Metamorphic testing for cybersecurity
Metamorphic testing (MT) can enhance security testing by providing an alternative to using a testing oracle, which is often unavailable or impractical. The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that softwa...
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Published: |
Institute of Electrical and Electronics Engineers
2016
|
| Online Access: | https://eprints.nottingham.ac.uk/51788/ |
| _version_ | 1848798575136342016 |
|---|---|
| author | Chen, Tsong Yueh Kuo, Fei-Ching Ma, Wenjuan Susilo, Willy Towey, Dave Voas, Jeffrey Zhou, Zhi Quan |
| author_facet | Chen, Tsong Yueh Kuo, Fei-Ching Ma, Wenjuan Susilo, Willy Towey, Dave Voas, Jeffrey Zhou, Zhi Quan |
| author_sort | Chen, Tsong Yueh |
| building | Nottingham Research Data Repository |
| collection | Online Access |
| description | Metamorphic testing (MT) can enhance security testing by providing an alternative to using a testing oracle, which is often unavailable or impractical. The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that software testing requires diverse perspectives to achieve greater cybersecurity. |
| first_indexed | 2025-11-14T20:21:57Z |
| format | Article |
| id | nottingham-51788 |
| institution | University of Nottingham Malaysia Campus |
| institution_category | Local University |
| last_indexed | 2025-11-14T20:21:57Z |
| publishDate | 2016 |
| publisher | Institute of Electrical and Electronics Engineers |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | nottingham-517882020-05-04T17:48:17Z https://eprints.nottingham.ac.uk/51788/ Metamorphic testing for cybersecurity Chen, Tsong Yueh Kuo, Fei-Ching Ma, Wenjuan Susilo, Willy Towey, Dave Voas, Jeffrey Zhou, Zhi Quan Metamorphic testing (MT) can enhance security testing by providing an alternative to using a testing oracle, which is often unavailable or impractical. The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that software testing requires diverse perspectives to achieve greater cybersecurity. Institute of Electrical and Electronics Engineers 2016-06-01 Article PeerReviewed Chen, Tsong Yueh, Kuo, Fei-Ching, Ma, Wenjuan, Susilo, Willy, Towey, Dave, Voas, Jeffrey and Zhou, Zhi Quan (2016) Metamorphic testing for cybersecurity. Computer, 49 (6). pp. 48-55. ISSN 0018-9162 https://ieeexplore.ieee.org/document/7490306/ doi:10.1109/MC.2016.176 doi:10.1109/MC.2016.176 |
| spellingShingle | Chen, Tsong Yueh Kuo, Fei-Ching Ma, Wenjuan Susilo, Willy Towey, Dave Voas, Jeffrey Zhou, Zhi Quan Metamorphic testing for cybersecurity |
| title | Metamorphic testing for cybersecurity |
| title_full | Metamorphic testing for cybersecurity |
| title_fullStr | Metamorphic testing for cybersecurity |
| title_full_unstemmed | Metamorphic testing for cybersecurity |
| title_short | Metamorphic testing for cybersecurity |
| title_sort | metamorphic testing for cybersecurity |
| url | https://eprints.nottingham.ac.uk/51788/ https://eprints.nottingham.ac.uk/51788/ https://eprints.nottingham.ac.uk/51788/ |