Tuğlular, TuğkanMüftüoğlu, Can ArdaKaya, ÖzgürBelli, FevziLinschulte, M.2016-11-172016-11-172009Tuğlular, T., Müftüoğlu, C. A., Kaya, Ö., Belli, F., and Linschulte, M. (2009, July 20-24). GUI-based testing of boundary overflow vulnerability. Paper presented at the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009. doi:10.1109/COMPSAC.2009.1890730-31570730-3157http://doi.org/10.1109/COMPSAC.2009.189https://hdl.handle.net/11147/246433rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009; Seattle, WA; United States; 20 July 2009 through 24 July 2009Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or access to stored data. In order to countermeasure this well-known vulnerability issue, this paper focuses on input validation of graphical user interfaces (GUI). The approach proposed generates test cases for numerical inputs based on GUI specification through decision tables. If boundary overflow error(s) are detected, the source code will be analyzed to localize and correct the encountered error(s) automatically.eninfo:eu-repo/semantics/openAccessGraphical user interfacesInput validationOverflow errorsSource codesViolation of constraintsGui-Based Testing of Boundary Overflow VulnerabilityConference Object2-s2.0-7044963899310.1109/COMPSAC.2009.18910.1109/COMPSAC.2009.189