期刊文献+

基于系统调用短序列的软件漏洞检测方法研究 被引量:1

A Study of the Software Vulnerability Detection Method Based on the Short Sequence of System Calls
下载PDF
导出
摘要 软件受到攻击后将在所执行的系统调用状况中有所体现,因此可将基于系统调用的入侵检测技术应用于软件漏洞的检测。本文针对无源码的可执行程序,引入系统调用节点和系统调用上下文信息的概念来刻画软件行为的动态特性和漏洞的位置信息,利用改进的STIDE算法构造软件正常行为特征库来检测并定位漏洞。实验结果表明该方法能够准确获取软件行为信息,且具有较强的漏洞检测能力。 After the software is attacked,the influence will be reflected in the status of the executed system call. Therefore,the intrusion detection technology based on system calls can be applied into the detection of software vulnerabilities.In order to analyze the executable program without source code,the concept of the system call node and the context information are introduced to depict the dynamic behavior characteristics of the software and the localization information of the vulnerabilities in this paper.Furthermore,the vulnerabilities can be detected and located by building the normal behavior characteristics library based on the improved STIDE algorithm.The experiment results show that the behavior information of the software can be obtained and the vulnerabilities can be detected accurately by applying the above method.
作者 葛立欣
出处 《软件工程》 2017年第2期12-15,共4页 Software Engineering
关键词 漏洞检测 行为建模 系统调用短序列 STIDE算法 函数调用链 vulnerability detection behavior modeling the short sequence of system calls STIDE algorithm function call chain
  • 相关文献

参考文献4

二级参考文献25

  • 1苏璞睿,杨轶.基于可执行文件静态分析的入侵检测模型[J].计算机学报,2006,29(9):1572-1578. 被引量:14
  • 2夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 3[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies. Department of Computer Science at the University of California at Davis, 1996 被引量:1
  • 4[4]Aslam T,Krsul I.Use ofa Taxonomy of Security Faults. Eugene Spaff ord.In Proceedings of the 19th National Information Systems Security Conference,1996 被引量:1
  • 5[5]Krsul 0Software Vulnerability Analysis. Department of Computer Scie nces, Purdue University, 1998 被引量:1
  • 6[6]Knight E.Computer Vulnerabilities.http://www.securityparadigmcom/, 2000 被引量:1
  • 7[1]Denning D E.Cryptography and Data Security. Addison-Wesley Publis hing Company, 1983 被引量:1
  • 8[2]Marick B.A Survey of Software Fault Surveys. University of Illinois at rbana-Champaign, 1990 被引量:1
  • 9Weber S, Karger P A, Paradkar A. A Software Flaw Taxonomy: Aiming Tools at Security[C]//Proc. of ACM Software Engineering for Secure Systems Building Trustworthy Applications. Louis, Missouri, USA: [s. n.], 2005. 被引量:1
  • 10Landwehr C E. Formal Models for Computer Security[J]. ACM Computing Surveys, 1981, 13(3): 247-278. 被引量:1

共引文献115

同被引文献3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部