8031 Microcontroller Software Vulnerability Detection Algorithm Based on Vulnerability Knowledge Database

Chun Shan, Gao Peng Jing, Chang Zhen Hu, Jing Feng Xue, Jin Zhao He

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

The 8031 microcontroller software are currently used widely and its security issue become increasingly prominent. In view of this, the authoritative vulnerability databases were studied, extracted knowledge from attacks through a rule of ECV, classified security vulnerabilities according to the type and characteristics based code security, designed three-tier structure vulnerability knowledge database, and proposed a knowledge-based vulnerability detection algorithm based on the vulnerability knowledge library to detect the vulnerability of 8031 microcontroller. Designed and implemented a software security reverse-analysis system for 8031 binary program, and the effectiveness and availability of the vulnerability knowledge database and the rule of ECV were verified. The experimental result shows that the algorithm can correctly detect the target program vulnerability, having great significant in reducing the number of software vulnerabilities and saving lots of cost in detecting software vulnerability.

Original languageEnglish
Pages (from-to)371-375
Number of pages5
JournalBeijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology
Volume37
Issue number4
DOIs
Publication statusPublished - 1 Apr 2017

Keywords

  • 8031 microcontroller
  • Software security
  • Vulnerability detection
  • Vulnerability knowledge database

Fingerprint

Dive into the research topics of '8031 Microcontroller Software Vulnerability Detection Algorithm Based on Vulnerability Knowledge Database'. Together they form a unique fingerprint.

Cite this

Shan, C., Jing, G. P., Hu, C. Z., Xue, J. F., & He, J. Z. (2017). 8031 Microcontroller Software Vulnerability Detection Algorithm Based on Vulnerability Knowledge Database. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 37(4), 371-375. https://doi.org/10.15918/j.tbit1001-0645.2017.04.008