Andrej Pietschker
Giesecke & Devrient
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Andrej Pietschker.
international conference on software testing verification and validation workshops | 2013
Martin A. Schneider; Jürgen Großmann; Ina Schieferdecker; Andrej Pietschker
Fuzz testing or fuzzing is interface robustness testing by stressing the interface of a system under test (SUT) with invalid input data. It aims at finding security-relevant weaknesses in the implementation that may result in a crash of the system-under-test or anomalous behavior. Fuzzing means sending invalid input data to the SUT, the input space is usually huge. This is also true for behavioral fuzzing where invalid message sequences are submitted to the SUT. Because systems are getting more and more complex, testing a single invalid message sequence becomes more and more time consuming due to startup and initialization of the SUT. We present an approach to make the test execution for behavioral fuzz testing more efficient by generating test cases at runtime instead of before execution, focusing on interesting regions of a message sequence based on a previously conducted risk analysis and reducing the test space by integrating already retrieved test results in the test generation process.
system analysis and modeling | 2012
Martin A. Schneider; Jürgen Großmann; Nikolay Tcholtchev; Ina Schieferdecker; Andrej Pietschker
Model-based testing is a recognized method for testing the functionality of a system under test. However, it is not only the functionality of a system that has to be assessed. Also the security aspect has to be tested, especially for systems that provide interfaces to the Internet. In order to find vulnerabilities that could be exploited to break into or to crash a system, fuzzing is an established technique in industry. Model-based fuzzing complements model-based testing of functionality in order to find vulnerabilities by injecting invalid input data into the system. While it focuses on invalid input data, we present a complementary approach called behavioral fuzzing. Behavioral fuzzing does not inject invalid input data but sends an invalid sequence of messages to the system under test. We start with existing UML sequence diagrams --- e.g. functional test cases --- and modify them by applying fuzzing operators in order to generate invalid sequences of messages. We present the identified fuzzing operators and propose a classification for them. A description of a case study from the ITEA-2 research project DIAMONDS as well as preliminary results are presented.
Archive | 2014
Thomas Bauer; Fraunhofer Iese; Michael Felderer; Frederik Seehusen; Sintef Ict; Marc-Florian Wendland; Ruth Breu; Gabriella Carrozza; Jorge Cuellar; Ron Kenett; Bruno Legeard; Peter Liggesmeyer; Andrej Pietschker; Ina Schieferdecker; Bjørnar Solhaug; Ketil Stølen
Archive | 2014
Andrej Pietschker; Alfred Schmidt; Jürgen Dietz; Timo Kühn
Archive | 2014
Andrej Pietschker; Alfred Schmidt; Jürgen Dietz; Timo Kühn
Archive | 2014
Andrej Pietschker; Alfred Schmidt; Jürgen Dietz; Timo Kühn
Archive | 2013
Andrej Pietschker
Archive | 2013
Andrej Pietschker; Alfred Schmidt; Jürgen Dietz; Timo Kühn
Archive | 2013
Andrej Pietschker; Alfred Schmidt; Jürgen Dietz; Timo Kühn
Archive | 2012
Andrej Pietschker