期刊文献+

程序流程跟踪漏洞挖掘系统 被引量:2

Vulnerability Mining System based on Program Process Tracing Technology
原文传递
导出
摘要 程序漏洞的发现与利用是当今信息安全面临的主要问题之一,传统的漏洞挖掘技术具有误报率高,覆盖率低等问题。据此情况,文中提出了一种新型的、基于程序流程跟踪的新型漏洞挖掘系统。本系统在静态测试漏洞挖掘技术的基础上,结合图论的相关知识生成测试样本,再利用基因算法改进测试样本,给出了一套完整的漏洞挖掘系统结构。该系统增加了程序覆盖度,更加高效、准确地完成漏洞挖掘工作。 Nowadays, the discovery and use of program vulnerability is the key problem in information security field. Traditional vulnerability mining technology has many limits, including low accuracy and low coverage. In this situation, this paper proposes a new vulnerability mining system using program process tracing technology. Based on static testing technology, combined graph theory like CCG and FCG, and with genetic algorithm to alter the testing samples, and complete vulnerability mining system is proposed and constructed. This system could extend the program coverage, implement efficient and accurate vulnerability mining.
作者 张远 方勇
出处 《信息安全与通信保密》 2013年第4期90-91,94,共3页 Information Security and Communications Privacy
关键词 程序漏洞 漏洞挖掘技术 静态测试 图论 基因算法 程序流程跟踪 program vulnerability vulnerability mining technology static testing graph theory genetic algorithm program process tracing technology
  • 相关文献

参考文献9

  • 1SUTTON Michael, GREENE Adam, AMINI Pedram. Fuzzing: Brute Force Vulnerability Discovery[M]. [s.l.]: Addison-Wesley Professional, 2007 : 4.
  • 2Ifnooneelse.余弦相似度--cosineSimilarity[EB/OL].(2012-7)[2012-12-131.http://blog.csdn.net/ifnoelse/Iarticle/detailsH766123.
  • 3KAMINSKYDan,FERGUSON Justin.IDAPro代码破解揭秘[C].北京:人民邮电出版社,2010:15-18.
  • 4倪韬雍,金乃咏.基于有向图深度优先遍历的组合反馈环路检测算法[J].计算机应用与软件,2008,25(6):76-77. 被引量:7
  • 5XIAO Jian-yu, ZHANG De-yun. Combination of Model Checking and Theorem Proving[J]. The Journey of China Universities of Post and Telecommunication, 2010(12) : 4.
  • 6贺琪茗,周安民,方勇,刘亮.Pickle漏洞利用与防御[J].信息安全与通信保密,2012,10(6):67-69. 被引量:1
  • 7YAMAGUCHI Fabian, RIECK Konrad. Practical Genetic Algorithms[M]. America: Wiley-lnterscience, 2010.
  • 8黄湘宁,祝延波.基于图论的节点分析[J].青海师范大学学报(自然科学版),2011,27(2):17-20. 被引量:1
  • 9王善跃,何小海,罗代升,宁国强.通信信息加/解密研究进展[J].通信技术,2010,43(4):101-103. 被引量:13

二级参考文献32

  • 1陈勇,胡爱群,胡啸.通信网中节点重要性的评价方法[J].通信学报,2004,25(8):129-134. 被引量:89
  • 2苏晓琴,郭光灿.量子通信与量子计算[J].量子电子学报,2004,21(6):706-718. 被引量:62
  • 3唐六华.针对TCP序列号漏洞的攻击原理及其预防研究[J].信息安全与通信保密,2006,28(7):153-156. 被引量:3
  • 4魏东梅,李德全.“漏洞-补丁”安全模式的研究[J].信息安全与通信保密,2006,28(12):110-114. 被引量:1
  • 5汪小帆.李翔,陈关容.复杂网络理论及其应用[M].北京:清华大学出版社,2008.
  • 6Yue Zhuo, Yun[eng Peng and Keping Long. Improving Robustness against the Coordinated Attack by Removing Crashed Hub Nodes in Complex Network. SPIE--OSA-IEEE/ Vol. 7633, 2009, pp. 1--7.
  • 7Yanbo Zhu, Jianmlng Fu. A Node Robust Enhancing Algorithm Based on Graph Theory. BMEI10, Yantai, October 2010, pp. 2820-- 2823.
  • 8A. Karygiannis, E. Antonakakis, and A. Apostolopoulos. Detecting Critical Nodes for MANET Intrusion Detection Systems. Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. 2006.
  • 9Sy--Yen Kuo, Fu--Min Yeh, Hung--Yau Lin. Efficient and Exact Reliability Evaluation for Networks With Imperfect Vertices. IEEE TRANSACTIONS ON RELIABILITY, vol. 56, no. 2, pp. 288-300.
  • 10Y. Zhang, S. K. Dao, H. Vin et al. Heterogeneous Networking: A New Survivability Paradigm. Proceedings of the New Security Paradigms Workshop, Clouderoft, New Mexico, September 2001, pp. 31--39.

共引文献18

同被引文献19

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部