A software vulnerability orientation method based on complex network

Yang Fan, Zhang Huanguo, Fu Jianming, Yang Jian
{"title":"A software vulnerability orientation method based on complex network","authors":"Yang Fan, Zhang Huanguo, Fu Jianming, Yang Jian","doi":"10.1109/ICCIAUTOM.2011.6183989","DOIUrl":null,"url":null,"abstract":"Software vulnerability orientation is of great significance to vulnerability exploiting and vulnerability repairing. This paper presents a new method of vulnerability orientation based on complex network theory. We describe the software structure by system-level characteristics of complex network and generate structural signatures of original and patched software. By comparing patches of the similar signatures and splitting the connected components recursively, the vulnerability location can be orientated. Results of the experiments demonstrate the effective orientation power of this method.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIAUTOM.2011.6183989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Software vulnerability orientation is of great significance to vulnerability exploiting and vulnerability repairing. This paper presents a new method of vulnerability orientation based on complex network theory. We describe the software structure by system-level characteristics of complex network and generate structural signatures of original and patched software. By comparing patches of the similar signatures and splitting the connected components recursively, the vulnerability location can be orientated. Results of the experiments demonstrate the effective orientation power of this method.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于复杂网络的软件漏洞定位方法
软件漏洞导向对漏洞的发现和修复具有重要意义。本文提出了一种基于复杂网络理论的漏洞定位新方法。利用复杂网络的系统级特征描述软件结构,生成原始软件和补丁软件的结构签名。通过比较相似签名的补丁,递归拆分连接的组件,定位漏洞位置。实验结果证明了该方法的有效定向能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A dynamic scheduling parallel test system with CVI A research of algorithm based on probability weighted fuzzy association rules Design of assembly line of diesel engine factory based on RFID technology Application of genetic algorithm in computer aided design A new method of parameters determined in image recognition by PCNN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1