Software Vulnerability Mining Techniques Based on Data Fusion and Reverse Engineering

2Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Software vulnerability mining is an important component of network attack and defense technology. To address the problems of high leakage rate and false positive rate of existing static analysis methods, this paper proposes a static analysis vulnerability detection technique based on data fusion for source code. By parsing the analysis results of different detection methods and fusing the data, the technique can effectively reduce the false positive rate and the false positive rate. A prototype of a scalable source code static analysis tool is designed and implemented, which can be automatically optimized by user feedback. Finally, an example is given to demonstrate how to uncover buffer overflow software vulnerabilities in the helpctr program based on reverse engineering techniques. The experimental results show that the false positive and false negative rates are significantly reduced compared to individual vulnerability detection methods.

Cite

CITATION STYLE

APA

Liu, T. (2022). Software Vulnerability Mining Techniques Based on Data Fusion and Reverse Engineering. Wireless Communications and Mobile Computing, 2022. https://doi.org/10.1155/2022/4329034

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free