Glossary of Vulnerability Testing Terminology

Editors: OUSPG crew (OUSPG), Ari Takanen (Codenomicon)

Table Of Contents

ABSTRACT

Several glossaries are available from different fields of expertice on the software engineering and information security. Yet, terminology used in the context of implementation level vulnerabilities has not stabilised. This document collects the relevant definitions from our main areas of interest. Terms are introduced with reference to the source. When multiple sources present the same details on a term, only one is usually noted. An attempt is made to preserve the form of definition used in the original source. The glossary with original wording and reference details has been found useful within the group, thus we are making it publicly available herein. Please do not refer to this glossary, the original source is preferred.

OUSPG Glossary

Abstract Syntax Notation One (ASN.1)

Ad hoc

Ad hoc testing

Ad-lib test

Anomaly

Attack

Attack potential

Audit

Availability

Availability of data

Backus-Naur Form

Basic Encoding Rules (BER)

Black-box testing

Boundary value

Boundary value analysis

Boundary value coverage

Boundary value testing

Branch coverage

Breach

Brute force attack

Buffer overflow

Bug

Certification

Classification

Code coverage

Component

Compromise

Confidentiality

Cost-risk analysis

COTS Software

Coverage

Crash

Debugger

Defect

Denial of Service

Disclosure of information

Dynamic analysis

Error

Error guessing

Error seeding

Evaluation

Exception

Exercised

Exhaustive testing

Exploit

Exploitation (of vulnerability)

External IT entity

Failure

False Negative

False Positive

Fault

Fault injection

Fault Tolerance

Flaw hypothesis methodology

Formal

Formal specification

Format

Glossary

Hacker

Implementation under test, IUT

Implementation vulnerability

Information warfare

Injection vector

Input

Instrument

Instrumentation

Integrity

Interface

Interface testing

Language

Least privilege

Liability

Malicious code, malicious logic, malware

Mutation analysis

Mutation testing

Mutually suspicious

Negative tests

Network protocol stack

Operational testing

Oracle

Path coverage

Penetration

Penetration Testing

Point of Control and Observation, PCO

Precondition

Proprietary

Protection profile

Protocol

Protocol Data Unit, PDU

Regression testing

Reliability

Residual risk

Risk

Risk analysis

Risk assessment

Risk management

Robustness

Safety

Safety-critical software

Security

Security evaluation

Security flaw

Security function

Security measures

Security requirement

Security target

Security testing

Silver bullet

Smart testing

Snake oil

Sneaker

Software reliability

Statement coverage

Static analysis

Stress testing

Structural testing

Subtest

Symbolic execution

Syntax

Syntax testing

System testing

System Under Test, SUT

Target of evaluation, TOE

Taxonomy

Technical attack

Technical vulnerability

Test

Test bed

Test bed configuration

Test case

Test case generator

Test case specification

Test case suite

Test cycle

Test design

Test driver

Test environment

Test execution

Test generator

Test item

Test log

Test plan

Test procedure

Test report

Test result analyzer

Test strategy

Test suite

Tester

Testing

Thrashing

Threat

Threat analysis

Tiger team

Trojan Horse

Underflow

Unit

Validation

Vendor

Vulnerability

Vulnerability analysis

Vulnerability assessment

Vulnerability case

Worm

Other possible sources of terms

These are some works that we should find and look through for checking possibly useful terminology and cross-referencing the terms present.

References

[1]

[2]

[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]

[14]

[15]

[16]

[17]

[18]

[19]

[20]

[21]

[22]

[23]

[24]

[25]

[26]

[27]

[28]

[29]

Other glossaries

These do not contain terms that we were interested in, but might be useful for others.