TY - JOUR
T1 - Software detection method based on running state
AU - Zhao, Xiaolin
AU - Chen, Quanbao
AU - Shan, Chun
AU - Wang, Ting
AU - Zhang, Yiman
N1 - Publisher Copyright:
© Published under licence by IOP Publishing Ltd.
PY - 2017/9/8
Y1 - 2017/9/8
N2 - It is extremely important for the study of software behavior modeling for software security research. This article determines whether the security of software operation by analyzing the credibility of software behavior, monitoring software running status. This paper focuses on a modeling algorithm, namely the GK-tail algorithm, which based on software behavior modeling method. At the same time, this paper improves the GK-tail algorithm, which focuses on data constraints and the interaction between software components. Restrictions on extending finite automaton can be obtained by using a combination of Daikon and ESC/JAVA tools. Restrictions can improve the accuracy of the generated model. So the generated behavior model can capture more accurate information. Finally, the paper designs and implements the software running state generator. It is feasible through the software state diagram to determine the feasibility of software security proved by the experiment.
AB - It is extremely important for the study of software behavior modeling for software security research. This article determines whether the security of software operation by analyzing the credibility of software behavior, monitoring software running status. This paper focuses on a modeling algorithm, namely the GK-tail algorithm, which based on software behavior modeling method. At the same time, this paper improves the GK-tail algorithm, which focuses on data constraints and the interaction between software components. Restrictions on extending finite automaton can be obtained by using a combination of Daikon and ESC/JAVA tools. Restrictions can improve the accuracy of the generated model. So the generated behavior model can capture more accurate information. Finally, the paper designs and implements the software running state generator. It is feasible through the software state diagram to determine the feasibility of software security proved by the experiment.
UR - http://www.scopus.com/inward/record.url?scp=85030638011&partnerID=8YFLogxK
U2 - 10.1088/1742-6596/887/1/012071
DO - 10.1088/1742-6596/887/1/012071
M3 - Conference article
AN - SCOPUS:85030638011
SN - 1742-6588
VL - 887
JO - Journal of Physics: Conference Series
JF - Journal of Physics: Conference Series
IS - 1
M1 - 012071
T2 - 2nd Annual International Conference on Information System and Artificial Intelligence, ISAI 2017
Y2 - 14 July 2017 through 16 July 2017
ER -