期刊文献+

基于检测工具的软件脆弱性分析模型研究 被引量:1

RESEARCH ON ANALYSIS MODEL OF SOFTWARE VULNERABILITY BASED ON DETECTION TOOLS
下载PDF
导出
摘要 针对使用单一检测工具进行软件脆弱性分析,存在较高误报率、漏报率和重报率的问题,研究和设计一个基于多检测工具的软件脆弱性分析模型。该模型通过对不同检测工具的集成,对不同检测结果的优化处理,有效地降低了检测工具的误报率、漏报率和重报率。基于该模型设计一个实例,对其实用性和有效性进行验证,结果表明,经过多层次等级处理,有效降低了误报率、漏报率和重报率。 To cope with the problem of high false negatives, false positives and repeated rate in the analysis of software vulnerabilities with single detection tool, we study and design an analysis model of software vulnerability which is based on multiple detection tools. With the integration of different detection tools and the optimised processing on different detection results, the model effectively reduces the false negatives, false positives and repeated rate of the detection tools. To verify the practicality and effectiveness of this model, we design an example based on it. The results show that after the multilevel hierarchical processing, the false negatives, false positives and repeated rate have been reduced effectively.
出处 《计算机应用与软件》 CSCD 北大核心 2014年第7期21-23,54,共4页 Computer Applications and Software
关键词 检测工具 软件脆弱性 多层次处理 误报率 Detection tool Software vulnerability Multilevel processing False negatives
  • 相关文献

参考文献3

二级参考文献28

  • 1余建军,韩双霞,黄云龙.软件安全性的静态分析[J].计算机工程与设计,2006,27(8):1411-1414. 被引量:5
  • 2夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 3[1]Wagner D,Foster J,Brewer E, et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.In Proceedings of the Year 2000 Network and Distributed System Security Symposium(NDSS),San Diego, CA,2000:3-17
  • 4[2]Biega J.ITS4:A Static Vulnerability Scanner for C and C++ Code. http://www.rstcorp.com
  • 5[3]Bishop M,Dlger M.Checking for Race Conditions in File Access.Computing Systems, 1996,9(2): 131 - 152
  • 6[4]Austin T M,Breach S E,Sohi G S.Efficient Detection of All Pointer and Array Access Errors. http://citeseer.nj.nec.com/1096.html
  • 7huior.我看“静态测试”[EB/OL].http://www.51testing.Com/?10851/action_viewspaceitemid_72777.html.2008-01-16.
  • 8于波,姜艳.同行评审[EB/OL].http://www.uml.org.cn/rjzl/200902024.asp.2009-02-02.
  • 9mallruan111.内存出错,内存泄露,数据越界,悬空指针,错误分配[EB10L].
  • 10xserver.杜绝野指针[EB/OL].http://www.javaeye.com/wiki/topic/625904.2010-03-27.

共引文献23

同被引文献8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部