期刊文献+

软件安全静态检测技术与工具 被引量:13

Static analysis of software security techniques and tools
下载PDF
导出
摘要 提出了一种软件安全漏洞的检测方法,重点介绍了静态测试。对当前基于源码分析的软件安全测试工具进行了分类并加以分析。 Put forward the detection method of security vulnerabilities, putting emphasis on static testing. Lastly, some software security testing tools based on source-code analysis are introduced and classified into several categories.
出处 《信息化纵横》 2009年第9期70-72,共3页
基金 国家863计划(2007AA010302)
关键词 软件安全 漏洞 安全测试 静态分析 测试工具 software security vulnerability security testing static analysis testing tools
  • 相关文献

参考文献6

  • 1刘海燕,杨洪路,王崛.C源代码静态安全检查技术[J].计算机工程,2004,30(2):28-30. 被引量:9
  • 2夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 3ZHANG Xiao Lan,EDWARDS A.Using CQUAL for static analysis of authorization hook [ C ]. Usenix security symposium, USA, 2002.
  • 4JOHNSON R, WAGNER D.Finding user/kernel pointer bugs with type inference[C].Usenix security symposium,2004.
  • 5XIE Yi Chen,CHOU A,ARCHER E D.Using symbolic pathsensitive analysis to detect memory access errors[C].ESEC/FSE ' 03, helsinki, finland, Sep 2003.
  • 6白哥乐,宫云战,杨朝红.基于源码分析的软件安全测试工具综述[C].第五届中国测试学术会议,2008.

二级参考文献26

  • 1[1]Wagner D,Foster J,Brewer E, et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.In Proceedings of the Year 2000 Network and Distributed System Security Symposium(NDSS),San Diego, CA,2000:3-17
  • 2[2]Biega J.ITS4:A Static Vulnerability Scanner for C and C++ Code. http://www.rstcorp.com
  • 3[3]Bishop M,Dlger M.Checking for Race Conditions in File Access.Computing Systems, 1996,9(2): 131 - 152
  • 4[4]Austin T M,Breach S E,Sohi G S.Efficient Detection of All Pointer and Array Access Errors. http://citeseer.nj.nec.com/1096.html
  • 5Mitchell J C.Programming language methods in computer security.ACM POPL,UK,2001
  • 6Cousot P,Cousot R.Abstract interpretation:a unified lattice model for static analysis of programs by construction or approximation of fixpoints.ACM POPL,USA,1977
  • 7Rice H G.Classes of Recursively Enumerable Sets and their Decision Problems.Transactions of the American Mathematical Society,1953(89):25~29
  • 8Foster J S,Fahndrich M,Aiken A.A theory of type qualifiers.ACM PLDI,USA,1999
  • 9Shankar U,Talwar K,Foster J S,et al.Detecting format string vulnerabilities with type qualifiers.USENIX Security Symposium,USA,2001
  • 10Zhang Xiaolan,Edwards Antony,Jaeger T.Using CQUAL for static analysis of authorization hook.USENIX Security Symposium,USA,2002

共引文献38

同被引文献38

引证文献13

二级引证文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部