Evolutionary Algorithms for Vulnerability Coverage

Shuvalaxmi Dass, Akbar Siami Namin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

We present a novel idea on adequacy testing called 'vulnerability coverage.' The introduced coverage measure examines the underlying software for the presence of certain classes of vulnerabilities often found in the National Vulnerability Database (NVD) website. The thoroughness of the test input generation procedure is performed through the adaptation of evolutionary algorithms namely Genetic Algorithms (GA) and Particle Swarm Optimization (PSO). The methodology utilizes the Common Vulnerability Scoring System (CVSS), a free and open industry standard for assessing the severity of computer system security vulnerabilities, as a fitness measure for test inputs generation. The outcomes of these evolutionary algorithms are then evaluated in order to identify the vulnerabilities that match a class of vulnerability patterns for testing purposes.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020
EditorsW. K. Chan, Bill Claycomb, Hiroki Takakura, Ji-Jiang Yang, Yuuichi Teranishi, Dave Towey, Sergio Segura, Hossain Shahriar, Sorel Reisman, Sheikh Iqbal Ahamed
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1795-1801
Number of pages7
ISBN (Electronic)9781728173030
DOIs
StatePublished - Jul 2020
Event44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020 - Virtual, Madrid, Spain
Duration: Jul 13 2020Jul 17 2020

Publication series

NameProceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020

Conference

Conference44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020
Country/TerritorySpain
CityVirtual, Madrid
Period07/13/2007/17/20

Keywords

  • Genetic Algorithms
  • Particle Swarm Optimization
  • Software Vulnerability Testing
  • Vulnerability Coverage

Fingerprint

Dive into the research topics of 'Evolutionary Algorithms for Vulnerability Coverage'. Together they form a unique fingerprint.

Cite this