Did You Remember To Test Your Tokens?
MSR - Technical Paper
Authentication is a critical security feature for confirming the identity of a system’s users, typically implemented with help from frameworks like Spring Security. It’s important to robustly test complex security features, and unit testing is an effective technique for verifying the correctness of the fine-grained behaviors of a feature. Unfortunately, resources to help developers unit test security features are limited. Most guides focus on black box or penetration testing, tests produced by existing test generation tools are difficult to maintain, and recommendation solutions usually focus on prioritization and selection of existing tests. These solutions are not applicable to developers writing new unit tests, or who want to use metrics other than coverage to track what has been tested.
In this paper, we address these issues using a grounded theory-based approach to identify common test cases for token authentication by analyzing 481 JUnit tests exercising Spring Security-based authentication implementations from 53 open source Java projects. The outcome of this study is a unit testing guide organized as a catalog of 52 test cases for token authentication, representing unique combinations of 17 scenarios, 40 conditions, and 30 expected outcomes learned from the data set in our analysis. We supplement the test guide with common test smells to avoid. To verify the accuracy and usefulness of our testing guide, we sought feedback from selected developers, some of whom authored unit tests in our dataset.
Tue 30 JunDisplayed time zone: (UTC) Coordinated Universal Time change
11:00 - 12:00
SecurityData Showcase / Technical Papers at MSR:Zoom2
Chair(s): Dimitris Mitropoulos Athens University of Economics and Business
Q/A & Discussion of Session Papers over Zoom (Joining info available on Slack)
|Did You Remember To Test Your Tokens?MSR - Technical Paper|
Danielle Gonzalez Rochester Institute of Technology, USA, Michael Rath Technische Universität Ilmenau, Mehdi Mirakhorli Rochester Institute of TechnologyDOI Pre-print Media Attached
|Automatically Granted Permissions in Android appsMSR - Technical Paper|
Paolo Calciati IMDEA Software Institute, Konstantin Kuznetsov Saarland University, CISPA, Alessandra Gorla IMDEA Software Institute, Andreas Zeller CISPA Helmholtz Center for Information SecurityMedia Attached
|PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU LearningMSR - Technical Paper|
Triet Le Huynh Minh The University of Adelaide, David Hin , Roland Croft , Muhammad Ali Babar The University of AdelaideDOI Pre-print Media Attached
|A C/C++ Code Vulnerability Dataset with Code Changes and CVE SummariesMSR - Data Showcase|
A: Jiahao Fan New Jersey Institute of Technology, USA, A: Yi Li New Jersey Institute of Technology, USA, A: Shaohua Wang New Jersey Institute of Technology, USA, A: Tien N. Nguyen University of Texas at DallasMedia Attached
|The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSLMSR - Technical Paper|
James Walden Northern Kentucky UniversityPre-print Media Attached