{"title":"一种基于复杂网络的软件漏洞定位方法","authors":"Yang Fan, Zhang Huanguo, Fu Jianming, Yang Jian","doi":"10.1109/ICCIAUTOM.2011.6183989","DOIUrl":null,"url":null,"abstract":"Software vulnerability orientation is of great significance to vulnerability exploiting and vulnerability repairing. This paper presents a new method of vulnerability orientation based on complex network theory. We describe the software structure by system-level characteristics of complex network and generate structural signatures of original and patched software. By comparing patches of the similar signatures and splitting the connected components recursively, the vulnerability location can be orientated. Results of the experiments demonstrate the effective orientation power of this method.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A software vulnerability orientation method based on complex network\",\"authors\":\"Yang Fan, Zhang Huanguo, Fu Jianming, Yang Jian\",\"doi\":\"10.1109/ICCIAUTOM.2011.6183989\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software vulnerability orientation is of great significance to vulnerability exploiting and vulnerability repairing. This paper presents a new method of vulnerability orientation based on complex network theory. We describe the software structure by system-level characteristics of complex network and generate structural signatures of original and patched software. By comparing patches of the similar signatures and splitting the connected components recursively, the vulnerability location can be orientated. Results of the experiments demonstrate the effective orientation power of this method.\",\"PeriodicalId\":177039,\"journal\":{\"name\":\"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIAUTOM.2011.6183989\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIAUTOM.2011.6183989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A software vulnerability orientation method based on complex network
Software vulnerability orientation is of great significance to vulnerability exploiting and vulnerability repairing. This paper presents a new method of vulnerability orientation based on complex network theory. We describe the software structure by system-level characteristics of complex network and generate structural signatures of original and patched software. By comparing patches of the similar signatures and splitting the connected components recursively, the vulnerability location can be orientated. Results of the experiments demonstrate the effective orientation power of this method.