Loading...
  • Home
  • Search Results
587-588 of 4327 Papers

MINIMIZATION OF TEST SUITE THROUGH REGRESS ANALYSIS OF REQUIREMENT COVERAGE

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): RAJAT SHEEL JAIN , AMIT GUPTA

Abstract: Requirements are very important features for the designing of any software application. Test suite creation is a big and hectic task for the Software Quality Analyst. We propose to develop a technique for analysis of Covered Requirement and its impact on the designed Test suite. The requirement associated with the test cases accepts specification like execution time, costing for minimization of test suite. The specification analyser compares the information about the techniques like Precision, Efficiency, Inclusiveness and Generality. By reducing the test suite size, we can reduce the execution cost and time, validation and management of the test cases from the suite for future releases of the software and able to maintain the fault detection capability by reusing the refined test cases. The requirement coverage will increase time-effectiveness in sorting the features of the application and reduces the duplicacy. An improved rate of testing activity will provide faster feedback of the

  • Publication Date: 24-Feb-2013
  • DOI: 10.15224/978-981-07-5461-7-10
  • Views: 0
  • Downloads: 0

REVIEW OF MAN-IN-THE-BROWSER ATTACK USING SECURITY ATTACK SCENARIOS

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): ANIL SAINI , MANOJ SINGH GAUR , VIJAYALAKSHMI

Abstract: A Web browser is an important component of every computer system as it provides the interface to the Internet world. Browsers facilitate the web users through online services like e-mail, banking and shopping. The new unforeseen functionalities may be added to the web browsers in the form of extensions. The extensions have access to sensitive browser APIs and untrusted web page content, which may result in browser attack like Man-in-the-Browser attack. The major target of this attack is customers of Internet banking. This paper makes two major contributions. First, it presents the threat model for Man-in-the-Browser (MITB) attack. This model identifies various threats and point of attacks used by MITB attack. The major cause of MITB attack is malicious extensions and vulnerabilities found in benign-but-buggy browser extensions. In our study we find that the current browser security model is not secure enough to protect against MITB attack. Second, this paper presents the possible secur

  • Publication Date: 24-Feb-2013
  • DOI: 10.15224/978-981-07-5461-7-11
  • Views: 0
  • Downloads: 0