Cargando…
A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
Software security defects have a serious impact on the software quality and reliability. It is a major hidden danger for the operation of a system that a software system has some security flaws. When the scale of the software increases, its vulnerability has becoming much more difficult to find out....
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3996880/ https://www.ncbi.nlm.nih.gov/pubmed/24982957 http://dx.doi.org/10.1155/2014/463912 |
_version_ | 1782313111141744640 |
---|---|
author | He, Hui Zhang, Dongyan Liu, Min Zhang, Weizhe Gao, Dongmin |
author_facet | He, Hui Zhang, Dongyan Liu, Min Zhang, Weizhe Gao, Dongmin |
author_sort | He, Hui |
collection | PubMed |
description | Software security defects have a serious impact on the software quality and reliability. It is a major hidden danger for the operation of a system that a software system has some security flaws. When the scale of the software increases, its vulnerability has becoming much more difficult to find out. Once these vulnerabilities are exploited, it may lead to great loss. In this situation, the concept of Software Assurance is carried out by some experts. And the automated fault localization technique is a part of the research of Software Assurance. Currently, automated fault localization method includes coverage based fault localization (CBFL) and program slicing. Both of the methods have their own location advantages and defects. In this paper, we have put forward a new method, named Reverse Data Dependence Analysis Model, which integrates the two methods by analyzing the program structure. On this basis, we finally proposed a new automated fault localization method. This method not only is automation lossless but also changes the basic location unit into single sentence, which makes the location effect more accurate. Through several experiments, we proved that our method is more effective. Furthermore, we analyzed the effectiveness among these existing methods and different faults. |
format | Online Article Text |
id | pubmed-3996880 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-39968802014-06-30 A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects He, Hui Zhang, Dongyan Liu, Min Zhang, Weizhe Gao, Dongmin ScientificWorldJournal Research Article Software security defects have a serious impact on the software quality and reliability. It is a major hidden danger for the operation of a system that a software system has some security flaws. When the scale of the software increases, its vulnerability has becoming much more difficult to find out. Once these vulnerabilities are exploited, it may lead to great loss. In this situation, the concept of Software Assurance is carried out by some experts. And the automated fault localization technique is a part of the research of Software Assurance. Currently, automated fault localization method includes coverage based fault localization (CBFL) and program slicing. Both of the methods have their own location advantages and defects. In this paper, we have put forward a new method, named Reverse Data Dependence Analysis Model, which integrates the two methods by analyzing the program structure. On this basis, we finally proposed a new automated fault localization method. This method not only is automation lossless but also changes the basic location unit into single sentence, which makes the location effect more accurate. Through several experiments, we proved that our method is more effective. Furthermore, we analyzed the effectiveness among these existing methods and different faults. Hindawi Publishing Corporation 2014 2014-04-02 /pmc/articles/PMC3996880/ /pubmed/24982957 http://dx.doi.org/10.1155/2014/463912 Text en Copyright © 2014 Hui He et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article He, Hui Zhang, Dongyan Liu, Min Zhang, Weizhe Gao, Dongmin A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects |
title | A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects |
title_full | A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects |
title_fullStr | A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects |
title_full_unstemmed | A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects |
title_short | A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects |
title_sort | coverage and slicing dependencies analysis for seeking software security defects |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3996880/ https://www.ncbi.nlm.nih.gov/pubmed/24982957 http://dx.doi.org/10.1155/2014/463912 |
work_keys_str_mv | AT hehui acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects AT zhangdongyan acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects AT liumin acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects AT zhangweizhe acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects AT gaodongmin acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects AT hehui coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects AT zhangdongyan coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects AT liumin coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects AT zhangweizhe coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects AT gaodongmin coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects |