• DocumentCode
    3028678
  • Title

    Reverse Analysis and Vulnerability Detection for Network System Software

  • Author

    Pan, Wei ; Li, Weihua

  • Author_Institution
    Sch. of Comput. Sci., Northwestern Polytech. Univ., Xi´´an, China
  • fYear
    2009
  • fDate
    10-12 Aug. 2009
  • Firstpage
    451
  • Lastpage
    456
  • Abstract
    In information era advocating ubiquitous computing, computing resources are susceptible to attack without guaranteeing security of network system. It is necessary and desirable for network system to employ powerful safeguard to protect itself against diversified vulnerabilities. In this paper, we present reverse analysis and vulnerability detection for network system software (RAVDNSS), a novel approach which uses reverse analysis and vulnerability detection technologies to deal with security problems on critical network system. Adaptive reverse analysis we propose is used to dig out potential vulnerabilities, which might be abused by unauthorized and unlawful communities. A new vulnerability detection model is designed to provide safety precautions through detecting vulnerabilities and monitoring program behaviors. Our investigation aims to improve the ability to guard network system against malicious attacks. The proposed schemes demonstrate that our approach can effectively perform security detection and management of network system software.
  • Keywords
    reverse engineering; security of data; software management; system monitoring; ubiquitous computing; adaptive reverse analysis; computing resources; malicious attacks; network system software management; program behavior monitoring; safety precautions; security detection; ubiquitous computing; vulnerabilities detection; vulnerability detection technologies; Adaptive systems; Computer networks; Information security; Monitoring; Pervasive computing; Power system protection; Power system security; Safety; System software; Ubiquitous computing; executable program; network system; reverse analysis; software security; vulnerabitliy detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Parallel and Distributed Processing with Applications, 2009 IEEE International Symposium on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-0-7695-3747-4
  • Type

    conf

  • DOI
    10.1109/ISPA.2009.73
  • Filename
    5207900