Software detection method based on running state

Xiaolin Zhao, Quanbao Chen, Chun Shan, Ting Wang, Yiman Zhang

Research output: Contribution to journalConference articlepeer-review

Abstract

It is extremely important for the study of software behavior modeling for software security research. This article determines whether the security of software operation by analyzing the credibility of software behavior, monitoring software running status. This paper focuses on a modeling algorithm, namely the GK-tail algorithm, which based on software behavior modeling method. At the same time, this paper improves the GK-tail algorithm, which focuses on data constraints and the interaction between software components. Restrictions on extending finite automaton can be obtained by using a combination of Daikon and ESC/JAVA tools. Restrictions can improve the accuracy of the generated model. So the generated behavior model can capture more accurate information. Finally, the paper designs and implements the software running state generator. It is feasible through the software state diagram to determine the feasibility of software security proved by the experiment.

Original languageEnglish
Article number012071
JournalJournal of Physics: Conference Series
Volume887
Issue number1
DOIs
Publication statusPublished - 8 Sept 2017
Event2nd Annual International Conference on Information System and Artificial Intelligence, ISAI 2017 - Tianjin, China
Duration: 14 Jul 201716 Jul 2017

Fingerprint

Dive into the research topics of 'Software detection method based on running state'. Together they form a unique fingerprint.

Cite this