期刊文献+

基于分类测试的ARM芯片寄存器安全分析技术

Security Analysis of ARM Chip Registers based on Classification Test
下载PDF
导出
摘要 随着无线通信和互联网等技术的迅猛发展,嵌入式系统面临的安全问题与日俱增。传统的嵌入式系统安全分析主要针对嵌入式操作系统和软件,少有研究涉及嵌入式系统硬件本身的安全隐患。本文以S3C2440芯片为研究对象,通过分析ARM芯片硬件运行机制,构建基于测试的ARM芯片寄存器安全分析模型,并对ARM芯片安全隐患进行等级划分。 With the rapid development of wireless communications and internet technology, the seeurity problem faced by embedded system becomes increasingly acutte. Traditional security analysis of embedded system usually focuses on embedded operating systems and software, less research is involved in the security vulnerability of embedded-system hardware. With S3C2440 chip as the subject, and by analyzing the operating system of ARM chip hardware, the security analysis model of ARM chip registers based on tests is es- tablished, grading classification of ARM chip is also done in accordance with its security vulnerability.
出处 《信息安全与通信保密》 2015年第10期127-130,共4页 Information Security and Communications Privacy
关键词 测试用例 融合树 漏洞挖掘 test case fusion tree vulnerability discovery
  • 相关文献

参考文献10

  • 1刘芳.嵌入式软件测试技术的研究[D].北京:北京邮电大学.2013.
  • 2Yamaura,Tsuneo.How to Design Practical Test Cases[J]. Soft- ware 1EEE, 1998,15(6) :30-36.
  • 3姜荣萍.ARM嵌入式系统分析[J].计算机光盘软件与应用,2010(16):71-71. 被引量:2
  • 4乔文军.嵌入式软件测试平台的研究与实现[D].南京:南京航空航天大学.2011.
  • 5YU Ting-ting, Ahyoung Sung, Witawas Srisa-an, et al. An Approach to Testing Commercial Embedded Systems [J] .Jour- nal of Systems and Software,2014,88:207-230.
  • 6蔡红辉.嵌入式系统的安全与实现[J].科教文汇,2007(09Z):217-217. 被引量:2
  • 7Huang J C. Program Instrumentation and Software Testing[J]. Computer, 1978,11 (4) : 25- 32.
  • 8黄奕.基于模糊测试的软件安全漏洞发掘技术研究[D].合肥:中国科学技术大学,2014.
  • 9邬晟峰,吴悦,徐拾义.软件随机测试新方法研究[J].西南科技大学学报,2013,28(3):66-72. 被引量:1
  • 10ZHU Hong. Software Unit Test Coverage and Adequacy [J]. ACM Computing Surveys, 1997,29(04) : 366-367.

二级参考文献11

  • 1AGRAWAL V D. When to use random testing [ J ]. IEEE Transactions on Computers, 1978, C - 27 : 1054 - 1055.
  • 2DURAN J W, NTAFOS S C. An evaluation of random testing[ J ]. IEEE Transactions on Software Engineering, 1984, SE - 10:438 -444.
  • 3CHEN T Y, HUANG De-hao, TSE T H, et al. An innova- tive approach to tackling the boundary effect in adaptive ran- dom testing[ C]. Proceedings of the 40th Annual Hawaii In- ternational Conference on System Sciences,Hawaii, 2007.
  • 4TAPPENDEN A F, MILLER J. A novel evolutionary ap- proach for adaptive random testing [ J ]. IEEE Transac- tions on Reliability, 2009, 58(4) : 619 -633.
  • 5Testing by Exclusion through Test Profile[ C ]. Proceeding of 10th International Conference on Quality Software, Zhangjiajie, Hunan, China, 2010.92 - 101.
  • 6MALAIYA Y K. Antirandom Testing: Getting the Most Out of Black-box Testing[ C ]. Proceedings of ISSRE95, 1995.86 - 95.
  • 7XU Shi-yi, CHEN Jian-wen. Maximum Distance Testing [C]. Proceedings of IEEE the llth ATS. Asian Test Symposium Guam, USA, 2002.15 - 20.
  • 8XU Shi-yi. A Quasi Best Random Testing[ C]. Proceed- ing of IEEE the 19th ATS. Asian Test Symposium, Shanghai, China, 2010.21 -26.
  • 9HUTCHINS M, FOSTER H, GORADIA T, et al. Exper- iments on the Effectiveness of Dataflow- And Control Flow-based Test Adequacy Criteria [ C ]. Proceedings of the 16th International Conference on Software Engineer- ing, Los Alamitos, CA, USA, 1994. 191-200.
  • 10HYUNSOOK D, SEBASTIAN E, GREGG R. Support- ing controlled experimentation with testing techniques: An infrastructure and its potential impact[J]. Empirical Software Engineering, 2005, 10 (4) : 405 - 435.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部