@inproceedings{bf10bf6fb69c4db9b7cd215b88c03a58,
title = "Research on software behavior modeling based on extended finite state automata",
abstract = "Software behavior modeling can be used for detecting anomalous behavior, verifying protocols, generating test cases, capturing unexpected event sequences and checking compatibility of program properties. In this paper, we introduce a method of software behavior modeling based on extended finite state automata, which is based on the existing software behavior modeling methods and focuses on constraints on data values and the interaction traces between software components. We combine Daikon and ESC/JAVA tools to obtain the constraints on extended finite state automata edges so that the accuracy of the model can be improved. We have implemented a software behavior modeling system using this method. Experiments results show that this model can capture many more and more accurate information and provide a good guarantee for the software analysis, verification and testing.",
keywords = "Behavior modeling, Finite state automata, Invocation sequences, Software security",
author = "Xiaolin Zhao and Jingfeng Xue and Changzhen Hu and Rui Ma and Shanshan Zhang",
year = "2014",
doi = "10.1049/cp.2014.0744",
language = "English",
isbn = "9781849198448",
series = "IET Conference Publications",
publisher = "Institution of Engineering and Technology",
number = "CP653",
booktitle = "IET Conference Publications",
address = "United Kingdom",
edition = "CP653",
note = "2014 Communications Security Conference, CSC 2014 ; Conference date: 22-05-2014 Through 24-05-2014",
}