期刊文献+

An Improved String-Searching Algorithm and Its Application in Component Security Testing 被引量:1

An Improved String-Searching Algorithm and Its Application in Component Security Testing
原文传递
导出
摘要 Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keyword strings. However, existing string-searching algorithms are not very efficient or appropriate for the operation of searching monitor logs during component security testing. For mining abnormal information effectively in monitor logs, an improved string-searching algorithm is proposed. The main idea of this algorithm is to search for the first occurrence of a character in the main string. The character should be different and farther from the last character in the pattern string. With this algorithm, the backward moving distance of the pattern string will be increased and the matching time will be optimized. In the end, we conduct an experimental study based on our approach, the results of which show that the proposed algorithm finds strings in monitor logs 11.5% more efficiently than existing approaches. Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keyword strings. However, existing string-searching algorithms are not very efficient or appropriate for the operation of searching monitor logs during component security testing. For mining abnormal information effectively in monitor logs, an improved string-searching algorithm is proposed. The main idea of this algorithm is to search for the first occurrence of a character in the main string. The character should be different and farther from the last character in the pattern string. With this algorithm, the backward moving distance of the pattern string will be increased and the matching time will be optimized. In the end, we conduct an experimental study based on our approach, the results of which show that the proposed algorithm finds strings in monitor logs 11.5% more efficiently than existing approaches.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期281-294,共14页 清华大学学报(自然科学版(英文版)
基金 supported by the National Natural Science Foundation of China (Nos.61202110 and 61502205) the Postdoctoral Science Foundation of China (Nos.2015M571687 and 2015M581739) the Graduate Research Innovation Project of Jiangsu Province (No.KYLX15 1079)
关键词 component testing security vulnerabilities detection monitor log abnormal information string-searching component testing security vulnerabilities detection monitor log abnormal information string-searching
  • 相关文献

参考文献2

二级参考文献73

  • 1杨芙清.软件工程技术发展思索[J].软件学报,2005,16(1):1-7. 被引量:266
  • 2单锦辉,姜瑛,孙萍.软件测试研究进展[J].北京大学学报(自然科学版),2005,41(1):134-145. 被引量:138
  • 3姜瑛,辛国茂,单锦辉,张路,谢冰,杨芙清.一种Web服务的测试数据自动生成方法[J].计算机学报,2005,28(4):568-577. 被引量:50
  • 4毛澄映,卢炎生.构件软件测试技术研究进展[J].计算机研究与发展,2006,43(8):1375-1382. 被引量:32
  • 5Md Khan K,Han J.Assessing security properties of software components:A software engineer's perspective[C] //Proc of the 2006 Australian Software Engineering Conf (ASWEC).Washington,DC:IEEE,2006:199-210. 被引量:1
  • 6Jabeen F,Jaffar-Ur-Rehman M.A framework for object oriented component testing[C] //Proc of 2005 Int Conf on Emerging Technologies.Los Alamitos,CA:IEEE,2005:451-460. 被引量:1
  • 7Hart J,Zheng Y.Security characterisation and integrity assurance for component-based software[C] //Proc of 2000 Int Conf on Software Methods and Tools (SMT 2000).Piscataway,NJ:IEEE Computer Society,2000:61-66. 被引量:1
  • 8Thompson H H,Whittaker J A,Mottay F E.Software security vulnerability testing in hostile environments[C] // Proc of the 2002 ACM Symposium on Applied Computing.New York:ACM,2002:260-264. 被引量:1
  • 9Du W P,Mathur A.Vulnerability testing of software system using fault injection[R].West Lafayette:Purdue University,1998:1-20. 被引量:1
  • 10Hsueh M C,Tsai T K,Lyer R K.Fault injection techniques and tools[J].IEEE Computer,1997,30(4):75-82. 被引量:1

共引文献36

同被引文献1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部