Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ RUC. Repositorio da ...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Recolector de Ciencia Abierta, RECOLECTA
Bachelor thesis . 2022
License: CC BY NC ND
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
Recolector de Ciencia Abierta, RECOLECTA
Bachelor thesis . 2022
License: CC BY NC ND
versions View all 5 versions
addClaim

Librería de pruebas de seguridad para programas en Elixir

Authors: Golpe Criado, Antonio Agustín;

Librería de pruebas de seguridad para programas en Elixir

Abstract

[Resumen]: Tradicionalmente, la mayor parte de los esfuerzos relacionados con las pruebas software se vienen dedicando a la validación de requisitos funcionales, en otras palabras, corroborar que se han implementado las funcionalidades (aquello que se ha especificado previamente que deben cumplir nuestras aplicaciones, programas o sistemas). Sin embargo, cada vez se presta más atención (tanto desde el punto de vista académico como profesional) a la validación de requisitos no funcionales. Y, de entre estos, a la validación de características de seguridad, destinada a detectar la presencia de vulnerabilidades de software. En este proyecto se busca la creación de una librería de código abierto que proporcione a la comunidad de desarrollo de Elixir una herramienta capaz de realizar un análisis sobre su código en busca de posibles brechas de seguridad. Para ello, la librería analizará el código proporcionado por el usuario y mediante el uso combinado de pruebas basadas en propiedades y pruebas con inserción de mutantes será capaz de generar una lista con toda la información de las posibles vulnerabilidades que se hayan detectado.

[Abstract]: Traditionally, most of the work related to the software tests are focused on the validation of the functional requirements; in other words, to corroborate that the functionalities were implemented (those specifications that were previously told to accomplish our applications, programs or systems). On the other hand, this focus is being redirected (from the academic and the profesional points of view) to the validation of the non-functional requirements. And, amongst them, to the security characteristics validation, destined to detect the presence of software vulnerabilities. During this project we seek to create an open-code library in order to bring to the Elixir development community, a tool capable of completing a analisis over the code, searching for possible security breaches. To accomplish this task, the library will analyze the code given by the user and combining tests based on properties and others with mutants insertion, it will be able to generate a list with all the information about the possible vulnerabilities detected.

Traballo fin de grao (UDC.FIC). Enxeñaría Informática. Curso 2021/2022

Country
Spain
Related Organizations
Keywords

Requisito no funcional, Elixir, Mix, Árbol de sintaxis abstracta, Vulnerability, Security, Non-functional requirement, Abstract syntax tree, Vulnerabilidad, Seguridad

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green