期刊文献+

软件安全漏洞的静态检测技术 被引量:41

Static Detecting Techniques of Software Security Flaws
下载PDF
导出
摘要 软件安全漏洞问题日益严重,静态漏洞检测提供从软件结构和代码中寻找漏洞的方法。该文研究软件漏洞静态检测的两个主要方面:静态分析和程序验证,重点分析词法分析、规则检查、类型推导、模型检测、定理证明和符号执行等方法,将常用的静态检测工具按方法归类,讨论、总结静态检测技术的优势、适用性和发展趋势。 This paper summarizes two strategies of software security flaw detection,named static analysis and program verification.Several static detection methods such as lexical analysis,rule checking,type theory deduction,model checking,theorem proving,and symbol execution are also synthetically reviewed.It discusses the advantage,applicability and tendency of static detecting techniques.
作者 张林 曾庆凯
出处 《计算机工程》 CAS CSCD 北大核心 2008年第12期157-159,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60473053) 国家“863”计划基金资助项目(2006AA01Z432) 江苏省自然科学基金资助项目(BK2005074)
关键词 软件安全漏洞 静态分析 程序验证 software flaws security static analysis program verification
  • 相关文献

参考文献6

  • 1Weber S, Karger P A, Paradkar A. A Software Flaw Taxonomy: Aiming Tools at Security[C]//Proc. of ACM Software Engineering for Secure Systems Building Trustworthy Applications. Louis, Missouri, USA: [s. n.], 2005.
  • 2Landwehr C E. Formal Models for Computer Security[J]. ACM Computing Surveys, 1981, 13(3): 247-278.
  • 3夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 4Foster J S, Fghndrich M, Aiken A. A Theory of Type Qualifiers[J]. ACM SIGPLAN Notices, 1999, 34(5): 192-203.
  • 5Kurshan R P. Program Verification[J]. Notices of the American Mathematical Society, 2000, 47(5): 534-545.
  • 6Wagner D. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[C]//Proc. of the 7th Network and Distributed System Security Symposium. San Diego, USA,: [S. l.], 2000.

二级参考文献22

  • 1Mitchell J C.Programming language methods in computer security.ACM POPL,UK,2001
  • 2Cousot P,Cousot R.Abstract interpretation:a unified lattice model for static analysis of programs by construction or approximation of fixpoints.ACM POPL,USA,1977
  • 3Rice H G.Classes of Recursively Enumerable Sets and their Decision Problems.Transactions of the American Mathematical Society,1953(89):25~29
  • 4Foster J S,Fahndrich M,Aiken A.A theory of type qualifiers.ACM PLDI,USA,1999
  • 5Shankar U,Talwar K,Foster J S,et al.Detecting format string vulnerabilities with type qualifiers.USENIX Security Symposium,USA,2001
  • 6Zhang Xiaolan,Edwards Antony,Jaeger T.Using CQUAL for static analysis of authorization hook.USENIX Security Symposium,USA,2002
  • 7Johnson R,Wagner D.Finding user/kernel pointer bugs with type inference.USENIX Security Symposium,2004
  • 8Aho A V,Sethi R,Ullman J D.Compilers principles,techniques and tools.编译原理.李建中,姜守旭译.北京:机械工业出版社,2003
  • 9Larochelle D.Statically detecting likely buffer overflow vulnerabilities.USENIX Security Symposium,USA,2001
  • 10Xie Yichen,Chou Andy,Engler D.ARCHER:Using Symbolic,Path-sensitive Analysis to Detect Memory Access Errors.ESEC/FSE'03,Helsinki,Finland,September 2003

共引文献28

同被引文献170

引证文献41

二级引证文献123

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部