Breu, R.: A generic platform for model-based regression testing. In: Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change. pp. 112–126. Springer (2012) Zech, P., Felderer, M., Kalb, P., Breu, R.: A generic platform for model-based regression testing. In: Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change. pp. 112–126. Springer (2012)
74.
go back to reference Windmüller, S., Neubauer, J., Steffen, B., Howar, F., Bauer, O.: Active continuous quality control. In: Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering, pp. 111–120. ACM (2013) Windmüller, S., Neubauer, J., Steffen, B., Howar, F., Bauer, O.: Active continuous quality control. In: Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering, pp. 111–120. ACM (2013)
75.
go back to reference Di Nardo, D., Alshahwan, N., Briand, L.C., Labiche, Y.: Coverage-based test case prioritisation: An industrial case study. In: ICST. pp. 302–311 (2013) Di Nardo, D., Alshahwan, N., Briand, L.C., Labiche, Y.: Coverage-based test case prioritisation: An industrial case study. In: ICST. pp. 302–311 (2013)
Metadata
Title
A systematic classification of security regression testing approaches
Authors
Michael Felderer
Elizabeta Fourneret
Publication date
01-06-2015
Publisher
Springer Berlin Heidelberg
Published in
International Journal on Software Tools for Technology Transfer / Issue 3/2015
Print ISSN: 1433-2779
Electronic ISSN: 1433-2787
DOI
https://doi.org/10.1007/s10009-015-0365-2

Other articles of this Issue 3/2015

International Journal on Software Tools for Technology Transfer 3/2015 Go to the issue

Premium Partner