Qian Wang
Security feature measurement for frequent dynamic execution paths in software system
Wang, Qian; Ren, Jiadong; Yang, Xiaoli; Cheng, Yongqiang; Davis, Darryl N.; Hu, Changzhen
Authors
Jiadong Ren
Xiaoli Yang
Yongqiang Cheng
Darryl N. Davis
Changzhen Hu
Abstract
© 2018 Qian Wang et al. The scale and complexity of software systems are constantly increasing, imposing new challenges for software fault location and daily maintenance. In this paper, the Security Feature measurement algorithm of Frequent dynamic execution Paths in Software, SFFPS, is proposed to provide a basis for improving the security and reliability of software. First, the dynamic execution of a complex software system is mapped onto a complex network model and sequence model. This, combined with the invocation and dependency relationships between function nodes, fault cumulative effect, and spread effect, can be analyzed. The function node security features of the software complex network are defined and measured according to the degree distribution and global step attenuation factor. Finally, frequent software execution paths are mined and weighted, and security metrics of the frequent paths are obtained and sorted. The experimental results show that SFFPS has good time performance and scalability, and the security features of the important paths in the software can be effectively measured. This study provides a guide for the research of defect propagation, software reliability, and software integration testing.
Citation
Wang, Q., Ren, J., Yang, X., Cheng, Y., Davis, D. N., & Hu, C. (2018). Security feature measurement for frequent dynamic execution paths in software system. Security and communication networks, 2018, 1-10. https://doi.org/10.1155/2018/5716878
Journal Article Type | Article |
---|---|
Acceptance Date | Feb 19, 2018 |
Online Publication Date | Mar 22, 2018 |
Publication Date | Mar 22, 2018 |
Deposit Date | Mar 23, 2018 |
Publicly Available Date | Mar 26, 2018 |
Journal | Security and Communication Networks |
Print ISSN | 1939-0114 |
Publisher | Hindawi |
Peer Reviewed | Peer Reviewed |
Volume | 2018 |
Article Number | 5716878 |
Pages | 1-10 |
DOI | https://doi.org/10.1155/2018/5716878 |
Keywords | Computer Networks and Communications; Information Systems |
Public URL | https://hull-repository.worktribe.com/output/753648 |
Publisher URL | https://www.hindawi.com/journals/scn/contents/ |
Contract Date | Mar 26, 2018 |
Files
Article
(1.7 Mb)
PDF
Copyright Statement
© 2018 Qian Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
You might also like
Mining frequent biological sequences based on bitmap without candidate sequence generation
(2015)
Journal Article
A multi-agent decision support system for stock trading
(2002)
Journal Article
Control states and complete agent architectures
(2001)
Journal Article
A "Society of Mind" cognitive architecture based on the principles of artificial economics
(2010)
Journal Article
Generating and verifying risk prediction models using data mining
(2009)
Book Chapter
Downloadable Citations
About Repository@Hull
Administrator e-mail: repository@hull.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search