期刊文献+

基于程序切片的软件交互行为可信性分析模型 被引量:1

Trusted Analysis Model for Interactive Behavior of a Software System Based on Slicing Technology
下载PDF
导出
摘要 为研究面向交互行为的软件行为可信性分析和动态度量问题,从软件与外界数据交换时所产生的信息流动过程中,确定并提取依赖于输入数据的语句和变量的集合,作为软件交互行为的预期模型.在软件实际运行过程中,通过动态获取软件的实际行为,与分析软件源代码得到的软件预期行为作比较,形成可信性的动态度量结果.采用程序切片技术,将软件交互过程及交互中被赋值变量及后续赋值行为作为切片分析的结果.在此基础上,继续从源代码的抽象语法树和编译后的可执行程序中提取赋值行为本身和被赋值的变量的详细信息,然后将这些信息与切片分析结果相结合,形成以交互行为为关注点的软件行为描述模型.对模型进行了测试,结果表明:该模型能识别出软件运行中的非预期行为. To research the dynamic trusted measurement issue for interaction-oriented behavior of a software system, the expected behavior description model was obtained through determining and extracting the statements and the variables, which were referred and relied by the input data from outside. During the software executing, the measurement was done by dynamically acquiring the actual behavior of a software system and then the system compared it with the behavior obtained from the source code. By adopting the program slice technology, the interaction behavior and the successive behavior about assigning variables during the interaction were determined. Then, the detailed information and assigning behavior were extracted from the abstract syntax tree of the source code and the compiled executing program. Result shows that this approach can identify the non-expected behavior during the software executing.
出处 《北京工业大学学报》 CAS CSCD 北大核心 2013年第5期713-721,共9页 Journal of Beijing University of Technology
基金 国家"973"计划资助项目(2007CB311106) 北京市自然科学基金资助项目(4122007)
关键词 可信软件 交互 动态度量 trusted software interaction dynamic measurement
  • 相关文献

参考文献11

  • 1Trusted Computing Group. TCG specification architectureoverview [ EB/OL ]. [ 2012 - 02 - 19 ] . http : //www,trustedcomputing. org/201202190019. html.
  • 2沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 3陶芬,尹芷仪,傅建明.基于系统调用的软件行为模型[J].计算机科学,2010,37(4):151-157. 被引量:15
  • 4SAILER H, ZHANG X L,JAEGER T,et al. Design andimplementation of a TCG-based integrity measurementarchitecture [ C ] // Proceedings of the 13th USENIXsecurity symposium. Washington, D. C. : USENIXAssociation Publishing, 2004: 9-13.
  • 5YANG Xiao-hui, ZHOU Xue-hai, TIAN Jun-feng.Hierarchical and dynamic trusted evaluation model basedon agent [ C ] // Proceeding of 2009 Conference onCommunication Faculty. Irvine : Scientific ResearchPublishing, 2009: 312-316.
  • 6戎玫.实时系统动态行为模型的一种形式分析方法[J].计算机应用研究,2009,26(9):3365-3368. 被引量:1
  • 7梅宏,王千祥,张路,王戟.软件分析技术进展[J].计算机学报,2009,32(9):1697-1710. 被引量:101
  • 8CHEN Karl,WILKERSON Daniel. Elsa and lkhound[EB/OL]. [2012-01-15]. http : //www. scottmcpeak. com/elkhound.
  • 9Free Standards Group. The DWARF debugging standard[EB/OL]. [ 2012-01 -15 ]. http : //www. dwarfstd. org.
  • 10STALLMAN Richard, PESCH Rolans, SHEBS Stan, etal. Debugging with GDB [ EB/OL ]. [2012-01 -15].http : //www. gnu. org/manual/gdb. html.

二级参考文献198

共引文献360

同被引文献20

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2陆炜,曾庆凯.一种基于控制流的程序行为扩展模型[J].软件学报,2007,18(11):2841-2850. 被引量:8
  • 3Hofmeyr S A, Forrest S, Somayaji A. Intrusion detection using sequences of system calls[J] . Journal of Computer Security, 1998, 6(3):151-180.
  • 4Wagner D, Dean D. Intrusion detection via static analysis[C] // Proc ofIEEE Symposium on Security and Privacy. [S. l.] :IEEE Press, 2001:156-168.
  • 5Liu Zhen, Bridges S M, Vaughn R B. Combining static analysis and dynamic learning to build accurate intrusion detection models[C] // Proc of the 3rd IEEE International Workshop on Information Assurance. [S. l.] :IEEE Press, 2005:164-177.
  • 6Giffin J T, Jha S, Miller B P. Efficient context-sensitive intrusion detection[C] //Proc of the 11th Annual Network and Distributed System Security Symposium. 2004.
  • 7Birnbaum Z, Dolgikh A, Skormin V. Intrusion detection using N-grams of object access graph components[C] //Proc of the 8th International Conference on Digital Society. 2014:209-215.
  • 8李闻,戴英侠,连一峰,冯萍慧.基于混杂模型的上下文相关主机入侵检测系统[J].软件学报,2009,20(1):138-151. 被引量:31
  • 9李小勇,桂小林,毛倩,冷东起.基于行为监控的自适应动态信任度测模型[J].计算机学报,2009,32(4):664-674. 被引量:29
  • 10陶芬,尹芷仪,傅建明.基于系统调用的软件行为模型[J].计算机科学,2010,37(4):151-157. 被引量:15

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部