ETSI TR 101 582-2014 Methods for Testing and Specification (MTS) Security Testing Case Study Experiences (V1 1 1)《试验方法和规格 (MTS) 安全性试验 案例研究经验 (V1 1 1)》.pdf
《ETSI TR 101 582-2014 Methods for Testing and Specification (MTS) Security Testing Case Study Experiences (V1 1 1)《试验方法和规格 (MTS) 安全性试验 案例研究经验 (V1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 101 582-2014 Methods for Testing and Specification (MTS) Security Testing Case Study Experiences (V1 1 1)《试验方法和规格 (MTS) 安全性试验 案例研究经验 (V1 1 1)》.pdf(107页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 101 582 V1.1.1 (2014-06) Methods for Testing and Specification (MTS); Security Testing; Case Study Experiences Technical Report ETSI ETSI TR 101 582 V1.1.1 (2014-06) 2Reference DTR/MTS-101582 SecTestCase Keywords analysis, security, testing ETSI 650 Route des Lucioles F-06921 Sophia Antipol
2、is Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org The present document may be made
3、available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the
4、only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and
5、other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or utilized in any f
6、orm or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction i
7、n all media. European Telecommunications Standards Institute 2014. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Org
8、anizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 101 582 V1.1.1 (2014-06) 3Contents Intellectual Property Rights 6g3Foreword . 6g3Modal verbs terminology 6g31 Scope 7g32 References 7g32.1 Normative references . 7g32.2 Informative re
9、ferences 7g33 Definitions and abbreviations . 8g33.1 Definitions 8g33.2 Abbreviations . 9g34 Overview on case studies . 11g35 Banknote processing case study results 11g35.1 Case study characterization 11g35.1.1 Background . 11g35.1.2 System under test 13g35.1.3 Security risk assessment . 14g35.2 Sec
10、urity testing approaches 15g35.2.1 Detection of vulnerability to injection attacks 15g35.2.1.1 Data Fuzzing with TTCN-3. 16g35.2.1.2 TTCN-3 . 17g35.2.1.3 Data Fuzzing Library 18g35.2.2 Usage of unusual behaviour sequences . 19g35.2.2.1 Behavioural fuzzing of UML sequence diagrams . 20g35.2.2.2 Onlin
11、e model-based behavioural fuzzing 22g35.3 Results 23g35.3.1 Requirements coverage . 23g35.3.2 Test results 24g35.4 Summary and conclusion . 25g36 Banking case study results . 25g36.1 Case study characterization 25g36.2 Security testing approaches 26g36.3 Results 29g36.4 Summary and conclusion . 32g3
12、7 Radio case study results . 32g37.1 Case study characterization 32g37.1.1 Context of Mobile ad-hoc networks . 32g37.1.2 Status of the test of security testing at the beginning of the project 33g37.1.3 Security testing capabilities targeted. 33g37.1.3.1 Frames analysis . 34g37.1.3.2 Data alteration
13、. 34g37.1.3.3 Frames replay 35g37.1.3.4 Denial of service . 36g37.1.3.5 Tampering, malicious code injection 36g37.1.3.6 Combination of threats 37g37.1.4 Description of the use-case . 37g37.1.4.1 Specific application used as Use Case 38g37.1.4.2 Specific context of the application of security testing
14、 tools 38g37.1.4.3 Specific context of the initial validation framework . 38g37.2 Security testing approaches 38g37.2.1 General principles of the security testing tools integration . 38g37.2.1.1 Verification framework adaptation . 39g3ETSI ETSI TR 101 582 V1.1.1 (2014-06) 47.2.1.2 Adaptation of the
15、event driven simulation environment . 39g37.2.2 Properties validated. 41g37.2.3 Active testing 41g37.3 Results 42g37.4 Summary and conclusion . 43g38 Automotive case study results 43g38.1 Case study characterization 43g38.2 Security testing approaches 45g38.2.1 Security risk assessment . 45g38.2.2 F
16、uzzing . 46g38.2.3 IOSTS-based passive testing approach . 47g38.2.3.1 Experimentation results . 48g38.2.3.2 Future works . 48g38.2.4 Security monitoring 48g38.2.5 Framework 50g38.3 Results 51g38.4 Summary and conclusion . 53g39 eHealth case study results. 54g39.1 Case study characterization 54g39.1.
17、1 Patient consent 55g39.1.2 Device pairing . 56g39.1.3 New application features 56g39.2 Security testing approaches 56g39.2.1 Formalization 56g39.2.1.1 Entity overview . 56g39.2.1.2 Environment and sessions . 58g39.2.1.3 Messages . 58g39.2.1.4 Goals . 61g39.2.2 Analysis results using a model checker
18、 63g39.2.3 Technical details . 63g39.2.3.1 eHealth web front-end . 64g39.2.3.2 Device management platform . 64g39.2.3.3 Two-factor authentication service . 64g39.2.4 Improvements of the security model . 65g39.2.5 Considered security properties and vulnerabilities . 65g39.2.5.1 Security properties 66
19、g39.2.5.2 Vulnerabilities . 66g39.3 Results by applying the VERA tool . 66g39.3.1 Password brute force . 66g39.3.2 File enumeration . 67g39.3.3 CSRF token checking . 68g39.3.4 SQL injection 69g39.3.5 XSS injection 70g39.3.6 Path traversal attack 70g39.3.7 Access control . 71g39.4 Summary and conclus
20、ion . 73g310 Document management system case study results . 74g310.1 Case study characterization 74g310.2 Security testing approaches 74g310.2.1 Security risk assessment of the Infobase application scenario 74g310.2.1.1 Background . 74g310.2.1.2 Scope and goal of the case study . 75g310.2.1.3 Metho
21、d walk-through 75g310.2.1.3.1 Describe general usage scenarios 75g310.2.1.3.2 List assets 75g310.2.1.3.3 Define security requirements . 75g310.2.1.3.4 Identify relevant threats . 75g310.2.1.3.5 Define or derive a Business Worst Case Scenario (BWCS) 76g310.2.1.3.6 Generate Security Overview 76g310.2.
22、1.3.7 Map BWCS to Technical Threat Scenario (TTS) 76g3ETSI ETSI TR 101 582 V1.1.1 (2014-06) 510.2.1.3.8 Map TTSs to test types 77g310.2.1.4 Lessons learned . 77g310.2.2 Improvements of the security model detecting Cross-Site Request Forgery at ASLan+ level 78g310.2.2.1 Description of CSRF in Infobas
23、e 78g310.2.2.2 Modeling CSRF in ASLan+ 79g310.2.2.2.1 Client . 80g310.2.2.2.2 Server 81g310.2.2.2.3 Goal . 82g310.2.2.3 Result of the analysis of the Infobase model . 82g310.2.3 Mutation-based test generation . 83g310.2.4 Test automation 83g310.2.4.1 The ScenTest tool for scenario-based testing 83g3
24、10.2.4.2 General approach to test automation of AATs 83g310.2.4.3 Derived test case, test execution and test results . 84g310.2.4.3.1 Test scenario 1: 84g310.2.4.3.2 Test scenario 2: 85g310.2.4.3.3 Test Scenario 3: . 86g310.3 Results by applying the VERA Tool 87g310.3.1 Considered vulnerabilities 87
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1015822014METHODSFORTESTINGANDSPECIFICATIONMTSSECURITYTESTINGCASESTUDYEXPERIENCESV111 试验 方法 规格

链接地址:http://www.mydoc123.com/p-735368.html