Using Reinforcement Learning for Security Testing: A Systematic Mapping Study

Tanwir Ahmad, Matko Butkovic, Dragos Truscan

Research output: Chapter in Book/Conference proceedingPublished conference proceedingScientificpeer-review

26 Downloads (Pure)

Abstract

Security of software systems has become increasingly important due to the advancement in technology that occurs on a daily basis and due to the interconnectivity that the Internet network system provides. The manual testing process is time-consuming process and inefficient, especially for very large and complex systems. Reinforcement learning has shown promising results in different test generation approaches due to its ability to optimize the test generation process towards relevant parts of the system. A considerable body of work has been developed in recent years to exploit reinforcement learning for security test generation. This study provides a list of approaches and tools for security test generation using Reinforcement Learning (RL). By searching popular research publication databases, a list of 47 relevant studies has been identified and classified according to the type of approach, RL algorithm, application domain and publication metadata.
Original languageEnglish
Title of host publication2025 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
PublisherIEEE
ISBN (Print)979-8-3315-3468-4
DOIs
Publication statusPublished - 16 Apr 2025
MoE publication typeA4 Article in a conference publication
EventIEEE International Conference on Software Testing, Verification and Validation Workshops: ICSTW -
Duration: 31 Mar 2025 → …

Publication series

NameIEEE International Conference on Software Testing, Verification and Validation Workshops
ISSN (Print)2159-4848

Conference

ConferenceIEEE International Conference on Software Testing, Verification and Validation Workshops
Period31/03/25 → …

Fingerprint

Dive into the research topics of 'Using Reinforcement Learning for Security Testing: A Systematic Mapping Study'. Together they form a unique fingerprint.

Cite this