354 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author이욱세-
dc.date.accessioned2019-05-16T05:21:57Z-
dc.date.available2019-05-16T05:21:57Z-
dc.date.issued2008-02-
dc.identifier.citation2008 10th International Conference on Advanced Communication Technology, Page. 255-258en_US
dc.identifier.issn1738-9445-
dc.identifier.urihttps://ieeexplore.ieee.org/document/4493756-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/104326-
dc.description.abstractIn this paper, we propose a software vulnerability checker which takes rules describing vulnerability patterns and a source program as input and detects locations and paths of the patterns in the program. Simple and flow patterns for vulnerabilities are described as rules in the specification language we designed. The lightweight control and data flow analysis is necessary to detect flow patterns. Newly discovered vulnerability patterns can easily be added to the existing rules. We implement the detector in three parts: a pattern matcher which finds locations of vulnerabilities in source program, a flow graph constructor which extracts the control flow and data flow from the program, and a flow analyzer which finds program's vulnerable execution paths.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.subjectDataflow analysisen_US
dc.subjectSoftware vulnerabilityen_US
dc.subjectStatic analysisen_US
dc.titleApplying Dataflow Analysis to Detecting Software Vulnerabilityen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/ICACT.2008.4493756-
dc.contributor.googleauthorKim, Hyunha-
dc.contributor.googleauthorChoi, Tae-Hyoung-
dc.contributor.googleauthorJung, Seung-Cheol-
dc.contributor.googleauthorKim, Hyoung-Cheol-
dc.contributor.googleauthorLee, Oukseh-
dc.contributor.googleauthorDoh, Kyung-Goo-
dc.sector.campusE-
dc.sector.daehakCOLLEGE OF ENGINEERING SCIENCES[E]-
dc.sector.departmentDEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING-
dc.identifier.pidoukseh-
Appears in Collections:
COLLEGE OF ENGINEERING SCIENCES[E](공학대학) > COMPUTER SCIENCE AND ENGINEERING(컴퓨터공학과) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE