Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Applying dataflow analysis to detecting software vulnerability

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Hyunha-
dc.contributor.authorChoi, Tae hyoung-
dc.contributor.authorJung, Seung cheol-
dc.contributor.authorKim, Hyoung cheol-
dc.contributor.authorLee, Oukseh-
dc.contributor.authorDoh, Kyung-Goo-
dc.date.accessioned2021-06-23T18:03:20Z-
dc.date.available2021-06-23T18:03:20Z-
dc.date.created2021-02-18-
dc.date.issued2008-02-
dc.identifier.issn1738-9445-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/42663-
dc.description.abstractIn this paper, we propose a software vulnerability checker which takes rules describing vulnerability patterns and a source program as input and detects locations and paths of the patterns in the program. Simple and flow patterns for vulnerabilities are described as rules in the specification language we designed. The lightweight control and data flow analysis is necessary to detect flow patterns. Newly discovered vulnerability patterns can easily be added to the existing rules. We implement the detector in three parts: a pattern matcher which finds locations of vulnerabilities in source program, a flow graph constructor which extracts the control flow and data flow from the program, and a flow analyzer which finds program’s vulnerable execution paths.-
dc.language영어-
dc.language.isoen-
dc.titleApplying dataflow analysis to detecting software vulnerability-
dc.typeArticle-
dc.contributor.affiliatedAuthorDoh, Kyung-Goo-
dc.identifier.doi10.1109/ICACT.2008.4493756-
dc.identifier.scopusid2-s2.0-44249118596-
dc.identifier.wosid000254974600048-
dc.identifier.bibliographicCitationInternational Conference on Advanced Communication Technology, ICACT, pp.255 - 258-
dc.relation.isPartOfInternational Conference on Advanced Communication Technology, ICACT-
dc.citation.titleInternational Conference on Advanced Communication Technology, ICACT-
dc.citation.startPage255-
dc.citation.endPage258-
dc.type.rimsART-
dc.description.journalClass3-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassother-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorDataflow analysis-
dc.subject.keywordAuthorSoftware vulnerability-
dc.subject.keywordAuthorStatic analysis-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/4493756/-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > SCHOOL OF COMPUTER SCIENCE > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE