Rule-based system for vulnerability detection of software

被引:0
作者
Cho, Sung-Hoon [1 ]
Jang, Chang-Bok [1 ]
Lee, Moo-Hun [1 ]
Choi, Eui-In [1 ]
机构
[1] Hannam Univ, Dept Comp Engn, Taejon, South Korea
来源
Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B | 2005年 / 4A-4B卷
关键词
rule; vulnerability detection; security; buffer-overflow; software vulnerability;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
IT infrastructure is expanding since computing and communication technologies are improved. However, this expansion takes place the security vulnerability because the reason of this problem is the software vulnerability. This problem is researched to resolve the security problem at many projects. But the perfect solution do not announce yet. The fundamental solution of software vulnerability is the development of secure software without the vulnerability. Thus this paper proposes the system for the detection of the software vulnerability. This system doesn't perform the simple pattern matching. Instead this system defines the vulnerability into a rule, analyses the structure of software and seeks the violation.
引用
收藏
页码:1630 / 1633
页数:4
相关论文
共 6 条
[1]  
COWAN C, 1988, P 7 USENIX SEC C JAN
[2]  
COWAN C, 2000, BUFFER OVERFLOWS ATT
[3]  
COWAN C, 7 USENIX SEC S
[4]  
COWAN C, 2003, 12 USENIX SEC S WASH
[5]  
FOSTER J, 2002, ACM C PROGR LANG DES, P1
[6]  
VIEGA J, 2000, ACM T INFORM SYSTEM