...
首页> 外文期刊>Computers, Materials & Continua >Automatic Mining of Security-Sensitive Functions from Source Code
【24h】

Automatic Mining of Security-Sensitive Functions from Source Code

机译:从源代码自动挖掘安全敏感功能

获取原文
获取原文并翻译 | 示例

摘要

When dealing with the large-scale program, many automatic vulnerability mining techniques encounter such problems as path explosion, state explosion, and low efficiency. Decomposition of large-scale programs based on safety-sensitive functions helps solve the above problems. And manual identification of security-sensitive functions is a tedious task, especially for the large-scale program. This study proposes a method to mine security-sensitive functions the arguments of which need to be checked before they are called. Two argument-checking identification algorithms are proposed based on the analysis of two implementations of argument checking. Based on these algorithms, security-sensitive functions are detected based on the ratio of invocation instances the arguments of which have been protected to the total number of instances. The results of experiments on three well-known open-source projects show that the proposed method can outperform competing methods in the literature.
机译:在处理大型程序时,许多自动漏洞挖掘技术会遇到路径爆炸,状态爆炸和效率低下等问题。基于安全敏感功能的大型程序的分解有助于解决上述问题。手动识别安全敏感功能是一项繁琐的任务,尤其是对于大型程序而言。这项研究提出了一种挖掘安全敏感功能的方法,在调用它们之前需要检查其参数。在分析两种参数检查实现的基础上,提出了两种参数检查识别算法。基于这些算法,可以根据调用实例的参数与实例总数之比来检测对安全敏感的函数。在三个著名的开源项目上的实验结果表明,该方法可以胜过文献中的竞争方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号