liver streamlined administration and reporting of all
forms of equity-based compensation plans. The ob-
jective was to evaluate to what extent CORAL helps
security testers in selecting and designing test cases.
In CORAL we select and design test cases based on
risk models produced during security risk assessment.
Our hypothesis was that the produced risk models are
valid, and that the threat scenarios represented by the
risk models are directly testable.
The case study results indicate that CORAL is ef-
fective in terms of producing valid risk models. This
is backed up by two observations. First, we identified
in total 21 risks, and 11 of these risks were considered
as severe, while the remaining 10 risks were consid-
ered as low risks. By testing these 11 risks we identi-
fied 11 vulnerabilities, while by testing the remaining
10 risks we identified only 2 vulnerabilities. Second,
we identified all relevant security risks compared to
previous penetration tests. In addition, we identified
five new security risks and did not leave out any risks
of relevance for the features considered.
The CORAL approach seems to work equally well
for black-box and white-box testing. One point worth
noting for white-box testing is that the threat scenar-
ios help locating risks at the source code level al-
though they are initiated at the application level.
Finally, one of the most important findings we did
in the case study is that the CORAL approach is very
useful for identifying security test cases. We used all
threat scenarios identified in the case study for the
purpose of security test case design and execution.
ACKNOWLEDGEMENTS
This work has been conducted as a part of the
DIAMONDS project (201579/S10) and the AGRA
project (236657) funded by the Research Council of
Norway, as well as the RASEN project (316853)
funded by the European Commission within the 7th
Framework Programme.
REFERENCES
Botella, J., Legeard, B., Peureux, F., and Vernotte, A.
(2014). Risk-Based Vulnerability Testing Using Secu-
rity Test Patterns. In Proc. 6th International Sympo-
sium on Leveraging Applications of Formal Methods,
Verification and Validation (ISoLA’14), pages 337–
352. Springer.
Dias Neto, A., Subramanyan, R., Vieira, M., and Travas-
sos, G. (2007). A Survey on Model-based Testing Ap-
proaches: A Systematic Review. In Proc. 1st ACM
International Workshop on Empirical Assessment of
Software Engineering Languages and Technologies
(WEASELTech’07), pages 31–36. ACM.
Erdogan, G., Li, Y., Runde, R., Seehusen, F., and Stølen,
K. (2014a). Approaches for the Combined Use of
Risk Analysis and Testing: A Systematic Literature
Review. International Journal on Software Tools for
Technology Transfer, 16(5):627–642.
Erdogan, G., Refsdal, A., and Stølen, K. (2014b). A Sys-
tematic Method for Risk-driven Test Case Design Us-
ing Annotated Sequence Diagrams. In Proc. 1st In-
ternational Workshop on Risk Assessment and Risk-
driven Testing (RISK’13), pages 93–108. Springer.
Erdogan, G., Stølen, K., and Aagedal, J. (2015). Evalua-
tion of the CORAL Approach for Risk-Driven Secu-
rity Testing Based on an Industrial Case Study. Tech-
nical Report A27097, SINTEF Information and Com-
munication Technology.
FindBugs (2015). Find Security Bugs V1.2.1.
http://h3xstream.github.io/find-sec-bugs/. Accessed
April 30, 2015.
Großmann, J., Schneider, M., Viehmann, J., and Wendland,
M.-F. (2014). Combining Risk Analysis and Secu-
rity Testing. In Proc. 6th International Symposium
on Leveraging Applications of Formal Methods, Ver-
ification and Validation (ISoLA’14), pages 322–336.
Springer.
LapsePlus (2015). Lapse Plus Console V2.8.1.
https://code.google.com/p/lapse-plus/. Accessed
April 30, 2015.
Lund, M., Solhaug, B., and Stølen, K. (2011). Model-
Driven Risk Analysis: The CORAS Approach.
Springer.
OMG (2011). Unified Modeling Language (UML), super-
structure, version 2.4.1. Object Management Group.
OMG Document Number: formal/2011-08-06.
OMG (2013). UML Testing Profile (UTP), version 1.2. Ob-
ject Management Group. OMG Document Number:
formal/2013-04-03.
OWASP (2015). Open Web Application Security Project.
https://www.owasp.org/index.php/Main
Page. Ac-
cessed April 30, 2015.
Seehusen, F. (2014). A Technique for Risk-Based Test Pro-
cedure Identification, Prioritization and Selection. In
Proc. 6th International Symposium on Leveraging Ap-
plications of Formal Methods, Verification and Valida-
tion (ISoLA’14), pages 277–291. Springer.
VCG (2015). Visual Code Grepper V2.0.0.
http://sourceforge.net/projects/visualcodegrepp/.
Accessed April 30, 2015.
Wendland, M.-F., Kranz, M., and Schieferdecker, I. (2012).
A systematic approach to risk-based testing using
risk-annotated requirements models. In Proc. 7th In-
ternational Conference on Software Engineering Ad-
vances (ICSEA’12), pages 636–642. IARA.
Zech, P., Felderer, M., and Breu, R. (2012). Towards
a Model Based Security Testing Approach of Cloud
Computing Environments. In Proc. 6th International
Conference on Software Security and Reliability Com-
panion (SERE-C’12), pages 47–56. IEEE Computer
Society.