Vulnerability Detection in Remote Code Execution A Survey
نویسندگان
چکیده
منابع مشابه
Mobility and Remote-Code Execution
Using an adapted analysis grid, this paper presents a new reading of the concepts underlying the mobile code/agent technology by proposing a decomposition of the paradigms related to remote-code execution into three categories: remote-code calling, remote code-loading and mobile code. Models resulting from this decomposition are specified and implemented using a uniform execution system. A dist...
متن کاملRemote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization purposes. This is rather restrictive as, while away from these fixed computers, such mobile devices may require resources that are not available (e.g. network bandwidth, processing power or storage space). This lack of ...
متن کاملVulnerability Measure of a Network - a Survey
In this paper we discuss about tenacity and its properties in stability calculation. We indicate relationships between tenacity and connectivity, tenacity and binding number, tenacity and toughness. We also give good lower and upper bounds for tenacity. Since we are primarily interested in the case where disruption of the graph is caused by the removal of a vertex or vertices (and the resulting...
متن کاملStatically-Guided Fork-based Symbolic Execution for Vulnerability Detection
Fork-based symbolic execution would waste large amounts of computing time and resource on invulnerable paths when applied to vulnerability detection. In this paper, we propose a statically-guided fork-based symbolic execution technique for vulnerability detection to mitigate this problem. In static analysis, we collect all valid jumps along vulnerable paths, and define the priority for each pro...
متن کاملExecution Path Classification for Vulnerability Analysis and Detection
Various commercial and open-source tools exist, developed both by the industry and academic groups, which are able to detect various types of security bugs in applications’ source code. However, most of these tools are prone to non-negligible rates of false positives and false negatives, since they are designed to detect a priori specified types of bugs. Also, their analysis scalability to larg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2014
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2014.31044