期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Intelligent Development Environment and Software Knowledge Graph 被引量:10
1
作者 Ze-Qi lin Bing Xie +5 位作者 Yan-Zhen Zou Jun-Feng Zhao xuan-dong li Jun Wei Hai-Long Sun Gang Yin 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第2期242-249,共8页
Software intelligent development has become one of the most important research trends in software engineering. In this paper, we put forward two key concepts -- intelligent development environment (IntelliDE) and so... Software intelligent development has become one of the most important research trends in software engineering. In this paper, we put forward two key concepts -- intelligent development environment (IntelliDE) and software knowledge graph -- for the first time. IntelliDE is an ecosystem in which software big data are aggregated, mined and analyzed to provide intelligent assistance in the life cycle of software development. We present its architecture and discuss its key research issues and challenges. Software knowledge graph is a software knowledge representation and management framework, which plays an important role in IntelliDE. We study its concept and introduce some concrete details and examples to show how it could be constructed and leveraged. 展开更多
关键词 intelligent development environment software big data software knowledge graph semantic search
原文传递
Automatic Buffer Overflow Warning Validation 被引量:1
2
作者 Feng-Juan Gao Yu Wang +2 位作者 lin-Zhang Wang Zijiang Yang xuan-dong li 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第6期1406-1427,共22页
Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information. It is very time consuming to manually inspect all the static warning... Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information. It is very time consuming to manually inspect all the static warnings. In this paper, we propose BovInspector, a framework for automatically validating static buffer overflow warnings and providing suggestions for automatic repair of true buffer overflow warnings for C programs. Given the program source code and the static buffer overflow warnings, BovInspector first performs warning reachability analysis. Then, BovInspector executes the source code symbolically under the guidance of reachable warnings. Each reachable warning is validated and classified by checking whether all the path conditions and the buffer overflow constraints can be satisfied simultaneously. For each validated true warning, BovInspector provides suggestions to automatically repair it with 11 repair strategies. BovInspector is complementary to prior static buffer overflow discovery schemes. Experimental results on real open source programs show that BovInspector can automatically validate on average 60% of total warnings reported by static tools. 展开更多
关键词 buffer overflow static analysis warning symbolic execution automatic repair
原文传递
Automatic Detection and Repair Recommendation for Missing Checks
3
作者 ling-Yun Situ lin-Zhang Wang +2 位作者 Yang liu Bing Mao xuan-dong li 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第5期972-992,共21页
Missing checks for untrusted inputs used in security-sensitive operations is one of the major causes of various vulnerabilities. Efficiently detecting and repairing missing checks are essential for prognosticating pot... Missing checks for untrusted inputs used in security-sensitive operations is one of the major causes of various vulnerabilities. Efficiently detecting and repairing missing checks are essential for prognosticating potential vulnerabilities and improving code reliability. We propose a systematic static analysis approach to detect missing checks for manipulable data used in security-sensitive operations of C/C++ programs and recommend repair references. First, customized securitysensitive operations are located by lightweight static analysis. Then, the assailability of sensitive data used in securitysensitive operations is determined via taint analysis. And, the existence and the risk degree of missing checks are assessed. Finally, the repair references for high-risk missing checks are recommended. We implemented the approach into an automated and cross-platform tool named Vanguard based on Clang/LLVM 3.6.0. Large-scale experimental evaluation on open-source projects has shown its effectiveness and efficiency. Furthermore, Vanguard has helped us uncover five known vulnerabilities and 12 new bugs. 展开更多
关键词 static analysis MISSING CHECK VULNERABILITY detection REPAIR RECOMMENDATION
原文传递
A Game-Based Approach for PCTL* Stochastic Model Checking with Evidence
4
作者 Yang liu xuan-dong li Yan Ma 《Journal of Computer Science & Technology》 SCIE EI CSCD 2016年第1期198-216,共19页
Stochastic model checking is a recent extension and generalization of the classical model checking, which focuses on quantitatively checking the temporal property of a system model. PCTL* is one of the important quan... Stochastic model checking is a recent extension and generalization of the classical model checking, which focuses on quantitatively checking the temporal property of a system model. PCTL* is one of the important quantitative property specification languages, which is strictly more expressive than either PCTL (probabilistic computation tree logic) or LTL (linear temporal logic) with probability bounds. At present, PCTL* stochastic model checking algorithm is very complicated, and cannot provide any relevant explanation of why a formula does or does not hold in a given model. For dealing with this problem, an intuitive and succinct approach for PCTL* stochastic model checking with evidence is put forward in this paper, which includes: presenting the game semantics for PCTL* in release-PNF (release-positive normal form), defining the PCTL* stochastic model checking game, using strategy solving in game to achieve the PCTL* stochastic model checking, and refining winning strategy as the evidence to certify stochastic model checking result. The soundness and the completeness of game-based PCTL* stochastic model checking are proved, and its complexity matches the known lower and upper bounds. The game-based PCTL* stochastic model checking algorithm is implemented in a visual prototype tool, and its feasibility is demonstrated by an illustrative example. 展开更多
关键词 PCTL* stochastic model checking game semantics STRATEGY EVIDENCE
原文传递
Vulnerable Region-Aware Greybox Fuzzing
5
作者 ling-Yun Situ Zhi-Qiang Zuo +4 位作者 Le Guan lin-Zhang Wang xuan-dong li Jin Shi Peng liu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2021年第5期1212-1228,共17页
Fuzzing is known to be one of the most effective techniques to uncover security vulnerabilities of large-scale software systems.During fuzzing,it is crucial to distribute the fuzzing resource appropriately so as to ac... Fuzzing is known to be one of the most effective techniques to uncover security vulnerabilities of large-scale software systems.During fuzzing,it is crucial to distribute the fuzzing resource appropriately so as to achieve the best fuzzing performance under a limited budget.Existing distribution strategies of American Fuzzy Lop(AFL)based greybox fuzzing focus on increasing coverage blindly without considering the metrics of code regions,thus lacking the insight regarding which region is more likely to be vulnerable and deserves more fuzzing resources.We tackle the above drawback by proposing a vulnerable region-aware greybox fuzzing approach.Specifically,we distribute more fuzzing resources towards regions that are more likely to be vulnerable based on four kinds of code metrics.We implemented the approach as an extension to AFL named RegionFuzz.Large-scale experimental evaluations validate the effectiveness and efficiency of RegionFuzz-11 new bugs including three new CVEs are successfully uncovered by RegionFuzz. 展开更多
关键词 vulnerability detection greybox fuzzing code metrics resource distribution
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部