期刊文献+

针对软件修复的相对相似性评价模型

Relative similarity evaluation model for software repair
下载PDF
导出
摘要 利用软件修复的局部性和针对性,将行为观察序列相似性度量与软件修复过程本身相关联,引入相对相似性评价指标,建立软件修复相对相似性评价模型。该模型将修复验证问题转换为修复后行为相似性度量问题,克服了现有修复技术缺乏有效评价的缺点。在实验中分别对补丁和动态修复进行研究,对比了地址对序列、系统调用序列以及混杂序列,说明评价模型的工作方式,实验表明了该模型的有效性,同时说明了混杂序列具有更强的表达能力。 Combining behavior observation sequence and relations between the repair process and corresponding software,this paper introduced the RSEM(relative similarity evaluation model) for software repair according to the local characteristics.RSEM translated verification problem into a behavior similarity measure problem to overcome the shortcomings of existing technology for lack of an effective evaluation.In the experiment,studied patches and dynamics repair respectively.Comparing the use of pair-addresses,system call sequence,as well as mixed sequence illustrates the evaluation model works,and also shows the effectiveness of the model and the mixed sequences have a stronger ability to express the software behavior.
出处 《计算机应用研究》 CSCD 北大核心 2011年第4期1410-1412,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(90718021) 自主科研专项计划资助项目(2010ZYTS035)
关键词 软件修复 验证 相似性测度 评价 software repair verification similarity measure evaluation
  • 相关文献

参考文献12

  • 1NARAINE R. Faulty Microsoft update rekindles patch quality con-ceres[ EB/OL]. (2005-05-13) [2009-08-12]. http://www, eweek. corn/c/a/Security/Faulty -Microsoft -U palate-Rekindles-Patch-Quality- Concerns/.
  • 2BEATTIE S, ARNOLD S, COWAN C, et al. Timing the application of security patches for optimal uptime[ C]//Proc of the 16th USENIX Conference on System Administration. Berkeley, CA: VSEN1X Association, 2002 : 233 - 242.
  • 3SIDIROGLOU S, LAADAN O, PEREZ C, et al. ASSURE: automatic software self-healing using rescue points[ C]//Proc of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems. New York : ACM,2009 : 37- 48.
  • 4QIN F, TUCEK J, SUNDARESAN J, et al. Rx: treating bugs as allergies-a safe method to survive software failures[ J ]. ACM Trans on Computer Systems,2007,25 ( 3 ) :235- 248.
  • 5SIDIROGLOU S', LOCASTO M E, BOYD S W, et al. Building a reactive immune system for software services [ C ]//Proc of the 2005 USENIX Annual Technical Conference. Berkeley, CA:VSENIX Association ,2005 : 149-161.
  • 6BARRETT R, MAGL|O'P P, KANDOGAN E, et al. Usable autonomic computing systems: the administrator' s perspective [ J ]. Advanced Enginee-ring Informatics,2005,19(3) :213-221.
  • 7COOK J E, DAGE J A. Highly reliable upgrading of components [ C ]//Proc of the 21 st International Conference on Software Engineer2 ing. New York : ACM, 1999:203- 212.
  • 8TUCEK J, XIONG W, ZHOU Y. Efficient online validation with delta execution[ J]. ACM SIGPLAN Notices,2009,44(3 ) :193-204.
  • 9SATHRE J, ZAMBRENO J. Automated software attack recovery using rollback and huddle [J]. Springer Journal of Design Automation for Embedded Systems,2008,12 ( 3 ) :243- 260.
  • 10LOCASTO M E, STAVROU A, CRETU G F. Life after self-healing: assessing post-repair program behavior, Tech Report GMU-CS-TR-2008- 3 [ R ]. Virginia : Department of Computer Science, George Ma- son University ,2008.

二级参考文献15

  • 1Aleph One. Smashing the stack for fun and profit[J]. Phrack, 1996,7(49) : 14 - 15.
  • 2David Wagner,Jeffrey S.Foster, et al.A first step towards automated detection of buffer overrun vulnerabilities [ A ]. In Pro-ceedings of Network and Distributed System Security Sympo-sium[ C]. San Diego: Intemet Society Press, 2000.
  • 3Olatunji Ruwase, Monica S I.am. A practical dynamic buffer overflow detectorl AI .In Proceedings of the llth An-nual Network and Distributed System Security Symposium [ C ]. SanDiego: Intemet Society Press,2004. 159 - 169.
  • 4"Solar Designer". Non-Executable User Stack [ DB/OL ].http://www, false, com/secufity/linux-stack/, 2006-05-11/2006-05-11.
  • 5C Cowan,C Pu, D Maier, J Walpole,et al. Stack-guard: automatic adaptive detection and prevention of buffer-overflow attacks[A] .In Proceedings of the 7th USENIX Security Conference[ C]. San Antonio: USENIX Press, 1998.63 - 78.
  • 6Stephanie Forrest, Steven A. Hofmeyr, et al. A Sense of Self for Unix Processes[ A] .In proceedings of the IEEE Sympo-sium on Research in Security and Privacy [ C ]. Los Alamitos: IEEE Computer Society Press, 1996.120- 128.
  • 7Hofmeyr SA, Forrest S,et al. A. Intrusion detection using sequences of system calls [ J ]. Journal of Computer Security,1998,6(3) : 151 - 180.
  • 8D Wagner,D Dean. Intntsion detection via static analysis[ A].In IEEE Symposium on Security and Privacy[C]. Oakland:IEEE. Computer Society Press,2001. 156 - 169.
  • 9H H Feng, Jonathon T Giffin, et al. Formalizing sensitivity in static analysis for intrusion detection[A]. In IEEE Sym-posium on Security and Privacy[C]. Oakland: IEEE Computer Society Press, 2004. 194-208.
  • 10D Wagner, Paolo Soto. Mimicry attacks on host-based intrusion detection systems [ A ].Conference on Computer and Communications Security [ C ]. New York, NY: ACM Press,2002. 255 - 264.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部