Vulnerability Detection in Remote Code Execution A Survey

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobility and Remote-Code Execution

Using an adapted analysis grid, this paper presents a new reading of the concepts underlying the mobile code/agent technology by proposing a decomposition of the paradigms related to remote-code execution into three categories: remote-code calling, remote code-loading and mobile code. Models resulting from this decomposition are specified and implemented using a uniform execution system. A dist...

متن کامل

Remote Code Execution on Ubiquitous Mobile Applications

Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization purposes. This is rather restrictive as, while away from these fixed computers, such mobile devices may require resources that are not available (e.g. network bandwidth, processing power or storage space). This lack of ...

متن کامل

Vulnerability Measure of a Network - a Survey

In this paper we discuss about tenacity and its properties in stability calculation. We indicate relationships between tenacity and connectivity, tenacity and binding number, tenacity and toughness. We also give good lower and upper bounds for tenacity. Since we are primarily interested in the case where disruption of the graph is caused by the removal of a vertex or vertices (and the resulting...

متن کامل

Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection

Fork-based symbolic execution would waste large amounts of computing time and resource on invulnerable paths when applied to vulnerability detection. In this paper, we propose a statically-guided fork-based symbolic execution technique for vulnerability detection to mitigate this problem. In static analysis, we collect all valid jumps along vulnerable paths, and define the priority for each pro...

متن کامل

Execution Path Classification for Vulnerability Analysis and Detection

Various commercial and open-source tools exist, developed both by the industry and academic groups, which are able to detect various types of security bugs in applications’ source code. However, most of these tools are prone to non-negligible rates of false positives and false negatives, since they are designed to detect a priori specified types of bugs. Also, their analysis scalability to larg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2014

ISSN: 2278-1021

DOI: 10.17148/ijarcce.2014.31044