期刊文献+

计量芯片后门测试用例生成方案

原文传递
导出
摘要 随着嵌入式计量器具日益普及,利用嵌入式计量器具的软件缺陷或故意设置的作弊后门来进行作弊的现象越来越多。因此,急需一种自动检测方法来方便高效地检测嵌入式计量软件中的作弊后门。测试命令生成是通过对嵌入式计量器具常见作弊命令及格式的分析,利用模糊生成方法构造并生成,并输入后门检测系统进行后门检测。本文提出一种快捷的测试命令生成方法,优化了测试过程。
出处 《计量技术》 2014年第11期23-25,共3页 Measurement Technique
基金 质检公益性行业科研专项项目(201010051)
  • 相关文献

参考文献8

  • 1侯婉辉.对燃油加油机作弊手段及防作弊系统功能的探讨[J].中国科技信息,2011(5):108-109. 被引量:4
  • 2王林波,沈春磊,赵书展,党玉东.如何治理加油机高科技计量作弊[J].上海计量测试,2007,34(3):47-49. 被引量:5
  • 3Rieck K, Holz T, Willems C, et al. Learning and classification of malware behavior [ M ]. Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2008 : 108 - 125.
  • 4梁彬,侯看看,石文昌,梁朝晖.一种基于安全状态跟踪检查的漏洞静态检测方法[J].计算机学报,2009,32(5):899-909. 被引量:20
  • 5Rieck K, Trinius P, Willems C, et al. Automatic analysis of real- ware behavior using machine learning [ J ]. Journal of Computer Secu- rity,2011, 19(4) : 639 -668.
  • 6Chi Ruinan. Research on network data transmission and security u- sing windows socket [ J ]. Computer Engineering and Technology (IC- CET), 2010(2) :686.
  • 7Afanasyev M, Tsuwei Chen, Voelker G M, Snoeren A C. Usage Pat- terns in an Urban WiFi Network[J]. Networking,2010(18) : 1359.
  • 8Jones A, Ohlund J. Network Programming for Microsoft Windows [ M 3. Microsoft Press. 2000.

二级参考文献14

  • 1Howard M, LeBlanc D, Viega J. 19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them. USA.. McGraw-Hill Osborne Media, 2005
  • 2Sutton M, Greene A, Amini P. Fuzzing, Brute Force Vulnerability Discovery. USA: Addison-Wesley Professional, 2007
  • 3Chess B, West J. Secure Programming with Static Analysis. USA: Addison Wesley Professional, 2007
  • 4Chess B, McGraw G. Static analysis for security. IEEE Security: Privacy Magazine, 2004, 2(6): 76-79
  • 5Johnson R, Wagner D. Finding user/kernel pointer bugs with type inference//Proceedings of the 2004 USENIX Security Symposium. San Diego, CA, USA, 2004:119-134
  • 6Ashcraft K, Engler D. Using programmer-written compiler extensions to catch security holes//Proceedings of the 2002 IEEE Symposium on Security and Privacy. Oakland, CA, USA, 2002:143-159
  • 7Hallem S, Chelf B, Xie Y, Engler D. A system and language for building system-specific, static analyses//Proceedings of the 2002 ACM Conference on Programming Language Design and Implementation. Berlin, Germany, 2002:69-82
  • 8Cytron R, Ferrante J, Rosen B, Wegman M, Zadeck K. Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems, 1991, 13(4): 451-490
  • 9Yang J, Kremenek T, Xie Y, Engler D. MECA: An extensible, expressive system and language for statically checking security properties//Proceedings of the 2003 ACM Conference on Computer and Communication Security. Washington, DC, USA, 2003:321-334
  • 10Shankar U, Talwar K, Foster J, Wagner D. Detecting format string vulnerabilities with type qualifiers//Proceedings of the 2004 USENIX Security Symposium. Washington, DC, USA, 2001:201-220

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部