Data-flow based vulnerability analysis and Java']Java bytecode

被引:0
作者
Chen, Hua [1 ]
Zou, Tao [1 ]
Wang, Dongxia [1 ]
机构
[1] Beijing Inst Syst Engn, POB 9702-19, Beijing 100101, Peoples R China
来源
PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE: COMPUTER SCIENCE CHALLENGES | 2007年
关键词
program analysis; vulnerability; !text type='Java']Java[!/text] bytecode; data-flow analysis;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The security of information systems has been the focus because of network applications. Vulnerability analysis is widely used to evaluate the security of a system to assure system security. With the help of vulnerability analysis, the security risk of a system can be predicted so that the countermeasures are arranged in advance. These will promote system security effectively. The object of vulnerability analysis is to find out the unknown security holes in a system. It could be helpful to understand the characteristics of security holes and to assess the security risk of a system. Data-flow based analysis shows its predominance in vulnerability analysis because the vulnerability is data-flow dependent. The paper discusses how to use data-flow analysis in vulnerability analysis. The way to apply data-flow analysis in Java bytecode vulnerability analyzing is presented.
引用
收藏
页码:201 / +
页数:2
相关论文
共 14 条
[1]  
Aho Alfred V., 1986, ADDISON WESLEY SERIE
[2]  
Anley C., 2002, Advanced SQL injection in SQL server applications
[3]  
[Anonymous], JAVA PATHEXPLORER RU
[4]  
BLACK PE, 2006, IANEWSLETTER, V9
[5]  
CHRISTOPHER CN, 2006, ANAL SOFTWARE ARTIFA
[6]  
FARZEN A, 2004, FORMAL ANAL JAVA PRO
[7]  
HALDAR V, 2005, DYNAMIC TAINT PROPAG
[8]  
Kratkiewicz K.J, 2005, EVALUATING STATIC AN
[9]  
Livshits V. B., 2005, FINDING SECURITY VUL
[10]  
MARTIN M, 2005, FINDING APPL ERRORS