A vulnerability detection model for java systems based on complex networks

Ling Xiong, Shan Chun*, Changzhen Hu, Zijun Yu, Wenjie Xiong

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)
Plum Print visual indicator of research metrics
  • Citations
    • Citation Indexes: 1
  • Captures
    • Readers: 6
see details

Abstract

With the deepening of research on network theory, scientists have gradually begun to adopt complex networks to look at complex systems in nature. A complex network is a network of a large number of closely related and interacting units. This paper believes that each component of the software can be abstracted into various algebraic components. These algebraic components are assembled into a software system. Its assembly process satisfies the configuration and fit characteristics in the topological space. Using algebraic components as the vertices of complex network graphs, the connection relationship between them is taken as the edge of the complex network graph. Using this new perspective, the software system is regarded as a complex network graph composed of algebraic components and their connection relationships. We have proved that the software system can be abstracted into the form of algebraic component expressions, and can find algebraic components that may have vulnerabilities based on the eigenvalues of complex networks.

Original languageEnglish
Title of host publicationProceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1339-1347
Number of pages9
ISBN (Electronic)9781728140346
DOIs
Publication statusPublished - Aug 2019
Event2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019 - Leicester, United Kingdom
Duration: 19 Aug 201923 Aug 2019

Publication series

NameProceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019

Conference

Conference2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019
Country/TerritoryUnited Kingdom
CityLeicester
Period19/08/1923/08/19

Keywords

  • Algebraic components
  • Complex network
  • Component representation
  • Software security
  • Vulnerability discovery

Fingerprint

Dive into the research topics of 'A vulnerability detection model for java systems based on complex networks'. Together they form a unique fingerprint.

Cite this

Xiong, L., Chun, S., Hu, C., Yu, Z., & Xiong, W. (2019). A vulnerability detection model for java systems based on complex networks. In Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019 (pp. 1339-1347). Article 9060132 (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00246