TY - GEN
T1 - A vulnerability detection model for java systems based on complex networks
AU - Xiong, Ling
AU - Chun, Shan
AU - Hu, Changzhen
AU - Yu, Zijun
AU - Xiong, Wenjie
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/8
Y1 - 2019/8
N2 - With the deepening of research on network theory, scientists have gradually begun to adopt complex networks to look at complex systems in nature. A complex network is a network of a large number of closely related and interacting units. This paper believes that each component of the software can be abstracted into various algebraic components. These algebraic components are assembled into a software system. Its assembly process satisfies the configuration and fit characteristics in the topological space. Using algebraic components as the vertices of complex network graphs, the connection relationship between them is taken as the edge of the complex network graph. Using this new perspective, the software system is regarded as a complex network graph composed of algebraic components and their connection relationships. We have proved that the software system can be abstracted into the form of algebraic component expressions, and can find algebraic components that may have vulnerabilities based on the eigenvalues of complex networks.
AB - With the deepening of research on network theory, scientists have gradually begun to adopt complex networks to look at complex systems in nature. A complex network is a network of a large number of closely related and interacting units. This paper believes that each component of the software can be abstracted into various algebraic components. These algebraic components are assembled into a software system. Its assembly process satisfies the configuration and fit characteristics in the topological space. Using algebraic components as the vertices of complex network graphs, the connection relationship between them is taken as the edge of the complex network graph. Using this new perspective, the software system is regarded as a complex network graph composed of algebraic components and their connection relationships. We have proved that the software system can be abstracted into the form of algebraic component expressions, and can find algebraic components that may have vulnerabilities based on the eigenvalues of complex networks.
KW - Algebraic components
KW - Complex network
KW - Component representation
KW - Software security
KW - Vulnerability discovery
UR - http://www.scopus.com/inward/record.url?scp=85083592180&partnerID=8YFLogxK
U2 - 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00246
DO - 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00246
M3 - Conference contribution
AN - SCOPUS:85083592180
T3 - Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019
SP - 1339
EP - 1347
BT - Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019
Y2 - 19 August 2019 through 23 August 2019
ER -