期刊文献+

基于静态分析方法的软件可靠性模型研究 被引量:1

Research on Software Reliability Model Based on Static Analysis
下载PDF
导出
摘要 随着网络通讯与计算机应用的不断发展,软件可靠性问题日益受到关注。针对更新COTS或开源组建,提供了一种定量评估软件可靠性的方法模型。该模型结合了静态分析源代码方法,对执行路径进行有限测试,并建立贝叶斯信任网络,构建一个综合的软件可靠性度量模型。最后使用STREW\[1\]工具对3个开源程序进行实验验证,得到了实验结果,证明模型有效。 Along with the network communication and the continuous development of computer applications, software reliability has attracted increasing attention. This paper proposes a methodology model for quantitative evaluation of software reliability in updated COTS or open source components. Combining with the static analysis of the source code, the model tests the execution paths limitedly, as well as sets up Bayesian Belief Networks to provide a comprehensive software reliability measurement model. Finally it uses STREW [ 1 ] to give the three open source programs experimental verification and the experiment results are attained. The model is proved to be effective.
作者 邓绯 王凯
出处 《长春大学学报》 2012年第8期937-940,共4页 Journal of Changchun University
关键词 软件可靠性 静态分析 贝叶斯信任网络 software reliability static analysis Bayesian Belief Networks
  • 相关文献

参考文献4

  • 1Nachiappan Nagappan. A Software Testing and Reliability Early Warning(STREW) Metric Suite[ M]. PhD Thsis,2005.
  • 2JohnD.Musa.韩柯译.软件可靠性工程[M].北京:机械工业出版社,2003.
  • 3戈戟,史洪,徐良华.Shellcode静态检测技术研究[J].计算机应用与软件,2010,27(2):47-49. 被引量:1
  • 4李倩,潘学敏,李宣东.内存泄露检测工具与评估方法[J].计算机科学与探索,20lo(1):33-39.

二级参考文献15

  • 1Aleph One. Smashing the stack for fun and profit [ J ]. Phrack Magazine, 1996,7 (49).
  • 2Cowan C,Pu C, Maier D, et al. StackGuard : Automatic adaptive detection and prevention of buffer-overflow attacks [ C ]//USENIX Security Symposium, San Antonio, Texas, 1998:63 - 78.
  • 3Bhatkar S, DuVarney D C, Sekar R. Address Obfuscation : An Efficient Approach to Combat a Broad Range of Memory Error Exploits [ C ]// Proceedings of the 12th USENIX Security Symposium,Washington D. C., 2003.
  • 4PaX Team. PaX [ EB/OL]. 2001. http ://pax. grsecurity. net.
  • 5Akritidis P, Markatos E, Polychronakis M, et al. STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis [ C ]//Proceedings of the 20^th IFIP International Information Security Conference ( SEC' 05 ) ,2005:375 - 392.
  • 6K,2. ADMmutate [ EB/OL ]. 2006. http ://www. ktwo. ca/ADMmutate- 0.8.4. tar. gz.
  • 7Metasploit project [ EB/OL ]. http ://www. metasploit. org.
  • 8Snort rule 651,648 [ EB/OL]. www. snort. org/pub-bin/sigs. cgi? sid = 651.
  • 9Pasupulati A,Coit J, Levitt K, et aL Buttercup: On Networkbased Detection of Polymorphic Buffer Overflow Vulnerabilities [ C ]//Proceedings of the Network Operations and Management Symposium (NOMS) ,2004:235 - 248.
  • 10Toth T,Kruegel C. Accurate Buffer Overflow Detection via Abstract Payload Execution [ C ]//Proceedings of the 5^th International Symposium on Recent Advances in Intrusion Detection (RAID'02) ,2002:274 - 291.

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部