A discovery method of the dirty data transmission path based on complex network

Xiao Lin Zhao, Gang Hao, Chang Zhen Hu, Zhi Qiang Li*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the increasing scale of software system, the interaction between software elements becomes more and more complex, which lead to the increased dirty data in running software system. This may reduce the system performance and cause system collapse. In this paper, we proposed a discovery method of the dirty data transmission path based on complex network. Firstly, the binary file is decompiled and the function call graph is drawn by using the source code. Then the software structure is described as a weighted directed graph based on the knowledge of complex network. In addition, the dirty data node is marked by using the power-law distribution characteristics of the scale-free network construction of complex network chart. Finally, we found the dirty data transmission path during software running process. The experimental results show the transmission path of dirty data is accurate, which confirmed the feasibility of the method.

Original languageEnglish
Title of host publicationMaterial Science, Civil Engineering and Architecture Science, Mechanical Engineering and Manufacturing Technology II
EditorsH.W. Liu, G. Wang, G.W. Zhang
PublisherTrans Tech Publications Ltd.
Pages1741-1747
Number of pages7
ISBN (Electronic)9783038352679
DOIs
Publication statusPublished - 2014
Event3rd International Conference on Advanced Engineering Materials and Architecture Science, ICAEMAS 2014 - Huhhot, China
Duration: 26 Jul 201427 Jul 2014

Publication series

NameApplied Mechanics and Materials
Volume651-653
ISSN (Print)1660-9336
ISSN (Electronic)1662-7482

Conference

Conference3rd International Conference on Advanced Engineering Materials and Architecture Science, ICAEMAS 2014
Country/TerritoryChina
CityHuhhot
Period26/07/1427/07/14

Keywords

  • Complex network
  • Decompilation
  • Dirty data
  • Function call

Fingerprint

Dive into the research topics of 'A discovery method of the dirty data transmission path based on complex network'. Together they form a unique fingerprint.

Cite this