期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph 被引量:1
1
作者 ZHOU Minmin CHEN Jinfu +4 位作者 LIU Yisong ACKAH-ARTHUR Hilary CHEN Shujie ZHANG Qingchen ZENG Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期149-160,共12页
With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great signific... With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great significance in reducing system crashes and maintaining system security and integrity. This paper focuses on detecting three common types of vulnerabilities: Unused_Variable, Use_of_Uninitialized_Variable, and Use_After_ Free. We propose a method for software vulnerability detection based on an improved control flow graph(ICFG) and several predicates of vulnerability properties for each type of vulnerability. We also define a set of grammar rules for analyzing and deriving the three mentioned types of vulnerabilities, and design three vulnerability detection algorithms to guide the process of vulnerability detection. In addition, we conduct cases studies of the three mentioned types of vulnerabilities with real vulnerability program segments from Common Weakness Enumeration(CWE). The results of the studies show that the proposed method can detect the vulnerability in the tested program segments. Finally, we conduct manual analysis and experiments on detecting the three types of vulnerability program segments(30 examples for each type) from CWE, to compare the vulnerability detection effectiveness of the proposed method with that of the existing detection tool Cpp Check. The results show that the proposed method performs better. In summary, the method proposed in this paper has certain feasibility and effectiveness in detecting the three mentioned types of vulnerabilities, and it will also have guiding significance for the detection of other common vulnerabilities. 展开更多
关键词 software SECURITY software VULNERABILITY IMPROVED control flow GRAPH VULNERABILITY detection algorithm
原文传递
基于程序控制流的静态软件胎记算法研究 被引量:1
2
作者 赵雅霖 雷聚超 唐俊勇 《计算机应用与软件》 北大核心 2020年第3期32-37,共6页
针对传统SKB软件胎记检测程序抄袭结果不准确的问题,提出一种基于程序控制流的软件胎记方法进行抄袭检测。使用Java程序静态分析的结果作为元信息,通过分析元信息得到字节流指令。分析字节指令流以及程序的控制流结构,并将其中的外部引... 针对传统SKB软件胎记检测程序抄袭结果不准确的问题,提出一种基于程序控制流的软件胎记方法进行抄袭检测。使用Java程序静态分析的结果作为元信息,通过分析元信息得到字节流指令。分析字节指令流以及程序的控制流结构,并将其中的外部引用替换为外部控制流结构,以该控制流结构作为软件胎记。使用VF2算法计算两胎记之间的相似度,从而判定两程序之间是否存在抄袭行为。实验结果表明,所提胎记较传统SKB胎记更具可信性。 展开更多
关键词 软件胎记 程序控制流结构 VF2算法 相似度 抄袭检测
下载PDF
基于表驱动的纯软件签名错误检测算法 被引量:1
3
作者 陈建 沈潇军 +2 位作者 姚一杨 邢雅菲 琚小明 《计算机工程》 CAS CSCD 北大核心 2018年第4期187-192,共6页
针对临时性、间歇性与永久性错误的存在,处理器获取并执行一条不正确的指令将导致控制流错误的发生。为此,在研究通过软件签名的控制流检错(CFDSS)算法的基础上,基于表驱动形式,提出一种纯软件签名错误检测算法(EDSS)。构建二维表(CFID)... 针对临时性、间歇性与永久性错误的存在,处理器获取并执行一条不正确的指令将导致控制流错误的发生。为此,在研究通过软件签名的控制流检错(CFDSS)算法的基础上,基于表驱动形式,提出一种纯软件签名错误检测算法(EDSS)。构建二维表(CFID),用于存储控制流图的信息,通过比较基本块中的签名和存储在CFID表中的签名检测出非法的指令跳转。对于CFDSS算法不能有效检测的共享分支扇入节点的非法指令跳转错误,可成功检测出这类错误。实验结果表明,EDSS算法的平均错误检测覆盖率比CFDSS算法高出1.3%,对具有共享分支扇入节点的检错能力平均高出约1.9%。 展开更多
关键词 表驱动 软件签名 错误检测 通过软件签名的控制流检错算法 控制流图
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部