This paper presents a new automated directed fuzzing technique. First, the behavior information is extracted from the original complex control flow graph (CFG) by using the dynamic symbolic execution. Then, the case t...
详细信息
ISBN:
(纸本)9780769549354
This paper presents a new automated directed fuzzing technique. First, the behavior information is extracted from the original complex control flow graph (CFG) by using the dynamic symbolic execution. Then, the case theory is used to establish the access control model for the access objects. Subsequently, to describe some access properties of the objects while a program is running, we present a controlflow based Extended Program Behavior model with Finite-State Machine controlled parameters (EPBFSM) by adding constraints to the controlflow model. Finally, the new fuzzed inputs are generated by resolving the constraints resulting from the EPBFSM. By combining the program behavior with the security model, we can find not only the possible path-aware vulnerabilities but also the possible access control objects-aware vulnerabilities.
Many applications exhibit iterative and phase based behavior. We present an approach to detect and analyze iteration phases in applications by recording the control flow graph of the application and analyzing it for l...
详细信息
ISBN:
(纸本)9783540693888
Many applications exhibit iterative and phase based behavior. We present an approach to detect and analyze iteration phases in applications by recording the control flow graph of the application and analyzing it for loops that represent iterations. Phases are then manually marked and performance profiles are captured in alignment with the iterations. By analyzing: how profiles change between capture points, differences in execution behavior between iterations can be uncovered.
Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect diffe...
详细信息
Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect different use cases. This paper presents an approach to identify base flows and alternative flows of different use cases by traversing control flow graph in which back edges are eliminated. The effectiveness of the approach is verified by identification of the use case structure of an ATM system. The workload of human intervention of the approach is relatively slight, and the manner of human intervention closely follows the usual process of software comprehension.
Software testing is a complex and exhaustive process, often limited by the resources. Although many approaches for test sequence generation exist in the literature, but none of it is ideal as far as coverage and redun...
详细信息
ISBN:
(纸本)9781509035434
Software testing is a complex and exhaustive process, often limited by the resources. Although many approaches for test sequence generation exist in the literature, but none of it is ideal as far as coverage and redundancy is concerned. This paper aims at improving the efficiency of software testing process by generating the optimal test sequences in the control flow graph (CFG) of the program under test (PUT) by using a novel swarm intelligence method called River Formation Dynamics(RFD). RFD is inspired by a natural phenomenon of how drops transformed into river and river into sea. It provides full path coverage with zero edge/transition redundancy. It also tries to prioritize the paths based on their strength, calculated in terms of their traversal by the drops.
The malware is not the strange word. As much again the threat and number of malware is raising. However we and vendors do not arrange these malwares. They store these malware. The reason is the number is so many and t...
详细信息
ISBN:
(纸本)9783642271410
The malware is not the strange word. As much again the threat and number of malware is raising. However we and vendors do not arrange these malwares. They store these malware. The reason is the number is so many and the detail analysis is impossible. Therefore some researchers or vendor implemented the behavior based analysis system. However, these systems just analyze malware and do not arrangement. Although there are some arrangement or detection algorithms, there are just results of paper and are not implemented. In this paper, we propose the more available algorithm. The proposed algorithm is the updated version of the CFG (control flow graph) based algorithm.
To detect the vulnerabilities of Web applications which based on the PHP scripting language. This paper proposes a PHP vulnerability detection method based on fine-grained taint analysis algorithm. First of all, this ...
详细信息
ISBN:
(纸本)9781509030125
To detect the vulnerabilities of Web applications which based on the PHP scripting language. This paper proposes a PHP vulnerability detection method based on fine-grained taint analysis algorithm. First of all, this article generates the Abstract Syntax Tree by lexical and grammatical analysis on the PHP, and then produces the corresponding control flow graph. At last, performing taint analysis on the control flow graph. By tracking the program parameters, variables and other external input, marking the input type, propagating to various types of vulnerability function via the taint, and finally according to the tainted types of variable which are outputted to identify the vulnerabilities. We tested 16 programs of Damm Vulnerable Web App and found nine known vulnerabilities.
Static analysis of programs is essential for better understanding towards software maintenance and re-engineering. Unfortunately, we still lack automatic tools to understand the back end of the programs (Bytecode). De...
详细信息
ISBN:
(纸本)9789811068751;9789811068744
Static analysis of programs is essential for better understanding towards software maintenance and re-engineering. Unfortunately, we still lack automatic tools to understand the back end of the programs (Bytecode). Developing these tools is very expensive and time-consuming task but it is today's need. Those tools may help to understand Java Bytecode. Some time source code is not available all the time but bytecode is easily available. Unfortunately, bytecode is not understandable by many of us so that we are providing a little effort in this regard. This article represents the program flow execution in Java Bytecode. We present static and dynamic path executions of programs in a bytecode using control flow graph (CFG) and Data Dependence graph (DDG). Bytecode analysis is an effort to develop a tool which can make visualization of Java programs in back end form.
COBOL (Common Business-Oriented Language) has had a strong presence for the last five decades and is still prevalent in the finance and banking sectors and other organizations. The systems which were earlier written i...
详细信息
ISBN:
(数字)9781665479561
ISBN:
(纸本)9781665479561
COBOL (Common Business-Oriented Language) has had a strong presence for the last five decades and is still prevalent in the finance and banking sectors and other organizations. The systems which were earlier written in COBOL have now become legacy systems. Therefore, it has become essential to maintain and migrate these legacy COBOL systems. These legacy systems on which companies rely consist of embedded logic to run their business rules and day-to-day operations. Due to everchanging requirements, these business rules need to be revisited and updated regularly. Understanding the code that enforces the business rules is critical for system evolution. However, this is time-consuming, laborious, and error-prone. Also, the documentation of these systems is sometimes inadequate and may be inconsistent with current organizational policies. Furthermore, the number of current-age developers working on COBOL has been drastically reduced, and they are mainly unfamiliar with legacy systems. To aid this, we propose a tool called COBREX to extract COBOL business rules using a CFG-based approach. The tool's main aim is to help the researchers and practitioners to understand COBOL source code by extracting and comprehending the business rules. The demo of the tool can be found here - https://***/3QODmOkISL0 and the details of the tool can be found here - https://***/COBREXdoc/.
Many complexity measures have been introduced to capture different aspects of code complexity. A factor that (in most cases) increases the difficulty of code is the excessive use of nesting constructs. In this work, w...
详细信息
ISBN:
(纸本)9781467388450
Many complexity measures have been introduced to capture different aspects of code complexity. A factor that (in most cases) increases the difficulty of code is the excessive use of nesting constructs. In this work, we examine the difficulty created by nesting constructs in object oriented programs. We concentrate on measuring the scope of predicate (selection) statements within a method and between different methods by employing a new model named the control call inheritance graph (CCI). Unlike classic control flow graphs, the CCI graph captures the flow of control between the different statements of a method, between the different statements of different methods, and the flow created by inheritance relationships among different classes.
The "profitability" of code optimizations is defined in terms of a Markov model of program flow. A system of linear equations for the expected frequency of execution of blocks of a program is derived. A solu...
详细信息
暂无评论