A test methodology in which assessors, typically working under specific constraints, attempt to circumvent or defeat the security features of a system. -NIST.gov