摘要
通过动态扫描源代码发现潜在的漏洞,从而在软件发布之前就消除可能存在的漏洞。动态扫描方法采用的是故障注入算法,通过动态的注入方式提高漏洞检查的准确性。
出处
《计算机应用》
CSCD
北大核心
2006年第B06期165-166,170,共3页
journal of Computer Applications
基金
国家863计划资助项目(2003AA146010)
参考文献8
-
1周端,李娜,杨银堂.恶意程序的检测和删除[J].微电子学与计算机,2002,19(1):11-14. 被引量:2
-
2HENZINGER TA,JHALA R,MAJUMDAR R,et al.Thread-modular Abstraction Refinement[A].Proceedings of the 15th International Conference on Computer-Aided Verification(CAV)[C].Lecture Notes in Computer Science,Springer-Verlag,2003.
-
3LIBLIT B,AIKEN A,ZHENG AX,et al.Bug Isolation via Remote Program Sampling[A].Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI 2003)[C].San Diego,California,2003.
-
4COWAN C,PU C,MAIER D,et al.Stackguard:Automatic adaptive detection and prevention of buffer-overflow attacks[A].Proceeding of the Seventh USENIX Security Symposium[C].San Antonio,1998.63-77.
-
5WAGNER D,FOSTER JS,BREWER EA,et al.A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[A].Preceedings of Network and Distributed Systems Security Symposium (NDSS 2000)[C].2000.
-
6LANDWEHR CE,BULL AR,MCDERMOTT JP,et al.A Taxonomy of Computer Program Security Flaws[J].Computing Surveys,1994,26(3):211 -255.
-
7NAZARIO J.Source Code Scanners for Better Code[EB/OL].http://www.linuxjournal.com/article/5673,2002.
-
8VOAS JM,MCGRAW G.Software Fault Injection:Inoculating Programs Against Errors[M].John Wiley and Sons,New York,1998.
二级参考文献4
-
1Shimeall, Timothy J.; McDermott, John J. Software Security in an Internet World: An Executive Summary. IEEE Software, 1999, 16(4).
-
2Shimeall T J. Intelligence Analysis for Intemet Security:Ideas, Barriers and Possibilities, Proceedings of SPIE - The International Society for Optical Engineering, 2001:63 ~74.
-
3Ray Hunt. Internet/intranet Firewall Security- policy, Architecture and Transaction Services [J] . Computer Communication, 1998, 21: 1107 ~ 1123.
-
4Matthew Strebe,Charles Perkins.网络安全性,电子工业出版社,1999.1.
同被引文献5
-
1顾勋梅,张永平.基于ASP的安全性研究[J].计算机工程与设计,2004,25(8):1305-1308. 被引量:8
-
2王辉,陈晓平,林邓伟.关于跨站脚本问题的研究[J].计算机工程与设计,2004,25(8):1317-1319. 被引量:3
-
3王子强,刘海燕,李媛州.Unix主机漏洞扫描系统的原理与实现[J].计算机工程与设计,2005,26(2):426-428. 被引量:4
-
4Arbaugh W A,Fithen W L,McHugh J.Windows of vulnerability:A case study analysis[J].IEEE Computer,2000,33(12):52-59.
-
5翟钰,张玉清,武维善,胡建武.系统安全漏洞研究及数据库实现[J].计算机工程,2004,30(8):68-70. 被引量:27
-
1李萌.计算机网络安全漏洞及防范对策[J].智能城市,2016,2(4):100-101. 被引量:8
-
2周恩来.爱国必先合群论[J].党的文献,1988(2):25-26.
-
3张越.似是故人来 Athlon64 X2 5000+[J].个人电脑,2007,13(2):22-22.
-
4安静.3721盈利梦圆何处[J].电子商务,2002,3(4):27-30.
-
5卢小雷.似是故人来 SAMSUNG CLP-310N彩色激光打印机[J].个人电脑,2008,14(12):28-29.
-
6张桃林,胡春.SQL注入的方式与防范策略[J].福建电脑,2010,26(5):85-85. 被引量:1
-
7王绵金,田华,张晋桂.SQL注入攻击原理和防范方法[J].信息与电脑,2016,28(5):182-183. 被引量:1
-
8邓芳.基于网络环境下SQL注入攻击的研究[J].烟台职业学院学报,2012,18(2):54-56. 被引量:1
-
9马桂英,戴玉霞.浅谈计算机病毒及其防范措施[J].民营科技,2011(7):29-29. 被引量:1
-
10张少应,陈庆荣.基于Spring的数据库访问技术研究[J].信息技术,2016,40(10):81-84. 被引量:6