期刊文献+

信息系统漏洞挖掘技术体系研究 被引量:16

Architecture of vulnerability discovery technique for information systems
下载PDF
导出
摘要 首先讨论漏洞挖掘相关的术语定义,分析漏洞挖掘目标对象特点,研究漏洞挖掘的一般流程,然后利用层次结构模型方法,创造性地提出了5层漏洞挖掘技术体系架构模型,并详细描述基础层、抽象层、挖掘层、分析层和利用层的内容、作用及其相关支撑技术。最后指出漏洞挖掘技术的发展方向是兼顾各层、协同发展。 First,the definition of technical terms about vulnerability discovery were presented.The characters of the targets of vulnerability discovery were Analyzed.The general process of vulnerability discovery was studied.Then,by applying layer construction model way,proposed the architecture construction model of vulnerability discovery technique,which was divided into five layers,and also explained the contents,roles and key techniques of each layer.Finally,the future direction for the technique is that a comprehensive and coordinated method is used,with all the five layers taken into consideration.
出处 《通信学报》 EI CSCD 北大核心 2011年第2期42-47,共6页 Journal on Communications
基金 国家自然科学重点基金资助项目(90818025) 国家高技术研究发展计划("863"计划)基金资助项目(2008AA01Z420)~~
关键词 信息系统 漏洞挖掘 目标对象 体系架构 支撑性技术 information system vulnerability discovery targets object architecture construction key technique
  • 相关文献

参考文献2

二级参考文献44

  • 1吴鹏,施小纯,唐江峻,林惠民,陈宗岳.关于蜕变测试和特殊用例测试的实例研究(英文)[J].软件学报,2005,16(7):1210-1220. 被引量:12
  • 2Weyuker E J. On testing non-testable programs. The Computer Journal, 1982, 25(4): 465-470
  • 3Chen T Y, Cheung S C, Yiu S M. Metamorphic testing: A new approach for generating next test cases. Hong Kong University, Hong Kong: Technical Report HKUST-CS98- 01, 1998
  • 4Chen T Y, Kuo F C, Liu Y, Tang A. Metamorphic testing and testing with special values//Proeeedings of the 5th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'04). Beijing, China, 2004:128-134
  • 5Wu P. Iterative metamorphic testing//Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC' 05). Edinburgh, UK, 2005 : 19-24
  • 6Dong G W, Nie C H, Xu B W, Wang L L. An effective iterative metamorphic testing algorithm based on program path analysis//Proceedings of the 7th Annual International Conference on Quality Software (QSIC' 07). Oregon, USA, 2007:292-297
  • 7ChenTY, HuangDH, TseT H, Zhou ZQ. Case studies on the selection of useful relations in metamorphic testing// Proceedings of the 4th Ibero-American Symposium on Software Engineering and Knowledge Engineering (JIISIC' 04). Madrid, Spain, 2004:569-583
  • 8Mayer J, Guderlei R. An empirical study on the selection of good metamorphic relations//Proeeedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC'06). Chicago, USA, 2006:475-484
  • 9Chen T Y, Tse T H, Zhou Z Q. Semi-proving: an integrated method based on global symbolic evaluation and metamorphic testing. ACM SIGSOFT Software Engineering Notes, 2002, 27(4) : 191-195
  • 10Chen T Y, Tse T H, Zhou Z Q. Fault-based testing without the need of oracles. Information and Software Technology, 2003, 45(1): 1-9

共引文献23

同被引文献160

引证文献16

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部