{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T23:40:14Z","timestamp":1739317214113,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044670"},{"type":"electronic","value":"9783642044687"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04468-7_19","type":"book-chapter","created":{"date-parts":[[2009,9,2]],"date-time":"2009-09-02T01:26:35Z","timestamp":1251854795000},"page":"229-242","source":"Crossref","is-referenced-by-count":9,"title":["Towards Model-Based Automatic Testing of Attack Scenarios"],"prefix":"10.1007","author":[{"given":"M.","family":"Zulkernine","sequence":"first","affiliation":[]},{"given":"M. F.","family":"Raihan","sequence":"additional","affiliation":[]},{"given":"M. G.","family":"Uddin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Dalal, S., Jain, A., Karunanithi, N., Leaton, J., Lott, C., Patton, G., Horowitz, B.: Model-based testing in practice. In: Proc. of the Intl. Conf. on Software Engineering, USA, May 1999, pp. 285\u2013294 (1999)","DOI":"10.1145\/302405.302640"},{"issue":"12","key":"19_CR2","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/S0950-5849(00)00125-7","volume":"42","author":"S. Rosaria","year":"2000","unstructured":"Rosaria, S., Robinson, H.: Applying models in your testing process. Information and Software technology\u00a042(12), 815\u2013824 (2000)","journal-title":"Information and Software technology"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Chandramouli, R., Blackburn, M.: Automated testing of security functions using a combined model and interface-driven approach. In: Proc. of the 37th Annual Hawaii International Conference, Hawaii, USA (January 2004)","DOI":"10.1109\/HICSS.2004.1265703"},{"key":"19_CR4","unstructured":"Blackburn, M., Busser, R., Nauman, A., Chandramouli, R.: Model-based approach to security test automation. In: Proc. of the 14th International Software and Internet Quality Week Conference, San Francisco, USA (June 2001)"},{"key":"19_CR5","unstructured":"Chandramouli, R., Blackburn, M.: Security functional testing using an interface-driven model-based test automation approach. In: Proc. of the 18th Computer Security Applications Conference, Las Vegas, USA (December 2002)"},{"key":"19_CR6","first-page":"252","volume-title":"Proc. of the 3rd International Workshop on Formal Approaches to Testing of Software","author":"M. Barnett","year":"2003","unstructured":"Barnett, M., Grieskamp, W., Nachmanson, L., Schulte, W., Tillmann, N., Veanes, M.: Towards a tool environment for model-based testing with AsmL. In: Proc. of the 3rd International Workshop on Formal Approaches to Testing of Software, pp. 252\u2013266. Springer, Heidelberg (2003)"},{"key":"19_CR7","unstructured":"MIT Lincoln Laboratory. DARPA Intrusion Detection Evaluation (2006), http:\/\/www.ll.mit.edu\/ist\/ideval (accessed in April 2006)"},{"issue":"4","key":"19_CR8","first-page":"517","volume":"25","author":"M. Barnett","year":"2001","unstructured":"Barnett, M., Schulte, W.: The ABCs of specification: AsmL, behavior, and components. Informatic (Slovania)\u00a025(4), 517\u2013526 (2001)","journal-title":"Informatic (Slovania)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Raihan, M., Zulkernine, M.: AsmLSec: An extension of abstract state machine language for attack scenario specification. In: Proc. of the 2nd International Conf. on Availability, Reliability and Security, Vienna, Austria (April 2007)","DOI":"10.1109\/ARES.2007.45"},{"issue":"5","key":"19_CR10","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2004.84","volume":"2","author":"B. Potter","year":"2004","unstructured":"Potter, B., McGraw, G.: Software security testing. IEEE Software Security & Privacy Magazine\u00a02(5), 81\u201385 (2004)","journal-title":"IEEE Software Security & Privacy Magazine"},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2005.23","volume":"3","author":"B. Arkin","year":"2005","unstructured":"Arkin, B., Stender, S., McGraw, G.: Software penetration testing. IEEE Software Security & Privacy Magazine\u00a03(1), 84\u201387 (2005)","journal-title":"IEEE Software Security & Privacy Magazine"},{"issue":"3","key":"19_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MSP.2006.64","volume":"4","author":"M. Stytz","year":"2006","unstructured":"Stytz, M., Banks, S.: Dynamic software security testing. IEEE Software Security & Privacy Magazine\u00a04(3), 77\u201379 (2006)","journal-title":"IEEE Software Security & Privacy Magazine"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J.: Sound methods and effective tools for model-based security engineering with UML. In: Proc. of the 27th International Conference on Software Engineering, St. Louis, USA, May 2005, pp. 322\u2013331 (2005)","DOI":"10.1145\/1062455.1062519"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J., Fox, J.: Tools for model-based security engineering. In: Proc. of the 28th international conference on Software engineering, Shanghai, China, May 2006, pp. 819\u2013822 (2006)","DOI":"10.1145\/1134285.1134423"},{"key":"19_CR15","unstructured":"Tal, O., Knight, S., Dean, T.R.: Syntax-based Vulnerabilities Testing of Frame-based Network Protocols. In: Proc. of the 2nd Annual Conference on Privacy, Security and Trust, Fredericton, Canada, October 2004, pp. 155\u2013160 (2004)"},{"key":"19_CR16","unstructured":"Ghosh, A.K., O\u2019Connor, T., McGraw, G.: An automated approach for identifying potential vulnerabilities in software. In: IEEE Symp. on Security and Privacy, USA, pp. 104\u2013114 (1998)"},{"key":"19_CR17","unstructured":"Du, W., Mathur, A.: Testing for software vulnerabilities using environment perturbation. In: Intl. Conf. on Dependable Systems and Networks, New York, USA, June 2000, pp. 603\u2013612 (2000)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Allen, W., Chin, D., Marin, G.: A Model-based Approach to the Security Testing of Network Protocol Implementations. In: Proc. of the 31st IEEE Conference on Local Computer Networks, November 2006, pp. 1008\u20131015 (2006)","DOI":"10.1109\/LCN.2006.322216"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Kosuga, Y., Kono, K., Hanaoka, M., Hishiyama, M., Takahama, Y.: Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. In: Proc. of the 23rd Annual Computer Security Applications Conference, Miami, December 2007, pp. 107\u2013117 (2007)","DOI":"10.1109\/ACSAC.2007.20"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Salas, P., Krishnan, P., Ross, K.J.: Model-Based Security Vulnerability Testing. In: Proc. of Australian Software Engineering Conference, Melbourne, Australia, pp. 284\u2013296 (2007)","DOI":"10.1109\/ASWEC.2007.31"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-36103-0_48","volume-title":"Formal Methods and Software Engineering","author":"G. Wimmel","year":"2002","unstructured":"Wimmel, G., J\u00fcrjens, J.: Specification-based Test Generation for Security-Critical Systems Using Mutations. In: George, C.W., Miao, H. (eds.) ICFEM 2002. LNCS, vol.\u00a02495, pp. 471\u2013482. Springer, Heidelberg (2002)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Jayaram, K.R.: Identifying and Testing for Insecure Paths in Cryptographic Protocol Implementations. In: Proc. of the 30th Annual International Computer Software and Applications Conference, Chicago, USA, September 2006, pp. 368\u2013369 (2006)","DOI":"10.1109\/COMPSAC.2006.133"},{"key":"19_CR23","unstructured":"Aaby, A.: Compiler Construction using Flex and Bison, http:\/\/cs.wwc.edu\/ (Accessed, April 2006)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04468-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T23:11:54Z","timestamp":1739315514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04468-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044670","9783642044687"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04468-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}