This is a Demo Server. Data inside this system is only for test purpose.
 

GUI-based testing of boundary overflow vulnerability

Loading...
Publication Logo

Date

2009

Journal Title

Journal ISSN

Volume Title

Publisher

Open Access Color

OpenAIRE Downloads

OpenAIRE Views

Impulse
Average
Influence
Average
Popularity
Average

Research Projects

Journal Issue

Abstract

Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or access to stored data. In order to countermeasure this well-known vulnerability issue, this paper focuses on input validation of graphical user interfaces (GUI). The approach proposed generates test cases for numerical inputs based on GUI specification through decision tables. If boundary overflow error(s) are detected, the source code will be analyzed to localize and correct the encountered error(s) automatically. © 2009 IEEE.

Description

IEEE;IEEE Computer Society

Keywords

[No Keyword Available]

Fields of Science

Citation

4

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
3

Source

Proceedings - International Computer Software and Applications Conference -- 2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009 -- 20 July 2009 through 24 July 2009 -- Seattle, WA -- 78413

Volume

2

Issue

Start Page

End Page

Collections

PlumX Metrics
Citations

CrossRef : 3

Scopus : 4

Captures

Mendeley Readers : 11

Sustainable Development Goals

SDG data could not be loaded because of an error. Please refresh the page or try again later.