2019
DOI: 10.1109/access.2019.2943896
|View full text |Cite
|
Sign up to set email alerts
|

An Optimized Static Propositional Function Model to Detect Software Vulnerability

Abstract: Due to the lack of appropriate theory to accurately characterize vulnerabilities, the current static detection technologies have two key challenges, i.e., limited applicability, and the problem of state space explosion. In this paper, we put forward a static detection model based on the proposition function. Furthermore, a new program intermediate representation called Vulnerability Executable Path Set (VEPS) is proposed to optimize our model which compresses the program state space distinctly. In addition, in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 32 publications
(32 reference statements)
0
4
0
Order By: Relevance
“…Wibowo et al (2017) investigated the Architectural Vulnerability Factor (AVF) of all major in-core memory structures of an out-of-order superscalar processor while Sultana and Williams (2017) used micro patterns detect vulnerability in software. Ziems and Wu (2021) and Paradis et al, (2018) modelled test as a source code and used it for software vulnerability detection in natural language processing (NLP), Han et al (2019) proposed a static detection model, while Choi et al (2020) developed Cyber-Physical Inconsistency to target vulnerability detection in Robotic Vehicles (RVs).…”
Section: Analysis and Resultsmentioning
confidence: 99%
“…Wibowo et al (2017) investigated the Architectural Vulnerability Factor (AVF) of all major in-core memory structures of an out-of-order superscalar processor while Sultana and Williams (2017) used micro patterns detect vulnerability in software. Ziems and Wu (2021) and Paradis et al, (2018) modelled test as a source code and used it for software vulnerability detection in natural language processing (NLP), Han et al (2019) proposed a static detection model, while Choi et al (2020) developed Cyber-Physical Inconsistency to target vulnerability detection in Robotic Vehicles (RVs).…”
Section: Analysis and Resultsmentioning
confidence: 99%
“…The number of vulnerabilities is greater because Shodan knows more specific organization data and can relate a more significant number of known vulnerabilities. Because Shodan is a secure software and its documentation only describes the variable "tag" for the query processes and not in the response processes, we have limited ourselves to verify its existence in order to assign a risk value for the prioritization process [21,40]. Since the quality of information exposed in Shodan provides more significant value in knowledge and investigation for cybercriminals [20,22], the risk increases when this variable called "tags" has some content.…”
Section: Probability Of Open Ports (Pop)mentioning
confidence: 99%
“…A review of existing related work in this area indicates that vulnerability detection is still a challenging area for software developers. Han et al [76] proposes that one of the reasons that the currently available static 7. Related work -SRA detection technologies have limited applicability and the problem of state space explosion (the exponential increase in the size of system state space with growing number of state variables) is the lack of appropriate theory to accurately characterize vulnerabilities.…”
Section: Vulnerability Detection and Knowledge Sharingmentioning
confidence: 99%
“…We found the basic idea of describing a vulnerability in terms of its preconditions, characteristics, and decision rules to be similar to VCGs, where every path from the top cause in the graph, down to the vulnerability is describing a possible execution path that leads to the existence of a vulnerability. Han et al [76] refers to our vulnerability modeling technique as a structured method for analyzing and recording the causes of software vulnerabilities. VCGs are described as one of the detection frameworks for vulnerability positioning and discrimination.…”
Section: Vulnerability Detection and Knowledge Sharingmentioning
confidence: 99%