The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model ...
详细信息
The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model will monitor the Web server host resources, and finally discusses in detail the design and implementation of resource monitoring system. Intrusion detection model proposed can effectively regulate the behavior of users in this paper, allowing users follow a pre-standard service to call service providers, largely to protect the security of Web services.
作者:
ROSEN, BKIBM CORP
THOMAS J WATSON RES CTRDEPT COMP SCIYORKTOWN HTSNY 10598
In contrast to the predominant use of low-level intermediate text, high-level data flow analysis deals with programs essentially at source level and exploits the controlflow information implicit in the parse tree. Th...
详细信息
In contrast to the predominant use of low-level intermediate text, high-level data flow analysis deals with programs essentially at source level and exploits the controlflow information implicit in the parse tree. The need for high-level flow analysis arises from several aspects of recent work on advanced methods of program certification and optimization. This paper proposes a simple general method of high-level data flow analysis that allows free use of escape and jump statements, avoids large graphs when compiling large programs, facilitates updating of data flow information to reflect program changes, and derives new global information helpful in solving many familiar global flow analysis problems. An illustrative application to live variable analysis is presented. Many of the graphs involved are constructed and analyzed before any programs are compiled, thus avoiding certain costs that low-level methods incur repeatedly at compile time. [ABSTRACT FROM AUTHOR]
The quantity and significance of web application increases ***,the influence of vulnerabilities in web application grows as *** tools are urgently needed because manual code reviews are inefficient and ***,previous st...
详细信息
The quantity and significance of web application increases ***,the influence of vulnerabilities in web application grows as *** tools are urgently needed because manual code reviews are inefficient and ***,previous static code detection tools lack of alias analysis between variables in codes,leading to possible false positives or false *** solve this problem,we propose a set of sound and precise alias analysis algorithms which can conduct intraprocedural and interprocedural alias *** we apply them to a previous static detection *** on practical open source web applications and manually written test cases show that system with alias analysis can handle complex alias relationship accurately and detect vulnerabilities related to alias with greater ***,alias analysis' s impact on scanning speed of the system is negligible.
In this paper we propose to use software classes as actual components and to build the control flow graph to represent software architecture using suffix tree. The proposed model of dynamic collection and storage of r...
详细信息
ISBN:
(纸本)9781467364614
In this paper we propose to use software classes as actual components and to build the control flow graph to represent software architecture using suffix tree. The proposed model of dynamic collection and storage of reliability testing data using high order Markov chains results in less memory usage than matrix representation and allows easy dynamic changes of Markov process order. As an example of the model we suggest to use new pattern based on Composite design pattern.
controlflow is the basis of program analysis and comprehension,and the reconstruction of controlflow is the start and sticking point in Firm-Code Reversing *** contrast with structured binary executable file (PE,ELF...
详细信息
controlflow is the basis of program analysis and comprehension,and the reconstruction of controlflow is the start and sticking point in Firm-Code Reversing *** contrast with structured binary executable file (PE,ELF,etc.),firm-code is unstructured and mixed-coded,which makes it unsuitable to use traditional controlflow reconstruction algorithm in the controlflow reconstruction of *** researchers have been working on Firm-Code Reversing Analysis for a long time and solved many problems such as distinction between instructions and data in binary code,calculus of destination address in transform instruction using indirect addressing mode,recovery of jump table and so on,whereas the problem of reconstructing controlflow from binary code with mixed codec mode is rarely *** this paper,we study binary code with mixed codec mode,present a controlflow reconstruction algorithm for it and then analyze the time complexity of the algorithm.
Basis path testing is an important test method in white box *** method generates a set of linearly independent paths,which we called basis paths,from control flow graph (CFG) and all the other paths can be expressed b...
详细信息
Basis path testing is an important test method in white box *** method generates a set of linearly independent paths,which we called basis paths,from control flow graph (CFG) and all the other paths can be expressed by ***,when applying these basis paths to designing test cases,we will always find that some of them are infeasible when understanding from business *** this paper we put forward a new idea to simply CFG,at the same time to avoid the generation of infeasible paths in the set of basis paths.
Satellite-borne embedded systems require the properties of low-powered and reliability in the spatial radiation environment The controlflow checking is an effective way for the running systems to prevent the broken-d...
详细信息
Satellite-borne embedded systems require the properties of low-powered and reliability in the spatial radiation environment The controlflow checking is an effective way for the running systems to prevent the broken-down caused by Single Event *** software controlflow checking uses a great deal of branch instructions to detect errors, thus brings great overhead in power *** this paper, a partition method of basic block is *** this partition method, branch instructions are reduced greatly, while the high error detection coverage remain *** simulated results show that compared with the traditional controlflow Checking by Software Signatures(CFCSS) controlflow checking algorithm, the Improved algorithm can reduce total branch instructions by over 10%, reduce the power dissipation by nearly 9%, without decreasing the error detection coverage.
Program analysis is the heart of modern compilers. Most controlflow analyses are reduced to the problem of finding a fixed point in a certain transition system, and such fixed point is commonly computed through an it...
详细信息
ISBN:
(纸本)9781581137569
Program analysis is the heart of modern compilers. Most controlflow analyses are reduced to the problem of finding a fixed point in a certain transition system, and such fixed point is commonly computed through an iterative procedure that repeats tracing until *** paper proposes a new method to analyze programs through recursive graph traversals instead of iterative procedures, based on the fact that most programs (without spaghetti GOTO) have well-structured control flow graphs, graphs with bounded tree width. Our main techniques are; an algebraic construction of a control flow graph, called SP Term, which enables controlflow analysis to be defined in a natural recursive form, and the Optimization Theorem, which enables us to compute optimal solution by dynamic *** illustrate our method with two examples; dead code detection and register allocation. Different from the traditional standard iterative solution, our dead code detection is described as a simple combination of bottom-up and top-down traversals on SP Term. Register allocation is more interesting, as it further requires optimality of the result. We show how the Optimization Theorem on SP Terms works to find an optimal register allocation as a certain dynamic programming.
For real-time systems,in order to provide the basis for schedulability analysis,it is crucial to obtain Worst-Case Execution Time (WCET) of applications,which is very challenging due to the possible runtime inter-th...
详细信息
For real-time systems,in order to provide the basis for schedulability analysis,it is crucial to obtain Worst-Case Execution Time (WCET) of applications,which is very challenging due to the possible runtime inter-thread interferences caused by shared resources in multi-core *** multi-core platforms with shared cache,instructions of a thread may be evicted by another co-running thread,which results in the interferences in shared *** need to consider the interferences while analyzing WCET of threads on multi-core *** paper proposes a novel approach to analyzing the worst-case cache interferences based on instruction fetching timing,while judging the interferences status through instruction fetching timing *** paper presents an algorithm for instruction fetching timing based on Depth-First-Search in controlflow *** approach can reasonably estimate runtime inter-thread interferences in shared cache by introducing timing relations analysis into address mapping *** show that our proposed approach improves the tightness of WCET estimation by 19.244% on average.
Information about which pairs of statements in a program can be executed concurrently is important for improving the accuracy of dataflow analysis, optimizing programs, and detecting errors. This paper presents a new ...
详细信息
ISBN:
(纸本)9781581133929
Information about which pairs of statements in a program can be executed concurrently is important for improving the accuracy of dataflow analysis, optimizing programs, and detecting errors. This paper presents a new method named Concurrent control flow graph for representing concurrent Ada 95 programs in a simple and precise way. Based on this method, we develop an Adapted MHP algorithm that can statically detect all pairs of statements that may be executed concurrently. This algorithm checks not only whether a rendezvous can be triggered, but also whether it can be finished. Although this algorithm generates a conservative superset of the perfect pairs of statements, it is more precise than many existing methods.
暂无评论