A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
On the Effective Use of Security Test Patterns
2012
2012 IEEE Sixth International Conference on Software Security and Reliability
Capturing attacker behavior in a security test plan allows the systematic, repeated assessment of a system's defenses against attacks. To address the lack of security experts capable of developing effective black box security test plans, we have empirically developed an initial set of six black box security test patterns. These patterns capture the expertise involved in creating a black box security test plan in the same way that software design patterns capture design expertise. Security test
doi:10.1109/sere.2012.23
dblp:conf/ssiri/SmithW12
fatcat:npit54fytjhn7npfkvxvhqtdbu