期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Web Service Generation through Program Slicing
1
作者 yingzhou zhang Wei Fu +2 位作者 Geng Yang Lei Chen Weifeng zhang 《International Journal of Communications, Network and System Sciences》 2010年第11期877-887,共11页
As the development of web service (WS), applications based on web services (WS), which are convent and platform-independent, have become increasingly popular in recent years. However, how to identify, generate and com... As the development of web service (WS), applications based on web services (WS), which are convent and platform-independent, have become increasingly popular in recent years. However, how to identify, generate and compose services has become an open issue recently. This paper proposes a method based on program slicing to realize the generation and composition of web services. This paper introduces the method about how to generate a WSDL file and a SOAP message from source codes as well as the theory of function dependence graph (FDG). In addition, this paper gives the way to generate a proxy service for each service, which allows users to easily call a service. The results of experiments show that our generation and composition methods of WS are feasible and flexible. 展开更多
关键词 Web Service Arogram SLICING WS GENERATION Function DEPENDENCE GRAPH HASKELL
下载PDF
Program Slicing Based Buffer Overflow Detection
2
作者 yingzhou zhang Wei Fu +1 位作者 Xiaofei Qian Wei Chen 《Journal of Software Engineering and Applications》 2010年第10期965-971,共7页
The development of the information technology has brought threats to human society when it has influenced seriously the global politics, economics and military etc. But among the security of information system, buffer... The development of the information technology has brought threats to human society when it has influenced seriously the global politics, economics and military etc. But among the security of information system, buffer overrun vulnerability is undoubtedly one of the most important and common vulnerabilities. This paper describes a new technology, named program slicing, to detect the buffer overflow leak in security-critical C code. First, we use slicing technology to analyze the variables which may be with vulnerability and extract the expressions which will bring memory overflow. Secondly, we utilize debug technology to get the size of memory applied by the variable and the size of memory used for these code segments (the slicing result) further. Therefore we can judge whether it will overflow according to the analysis above. According to the unique excellence of program slicing performing in the large-scale program’s debugging, the method to detect buffer overrun vulnerability described in this paper will reduce the workload greatly and locate the code sentences affected by corresponding variable set quickly, particularly including the potential vulnerability caused by parameter dependence among the subroutines. 展开更多
关键词 Program SLICING BUFFER OVERFLOW Inter-Procedure SLICING DEBUG System DEPENDENCE Graph
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部