期刊文献+

基于代码克隆检测的操作系统脆弱性分析方法 被引量:1

Operation System Vulnerabilities Analysis Based on Code Clone Detection
下载PDF
导出
摘要 基于代码克隆检测技术进行软件脆弱性检测,是软件脆弱性静态分析中的一个重要方向。目前,已有软件脆弱性检测工具在面向大规模代码集的脆弱性检测方面存在不足,且缺乏针对操作系统脆弱性的优化。为此,基于代码克隆检测技术,提出了一种操作系统脆弱性检测方法。首先在一般的"代码表征—提取特征—特征比对"检测流程的基础上,加入了基于操作系统软件包类型和函数代码规模的预筛选机制,在进行代码表征之前排除大部分无关代码。其次选择函数基本信息、符号序列和控制流路径三个角度提取代码特征,逐级比较脆弱代码和待测代码的相似度。最后从公开脆弱性数据库获取脆弱样本,对典型开源操作系统进行了实验,结果显示预筛选能够有效缩减实验对象的代码规模,而检测结果的平均精确度达到了84%。 Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability.At present,the existing software vulnerability detection tools have deficiencies in the vulnerability detection for large-scale code sets,and lack of optimization for the vulnerability characteristics of the operating system.Therefore,based on the code clone detection technology,this paper proposes a method for detecting the vulnerability of the operating system.Firstly,on the basis of the general"code representationextracting features-feature comparison"detection process,a pre-screening mechanism based on the type of operating system software package and function code size is added to exclude most irrelevant code before performing code representation.Secondly,the basic information of the function,the label sequence and the control flow path are selected to extract the code features,and the similarity between the fragile code and the code under test is compared step by step.Finally,experiments are conducted on typical open source operating systems with fragile samples obtained from the public vulnerability database.The results show that the pre-screening can effectively reduce the code size of the test subjects,and the average accuracy of the detection results reaches 84%.
作者 汪哲 任怡 周凯 管剑波 谭郁松 WANG Zhe;REN Yi;ZHOU Kai;GUAN Jianbo;TAN Yusong(College of Computer,National University of Defense Technology,Changsha 410073,China)
出处 《计算机科学与探索》 CSCD 北大核心 2021年第9期1619-1631,共13页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金(U19A2060,61872444) 国家重点研发计划(2018YFB0204301)。
关键词 脆弱性检测 代码克隆 操作系统 代码特征 静态分析 vulnerability detection code clone operating system code feature static analysis
  • 相关文献

参考文献2

二级参考文献71

  • 1曹羽中,金茂忠,刘超.克隆代码检测技术综述[J].计算机工程与科学,2006,28(z2):9-13. 被引量:6
  • 2Bilenko M,Mooney R J.Adaptive duplicate detection using learnable string similarity measure[C] ∥Proceeding of ninth ACM SIGKDD international conference on Knowledge disco-very and data mining.2003:39-48,.
  • 3Baker B S.On finding duplication and near duplication in large software systems[C] ∥Proceedings of 2nd Working Conference on Reverse Engineering.1995:86-95.
  • 4Mayrand J,Leblanc C,Merlo E M.Automatic detection of function clones in a software system using metrics[C] ∥Proceeding of International Conference on Software Maintenance (ICSM).1996.
  • 5Rieger M.Effective clone detection without language barriers[D].Bern University,Switzerland,2005.
  • 6Georgina C,Mike J.Source-code plagiarism:A UK academic perspective[R].RR-422.Department of computer Science,University of Warwick,2006.
  • 7Sheard J,Dick M,Markham S,et al.Cheating and plagiarism:perceptions and practices of first year it students[C] ∥Procee-dings of the 7th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education.2002:183-187.
  • 8McCabe D.Levels of Cheating and Plagiarism Remain High[OL].Center for Academic Integrity.Duke University,2005.http://academicintegrity.org.
  • 9Halstead,Howard M.Elements of Software Science[Z].Elsevier,1977.
  • 10Ottenstein K J.An Algorithmic Approach to the Detection and Prevention of Plagiarism[J].SIGCSE Bulletin,1977,8(4):30-41.

共引文献25

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部