An Optimized Static Propositional Function Model to Detect Software Vulnerability
نویسندگان
چکیده
منابع مشابه
Teaching Static Call Analysis to Detect Anomalous Software Behavior
Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and t...
متن کاملA New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation
The literature review shows software development projects often neither meet time deadlines, nor run within the allocated budgets. One common reason can be the inaccurate cost estimation process, although several approaches have been proposed in this field. Recent research studies suggest that in order to increase the accuracy of this process, estimation models have to be revised. The Construct...
متن کاملA Business Model to Detect Disease Outbreaks
Introduction: Every year several disease outbreaks, such as influenza-like illnesses (ILI) and other contagious illnesses, impose various costs to public and non-government agencies. Most of these expenses are due to not being ready to handle such disease outbreaks. An appropriate preparation will reduce the expenses. A system that is able to recognize these outbreaks can earn ...
متن کاملAn Approach to Static-Dynamic Software Analysis
Safety-critical software in industry is typically subjected to both dynamic testing as well as static program analysis. However, while testing is expensive to scale, static analysis is prone to false positives and/or false negatives. In this work we propose a solution based on a combination of static analysis to zoom into potential bug candidates in large code bases and symbolic execution to co...
متن کاملOpen Source Software Detection using Function-level Static Software Birthmark
As open-source software (OSS) is widely used, many IT organizations adopt OSS without obeying some guidelines for open-source license agreements. To reduce risks related to open-source licenses, the organizations should meet the requirements for OSS licenses. Because some OSS components may be given from major upstream suppliers in binary form, it is very hard to verify whether a binary program...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2943896