Security Patterns From Intelligent Data: A Map of Software Vulnerability Analysis

被引:1
作者
Sun Jinan [1 ]
Pan Kefeng [2 ]
Chen Xuefeng [1 ]
Zhang Junfu [3 ]
机构
[1] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
[2] Westone Informat Ind Co Ltd, Beijing, Peoples R China
[3] Beida Software Engn Co Ltd, Beijing, Peoples R China
来源
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2017年
关键词
software vulnerability; program analysis; intelligent data; security vulnerability; DYNAMIC-ANALYSIS; TAXONOMY;
D O I
10.1109/BigDataSecurity.2017.9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A significant milestone is reached when the field of software vulnerability research matures to a point warranting related security patterns represented by intelligent data. A substantial research material of empirical findings, distinctive taxonomy, theoretical models, and a set of novel or adapted detection methods justify a unifying research map. The growth interest in software vulnerability is evident from a large number of works done during the last several decades. This article briefly reviews research works in vulnerability enumeration, taxonomy, models and detection methods from the perspective of intelligent data processing and analysis. This article also draws the map which associated with specific characteristics and challenges of vulnerability research, such as vulnerability patterns representation and problem-solving strategies.
引用
收藏
页码:18 / 25
页数:8
相关论文
共 61 条
[1]  
Abbott R. P., 1976, TECH REP
[2]  
Aggarwal A, 2006, P INT COMP SOFTW APP, P343
[3]  
Agrawal A., 2009, ACM SIGSOFT SOFTWARE, V34
[4]  
Almorsy M, 2012, IEEE INT CONF AUTOM, P100, DOI 10.1145/2351676.2351691
[5]  
[Anonymous], 2013, THESIS
[6]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[7]   Saner: Composing static and dynamic analysis to validate sanitization in web applications [J].
Balzarotti, Davide ;
Cova, Marco ;
Felmetsger, Vika ;
Jovanovic, Nenad ;
Kirda, Engin ;
Kruegel, Christopher ;
Vigna, Giovanni .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :387-+
[8]  
Bazaz A., 2007, P 40 ANN HAW INT C S
[9]  
Bibsey R., 1978, 7813 ISISR
[10]   Source code analysis: A road map [J].
Binkley, David .
FoSE 2007: Future of Software Engineering, 2007, :104-119