Tyler Westland, Nan Niu, R. Jha, David Kapp, T. Kebede
{"title":"Semi-Automatic Bug Generation Using Test Case Negation","authors":"Tyler Westland, Nan Niu, R. Jha, David Kapp, T. Kebede","doi":"10.1109/CSR51186.2021.9527992","DOIUrl":null,"url":null,"abstract":"This paper considers the threat of a rogue developer introducing a bug in third party software. The threat model is explored by flipping a patch generation system to generate bugs, instead of removing them. The intended effects of the bugs are described with negated test cases, which are automatically chosen through clustering. The system is then applied to seven programs, with a bug being generated in three that would be undetectable by conventional anti-virus software. Identifying potential attack surfaces is key to expanding cyber security research. This work concludes that a concise and non-redundant program is resistant to a patch generation system using line insertion, replacement, or deletion. Further research is proposed to investigate patch generation systems using different transformation operations as well as other test negation methods.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR51186.2021.9527992","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper considers the threat of a rogue developer introducing a bug in third party software. The threat model is explored by flipping a patch generation system to generate bugs, instead of removing them. The intended effects of the bugs are described with negated test cases, which are automatically chosen through clustering. The system is then applied to seven programs, with a bug being generated in three that would be undetectable by conventional anti-virus software. Identifying potential attack surfaces is key to expanding cyber security research. This work concludes that a concise and non-redundant program is resistant to a patch generation system using line insertion, replacement, or deletion. Further research is proposed to investigate patch generation systems using different transformation operations as well as other test negation methods.