期刊文献+

面向对象语言中的漏洞发现方法

Vulnerability Detection Methods on Object-Oriented Language
下载PDF
导出
摘要 大多数行业定制软件漏洞检测困难,而传统的静态漏洞检测方法不但报告很多错误的和虚假的信息,同时针对面向对象的函数(方法)检测并未提及.针对函数调用前后存在的漏洞问题,首先用XML文法来表示出面向对象情况下,对象存在继承关系时,从祖先类搜索开始,建立函数调用前后安全契约规则,利用基于上下文无关的自顶向下与自底向上相结合的语法解析树的方法,解析函数的调用是否违反了安全契约规则并报告漏洞的内容.实验表明,与同类型安全分析工具比较,具有避免函数重复分析、规则的可扩展性良好、准确率高等优点. Most of Custom software vulnerability detection is difficult. Lots of static vulnerability detection ap- proaches usually not only give many inaccurate information and false results, but also can' t deal with code on object - oriented language. Extending the rules of XML grammar, the searching process will be done from top an- cestor class on XML tree with object - oriented. The pre - condition and post - condition are built with objects which belong to inheritance relationship' s class. A new parsing algorithm is established by combining top - down and bottom - up method in a parsing tree to check whether the parse result breaks the safety rules of contract and to report the contents of the vulnerability. The experiments show that, compared with the same code analysis tools, this method has the advantage nf n. t;r; 1..~'~
出处 《昆明理工大学学报(自然科学版)》 CAS 北大核心 2013年第3期56-61,共6页 Journal of Kunming University of Science and Technology(Natural Science)
基金 国家自然科学基金(11103005)
关键词 契约规则 面向对象 解析树 contract condition object - oriented language parse tree
  • 相关文献

参考文献11

  • 1Rebeca Hamid Reza Shabriari, Mohammad Sadegh Makarem, Marjan Sirjani, RasoolJalili, Ali Movaghar. Vulnerability anal?ysis of networks to detect multi phase attacks using the actor-based language[J]. Computers and Electrical Engineering, 2010, 36(9) ;874 -885.
  • 2Nabid Shahmehri, Amel Mammar, Edgardo Montes De Oca, David Byers, Ana Cavalli, Shanai Ardi, WillyJimenez. An ad?vanced approach for modeling and detecting software vulnerabilities[J]. Information and Software Technology; 2012 ,54(9) ; 997 -1013.
  • 3Ruoyu Zhang, Shiqiu Huang, Zhengwei Qi, Haibing Guan, Static program analysis assisted dynamic taint tracking for software vulnerability discovery[J]. Computers & Mathematics with Applications, 2012,63 (I) ;469 -480.
  • 4Swiler L P, Phillips C, Ellis D, Computer - attack Graph Generation Tool[CJ IIProceedings of the 2nd DARPA Information Survivability Conference & Exposition. Los Alamitos, California, USA; IEEE Computer Society ,2001 ;307 -32l.
  • 5ViegaJ, BlochJ T, Kohno T, McGraw G. ITS4; A Static Vulnerability Scanner for C and C++ Code[CJilIn Proc. 16th Computer Security Applications Conferences, New Orleans, LA. 2000; 257 - 266.
  • 6Mohammad Akbari, Sarah Berenji, RezaAzmi. Vulnerability Detector using Parse Tree Annotation[CJ II 2010 2nd interna- tional Conference on Education Technology and Computer (ICETC) ,2010 ;257 - 26l.
  • 7张晓琳,王国仁.用继承扩展XML-RL[J].小型微型计算机系统,2005,26(2):243-247. 被引量:25
  • 8阳小奇,刘坚.一种基于契约的跨过程安全分析方法[J].西安电子科技大学学报,2006,33(3):390-394. 被引量:6
  • 9陈海明,董韫美.上下文无关语言分析树的一种表示形式[J].计算机研究与发展,2000,37(10):1179-1184. 被引量:8
  • 10陈再良,徐德智,陈学工,沈海澜.基于链式结构XML文档的生成方法[J].计算机工程,2006,32(20):59-61. 被引量:5

二级参考文献32

  • 1Kaushik R,Shenoy P,Bohannon P,et al.Exploiting Local Similarity for Efficient Indexing of Paths in Graph Structured Data[C]//10th International Conference on Database Theory,San Jose,California,USA,2002:129-140.
  • 2Chen Q,Lim A,Ong K W.D(k)-index:An adaptive structural summary for graph-structured data[C]//Proc.of the 2003 ACM SIGMOD Intl.Conf.on Management of Data,San Diego,California,USA,2003:134-144.
  • 3Chung C,Min J,Shim K.APEX:An adaptive path index for XML data[C]//Proc.of the 2002 ACM SIGMOD Intl.Conf.on Management of Data,Madison,Wisconsin,2002:121-132.
  • 4Milo T,Suciu D.Index structures for path expressions[C]//7th International Conference on Database Theory,Jerusalem,Israel,1999:277-255.
  • 5Quanzhong Li,Bongki Moon.Indexing and Querying XML Data for Regular Path Expressions[C]//Proceedings of the 27th VLDB Conference,Roma,Italy,2001:361-370.
  • 6Roy Goldman,Jennifer Widom.DataGuide:enabling query formulation and optimization in semistructured databases[C]//23th International Conference on Very Large Data Bases,pages,Athens,Greece,1997:436-445.
  • 7Al-khalifa Bruno N,Koudas N,Srivastava D.Holistic Twig Joins:Optimal XML Pattern Matching[C]//Franklin M J et al Eds.Proceedings of the 21th ACM SIGMOD International Conference on Management of Data.Madison,Wisconsin,USA,2002:310-321.S,Jagadish HV,Koudas N.Structural Joins:A Primitive for Efficient XML Query Pattern Matching.In:Hiong Ngu A H et al Eds.Proceedings of the 18th IEEE ICDE International Conference on Data Engineering.California,USA,2002:141-152.
  • 8Chien S Y,Vagena Z,Zhang Donghui,et al.Efficient Structural Joins on Indexed XML Document[C]//Papadias D et al Eds.Proceedings of the 28th VLDB International Conference on Very Large Database.Hong Kong,China,2002:263-274.
  • 9Bruno N,Koudas N,Srivastava D.Holistic Twig Joins:Optimal XML Pattern Matching[C]//Franklin M J et al Eds.Proceedings of the 21th ACM SIGMOD International Conference on Management of Data.Madison,Wisconsin,USA,2002:310-321.
  • 10莎士比亚戏剧集XML数据集.Shakespeare XML data sets.Available at:ftp:// sunsite.unc.edu/pub/sun info/standards/XML/egs/.

共引文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部