Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/2464
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tuğlular, Tuğkan | - |
dc.contributor.author | Müftüoğlu, Can Arda | - |
dc.contributor.author | Kaya, Özgür | - |
dc.contributor.author | Belli, Fevzi | - |
dc.contributor.author | Linschulte, M. | - |
dc.date.accessioned | 2016-11-17T10:03:34Z | - |
dc.date.available | 2016-11-17T10:03:34Z | - |
dc.date.issued | 2009 | - |
dc.identifier.citation | Tuğlular, T., Müftüoğlu, C. A., Kaya, Ö., Belli, F., and Linschulte, M. (2009, July 20-24). GUI-based testing of boundary overflow vulnerability. Paper presented at the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009. doi:10.1109/COMPSAC.2009.189 | en_US |
dc.identifier.issn | 0730-3157 | - |
dc.identifier.issn | 0730-3157 | - |
dc.identifier.uri | http://doi.org/10.1109/COMPSAC.2009.189 | - |
dc.identifier.uri | http://hdl.handle.net/11147/2464 | - |
dc.description | 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009; Seattle, WA; United States; 20 July 2009 through 24 July 2009 | en_US |
dc.description.abstract | Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or access to stored data. In order to countermeasure this well-known vulnerability issue, this paper focuses on input validation of graphical user interfaces (GUI). The approach proposed generates test cases for numerical inputs based on GUI specification through decision tables. If boundary overflow error(s) are detected, the source code will be analyzed to localize and correct the encountered error(s) automatically. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Graphical user interfaces | en_US |
dc.subject | Input validation | en_US |
dc.subject | Overflow errors | en_US |
dc.subject | Source codes | en_US |
dc.subject | Violation of constraints | en_US |
dc.title | GUI-based testing of boundary overflow vulnerability | en_US |
dc.type | Conference Object | en_US |
dc.authorid | TR114656 | en_US |
dc.institutionauthor | Tuğlular, Tuğkan | - |
dc.institutionauthor | Müftüoğlu, Can Arda | - |
dc.institutionauthor | Kaya, Özgür | - |
dc.institutionauthor | Belli, Fevzi | - |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.volume | 2 | en_US |
dc.identifier.startpage | 539 | en_US |
dc.identifier.endpage | 544 | en_US |
dc.identifier.wos | WOS:000274261400194 | en_US |
dc.identifier.scopus | 2-s2.0-70449638993 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1109/COMPSAC.2009.189 | - |
dc.relation.doi | 10.1109/COMPSAC.2009.189 | en_US |
dc.coverage.doi | 10.1109/COMPSAC.2009.189 | en_US |
dc.identifier.scopusquality | - | - |
item.grantfulltext | open | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.fulltext | With Fulltext | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
4
checked on Mar 29, 2024
Page view(s)
204
checked on Apr 22, 2024
Download(s)
200
checked on Apr 22, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.