ture it may the helpful to have time limit.
Finally, we aim to test the overall approach over
more web applications.
REFERENCES
Acunetix (2017). Advanced penetration testing tools
included. http://www.acunetix.com/vulnerability-
scanner/penetration-testing/. [Accessed on
12/7/2017].
Adamczyk, P., Hafiz, M., and Johnson, R. E. (2007). Orga-
nizing security patterns. IEEE Software, 24:52–60.
Alexander, C. W., Ishikawa, S., Silverstein, M., and Jacob-
son, M. (1977). A Pattern Language: Towns, Build-
ings, Construction. Oxford University Press, New
York, New York, USA, 1 edition.
Anand, P., Ryoo, J., and Kazman, R. (2014). Vulnerability-
based security pattern categorization in search of
missing patterns. In Proceedings of the 2014 Ninth
International Conference on Availability, Reliability
and Security, ARES ’14, pages 476–483, Washington,
DC, USA. IEEE Computer Society.
BeEF (2017). The browser exploitation framework project.
//beefproject.com/. [Accessed on 27/7/2017].
Fernandez, E. B., Washizaki, H., Yoshioka, N., Kubo, A.,
and Fukazawa, Y. (2008). Classifying Security Pat-
terns, pages 342–347. Springer Berlin Heidelberg,
Berlin, Heidelberg.
Fern
´
andez, E. B., Yoshioka, N., Washizaki, H., and Van-
Hilst, M. (2010). Measuring the level of security in-
troduced by security patterns. In ARES 2010, Fifth
International Conference on Availability, Reliability
and Security, 15-18 February 2010, Krakow, Poland,
pages 565–568.
Hafiz, M., Adamczyk, P., and Johnson, R. E. (2012). Grow-
ing a pattern language (for security). In Proceedings
of the ACM International Symposium on New Ideas,
New Paradigms, and Reflections on Programming and
Software, Onward! 2012, pages 139–158, New York,
NY, USA. ACM.
Heyman, T., Yskout, K., Scandariato, R., and Joosen, W.
(2007a). An analysis of the security patterns land-
scape. In Third International Workshop on Software
Engineering for Secure Systems, SESS 2007, Min-
neapolis, MN, USA, May 20-26, 2007, page 3.
Heyman, T., Yskout, K., Scandariato, R., and Joosen, W.
(2007b). An analysis of the security patterns land-
scape. In Proceedings of the Third International
Workshop on Software Engineering for Secure Sys-
tems, SESS ’07, pages 3–, Washington, DC, USA.
IEEE Computer Society.
ironwasp (2017). Iron web application advanced secu-
rity testing platform. //ironwasp.org/. [Accessed on
27/7/2017].
Kienzle, D. M., Elder, M. C., D, P., D, P., Tyree,
D., and Edwards-hewitt, J. (2006). Security pat-
terns repository, version 1.0. http://www.scrypt.
net/celer/securitypatterns/repository.pdf. [Accessed
on: 12/7/2017].
Moreira, R., C.R. Paiva, A., and Memon, A. (2013). A
pattern-based approach for gui modeling and test-
ing. In 2013 IEEE 24th International Symposium on
Software Reliability Engineering, ISSRE 2013, pages
288–297.
Moreira, R. M. L. M., Paiva, A. C. R., Nabuco, M., and
Memon, A. (2017). Pattern-based GUI testing: Bridg-
ing the gap between design and quality assurance.
Softw. Test., Verif. Reliab., 27(3).
netsparker (2017). Netsparker web application security
scanner. //www.netsparker.com/. [Accessed on
27/7/2017].
Paiva, A. C. R. and Vilela, L. (2017). Multidimensional test
coverage analysis: PARADIGM-COV tool. Cluster
Computing, 20(1):633–649.
portswigger (2017). Automated crawl and scan. //portswig-
ger.net/burp/. [Accessed on 27/7/2017].
Schieferdecker, I., Grossmann, J., and Schneider, M. A.
(2012). Model-based security testing. In Proceedings
7th Workshop on Model-Based Testing, MBT 2012,
Tallinn, Estonia, 25 March 2012., pages 1–12.
Slavin, R., Shen, H., and Niu, J. (2012). Characteriza-
tions and boundaries of security requirements pat-
terns, pages 48–53.
SPC (2017). Security Pattern Catalog. http://munawarhafiz.
com/securitypatterncatalog/index.php. [Accessed on:
12/7/2017].
sqlmap (2017). Automatic sql injection and database
takeover tool. //sqlmap.org/. [Accessed on
27/7/2017].
sqlninja (2017). A sql server injection and takeover tool.
//sqlninja.sourceforge.net/. [Accessed on 27/7/2017].
Utting, M. and Legeard, B. (2007). Practical Model-Based
Testing: A Tools Approach. Morgan Kaufmann Pub-
lishers Inc., San Francisco, CA, USA.
Vega (2017). vega vulnerability scanner. //sub-
graph.com/vega. [Accessed on 27/7/2017].
w3af (2017). w3af. //w3af.org/. [Accessed on 27/7/2017].
wapiti (2017). Wapiti – the web-application vulnerabil-
ity scanner. //wapiti.sourceforge.net/. [Accessed on
27/7/2017].
Yoder, J. and Barcalow, J. (1998). Architectural patterns for
enabling application security.
ZAP (2017). The owasp zed attack proxy (zap).
//www.zaproxy.org/. [Accessed on 27/7/2017].
Pattern based Web Security Testing
479