|
Josip Bozic (Graz University of Technology - Institute of Software Technology, Graz, Austria) |
Lina Marsso (Univ. Grenoble Alpes, Inria, CNRS, Grenoble INP, LIG, 38000 Grenoble, France) |
Radu Mateescu (Univ. Grenoble Alpes, Inria, CNRS, Grenoble INP, LIG, 38000 Grenoble, France) |
Franz Wotawa (Graz University of Technology - Institute of Software Technology, Graz, Austria) |
| Testing of network services represents one of the biggest challenges in cyber security. Because new vulnerabilities are detected on a regular basis, more research is needed. These faults have their roots in the software development cycle or because of intrinsic leaks in the system specification. Conformance testing checks whether a system behaves according to its specification. Here model-based testing provides several methods for automated detection of shortcomings. The formal specification of a system behavior represents the starting point of the testing process. In this paper, a widely used cryptographic protocol is specified and tested for conformance with a test execution framework. The first empirical results are presented and discussed. |
| ArXived at: https://dx.doi.org/10.4204/EPTCS.268.1 | bibtex | |
Comments and questions to:
eptcs@eptcs.org
|
For website issues:
webmaster@eptcs.org
|