Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/2464
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTuğlular, Tuğkan-
dc.contributor.authorMüftüoğlu, Can Arda-
dc.contributor.authorKaya, Özgür-
dc.contributor.authorBelli, Fevzi-
dc.contributor.authorLinschulte, M.-
dc.date.accessioned2016-11-17T10:03:34Z-
dc.date.available2016-11-17T10:03:34Z-
dc.date.issued2009-
dc.identifier.citationTuğlular, T., Müftüoğlu, C. A., Kaya, Ö., Belli, F., and Linschulte, M. (2009, July 20-24). GUI-based testing of boundary overflow vulnerability. Paper presented at the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009. doi:10.1109/COMPSAC.2009.189en_US
dc.identifier.issn0730-3157-
dc.identifier.issn0730-3157-
dc.identifier.urihttp://doi.org/10.1109/COMPSAC.2009.189-
dc.identifier.urihttp://hdl.handle.net/11147/2464-
dc.description33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009; Seattle, WA; United States; 20 July 2009 through 24 July 2009en_US
dc.description.abstractBoundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or access to stored data. In order to countermeasure this well-known vulnerability issue, this paper focuses on input validation of graphical user interfaces (GUI). The approach proposed generates test cases for numerical inputs based on GUI specification through decision tables. If boundary overflow error(s) are detected, the source code will be analyzed to localize and correct the encountered error(s) automatically.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartof33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectGraphical user interfacesen_US
dc.subjectInput validationen_US
dc.subjectOverflow errorsen_US
dc.subjectSource codesen_US
dc.subjectViolation of constraintsen_US
dc.titleGUI-based testing of boundary overflow vulnerabilityen_US
dc.typeConference Objecten_US
dc.authoridTR114656en_US
dc.institutionauthorTuğlular, Tuğkan-
dc.institutionauthorMüftüoğlu, Can Arda-
dc.institutionauthorKaya, Özgür-
dc.institutionauthorBelli, Fevzi-
dc.departmentİzmir Institute of Technology. Computer Engineeringen_US
dc.identifier.volume2en_US
dc.identifier.startpage539en_US
dc.identifier.endpage544en_US
dc.identifier.wosWOS:000274261400194en_US
dc.identifier.scopus2-s2.0-70449638993en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1109/COMPSAC.2009.189-
dc.relation.doi10.1109/COMPSAC.2009.189en_US
dc.coverage.doi10.1109/COMPSAC.2009.189en_US
dc.identifier.scopusquality--
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.languageiso639-1en-
item.fulltextWith Fulltext-
crisitem.author.dept03.04. Department of Computer Engineering-
crisitem.author.dept03.04. Department of Computer Engineering-
Appears in Collections:Computer Engineering / Bilgisayar Mühendisliği
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File Description SizeFormat 
2464.pdfConference Paper465.06 kBAdobe PDFThumbnail
View/Open
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

4
checked on Mar 29, 2024

Page view(s)

204
checked on Apr 22, 2024

Download(s)

200
checked on Apr 22, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.