期刊文献+

论软件安全漏洞挖掘技术 被引量:5

On the Software Security Vulnerabilities Mining Techniques
下载PDF
导出
摘要 软件安全漏洞测试技术属于信息安全领域中一个非常重要的内容,本文对其概念进行了分析,并在此基础上探讨了当前的软件安全漏洞挖掘技术以及其流程,最终总结了其发展方向,希望给我们的工作起到一定的指导和促进作用。 In the field of information security, software security vulnerability testing technology is a very important element, this article discusses the current software security vulnerabilities, mining technology and its processes, then Summarize its development direction,hope to play a guiding role to our work.
作者 杨莎滢
出处 《信息安全与技术》 2013年第1期32-34,共3页
关键词 软件 安全漏洞 漏洞挖掘 software security vulnerabilities loophole mining
  • 相关文献

参考文献4

二级参考文献21

  • 1徐良华,孙玉龙,高丰,朱鲁华.基于逆向工程的软件漏洞挖掘技术[J].微计算机信息,2006,22(08X):259-261. 被引量:10
  • 2Common Weakness Enumeration(CWE).Vulnerabilities type distri-butions in CVE,version 1.9. http://cwe.mitre.org/documents/vuln-trends/index.html . 2010 被引量:1
  • 3LAROCHELLE D,EVANS D.Statically detecting likely buffer over-flow vulnerabilities. Proc of the 10th USENIX Security Symposi-um . 2001 被引量:1
  • 4GANESH V,LEEK T,RINARD M.Taint-based directed whiteboxfuzzing. Proc of the 31st ICSE’’09 . 2009 被引量:1
  • 5Del GROSSO C,Di PENTA M,ANTONIOL G,et al.Improving net-work applications security:a new heuristic to generate stress testingdata. Proc of Genetic and Evolutionary Computation Conference . 2005 被引量:1
  • 6SCHROEDER P J,KOREL B.Black-box test reduction using I/Oanalysis. Proc of International Symposium on Software and Anal-ysis . 2000 被引量:1
  • 7Del GROSSO C,Di PENTA M,ANTONIOL G,et al.Detecting bufferoverflow via automatic test input data generation. Computers andOperations Research . 2008 被引量:1
  • 8Del GROSSO C,ANRONIOL G,Di PENTA M.An evolutionary testingapproach to detect buffer overflows. Proc of International Sympo-sium on Software Reliability Engineering(ISSRE) . 2004 被引量:1
  • 9WU Zhi-yong,ATWOOD J W,ZHU Xue-yong.A new fuzzing tech-nique for software vulnerability mining. Proc of International Conference on Software Engineering . 2009 被引量:1
  • 10Liu Guang-hong,Wu Gang,Zheng Tao,et al.Vulnerability analy-sis for x86 executables using genetic algorithm and fuzzing. Third 2008 International Conference on Convergence Hybird Infor-mation Technology(ICCIT) . 2008 被引量:1

共引文献43

同被引文献23

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部