期刊文献+

改进的程序时序安全属性模型检测技术

Improved Model Checking Technology for Program Temporal Safety Properties
下载PDF
导出
摘要 针对程序时序安全属性模型检测技术改进模型检测算法,使安全漏洞状态机以函数为单位进行扩展,简化程序模型检测过程,以提高检测效率。在检测过程中加入别名分析,考虑安全操作之间的数据流依赖关系,以提高检测的准确性。实验结果表明,改进后的方法比原检测方法具有更高的效率和准确性。 This paper presents two points of improvements for model checking temporal safety properties of program: more efficient model checking algorithm is proposed,which can simplify the checking process and reduce the time cost by extending the state machine model with each function.Alias analysis is used to determine the dataflow dependency between safety operations,which makes the checking process more accurate.Experimental results show that the method can work more efficiently and exactly.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第7期28-30,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60773170 60721002 90818022) 国家"863"计划基金资助项目(2006AA01Z432) 高等学校博士学科点专项科研基金资助项目(200802840002) 上海市信息安全综合管理技术研究重点实验室开放课题基金资助项目(AGK2008003)
关键词 时序安全属性 模型检测 别名分析 temporal safety property model checking alias analysis
  • 相关文献

参考文献6

  • 1张林,曾庆凯.软件安全漏洞的静态检测技术[J].计算机工程,2008,34(12):157-159. 被引量:41
  • 2Robby M,Dwyer M B,Hatcliff J.Bogor:A Flexible Framework for Creating Software Model Checkers[C]//Proe.of Testing:Academic & Industrial Conference--Practice and Research Techniques.Windsor,UK:[s.n.],2006:181-192.
  • 3Chen H,Wagner D.MOPS:An Infrastructure for Examining Security Properties of Software[C]//Proc.of the 9th ACM ConferenceonComputerandCommunicationsSecurity-Washington D.C.,USA:[s.n.],2002:235-244.
  • 4Ball T,Rajamani S K.The SLAM Project:Debugging System Software via Static Analysis[C]//Proc.of the Cone on Principles of Programming Languages.Portland,USA:[s.n.],2002:1.3.
  • 5Beyer D.Henzinger T A,Jhala R,et al..The Software Model Checker BLAST:Application to Software Engineering[J].Int'lJournal on Software Tools for Technology Transfer,2007.9(5/6):505-525.
  • 6Pearce D J,Kelly P H J,Hankin C.Efficient Field-sensitive Pointer Analysis of C[J].ACM Transactions on Programming Languages and Systems,2007,30(1):56-65.

二级参考文献6

  • 1夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 2Weber S, Karger P A, Paradkar A. A Software Flaw Taxonomy: Aiming Tools at Security[C]//Proc. of ACM Software Engineering for Secure Systems Building Trustworthy Applications. Louis, Missouri, USA: [s. n.], 2005.
  • 3Landwehr C E. Formal Models for Computer Security[J]. ACM Computing Surveys, 1981, 13(3): 247-278.
  • 4Foster J S, Fghndrich M, Aiken A. A Theory of Type Qualifiers[J]. ACM SIGPLAN Notices, 1999, 34(5): 192-203.
  • 5Kurshan R P. Program Verification[J]. Notices of the American Mathematical Society, 2000, 47(5): 534-545.
  • 6Wagner D. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[C]//Proc. of the 7th Network and Distributed System Security Symposium. San Diego, USA,: [S. l.], 2000.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部