Metamorphic testing for cybersecurity

Metamorphic testing (MT) can enhance security testing by providing an alternative to using a testing oracle, which is often unavailable or impractical. The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that softwa...

Full description

Bibliographic Details
Main Authors: Chen, Tsong Yueh, Kuo, Fei-Ching, Ma, Wenjuan, Susilo, Willy, Towey, Dave, Voas, Jeffrey, Zhou, Zhi Quan
Format: Article
Published: Institute of Electrical and Electronics Engineers 2016
Online Access:https://eprints.nottingham.ac.uk/51788/
_version_ 1848798575136342016
author Chen, Tsong Yueh
Kuo, Fei-Ching
Ma, Wenjuan
Susilo, Willy
Towey, Dave
Voas, Jeffrey
Zhou, Zhi Quan
author_facet Chen, Tsong Yueh
Kuo, Fei-Ching
Ma, Wenjuan
Susilo, Willy
Towey, Dave
Voas, Jeffrey
Zhou, Zhi Quan
author_sort Chen, Tsong Yueh
building Nottingham Research Data Repository
collection Online Access
description Metamorphic testing (MT) can enhance security testing by providing an alternative to using a testing oracle, which is often unavailable or impractical. The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that software testing requires diverse perspectives to achieve greater cybersecurity.
first_indexed 2025-11-14T20:21:57Z
format Article
id nottingham-51788
institution University of Nottingham Malaysia Campus
institution_category Local University
last_indexed 2025-11-14T20:21:57Z
publishDate 2016
publisher Institute of Electrical and Electronics Engineers
recordtype eprints
repository_type Digital Repository
spelling nottingham-517882020-05-04T17:48:17Z https://eprints.nottingham.ac.uk/51788/ Metamorphic testing for cybersecurity Chen, Tsong Yueh Kuo, Fei-Ching Ma, Wenjuan Susilo, Willy Towey, Dave Voas, Jeffrey Zhou, Zhi Quan Metamorphic testing (MT) can enhance security testing by providing an alternative to using a testing oracle, which is often unavailable or impractical. The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that software testing requires diverse perspectives to achieve greater cybersecurity. Institute of Electrical and Electronics Engineers 2016-06-01 Article PeerReviewed Chen, Tsong Yueh, Kuo, Fei-Ching, Ma, Wenjuan, Susilo, Willy, Towey, Dave, Voas, Jeffrey and Zhou, Zhi Quan (2016) Metamorphic testing for cybersecurity. Computer, 49 (6). pp. 48-55. ISSN 0018-9162 https://ieeexplore.ieee.org/document/7490306/ doi:10.1109/MC.2016.176 doi:10.1109/MC.2016.176
spellingShingle Chen, Tsong Yueh
Kuo, Fei-Ching
Ma, Wenjuan
Susilo, Willy
Towey, Dave
Voas, Jeffrey
Zhou, Zhi Quan
Metamorphic testing for cybersecurity
title Metamorphic testing for cybersecurity
title_full Metamorphic testing for cybersecurity
title_fullStr Metamorphic testing for cybersecurity
title_full_unstemmed Metamorphic testing for cybersecurity
title_short Metamorphic testing for cybersecurity
title_sort metamorphic testing for cybersecurity
url https://eprints.nottingham.ac.uk/51788/
https://eprints.nottingham.ac.uk/51788/
https://eprints.nottingham.ac.uk/51788/