Function-call Network Reliability of Kernel in Android Operating System

被引:0
|
作者
Sun, Pengfei [1 ]
lai, ZhongDe [2 ]
Yao, Anzhuo [1 ]
Yang, Shunkun [1 ]
Li, Daqing [1 ]
机构
[1] Beihang Univ, Sch Reliabil & Syst Engn, Beijing, Peoples R China
[2] Huawei Technol Co Ltd, Shanghai, Peoples R China
来源
2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS) | 2019年
基金
中国国家自然科学基金;
关键词
Complex Network; Android OS Kernel; Topological Features; Reliability Analysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Operating systems are critical infrastructures for the information systems. Malfunction of certain function component can induce unexpected risks and countless damage for the computing service based on the operating systems. While it is critical for understanding the failure mechanism of operating system, it remains unclear how the function components interact with each other. Here we study these interactions in the kernel of Android OS by modeling the operating system as a complex network. In this network, each node represents a function and links are various call relationship between them. With community analysis, we find three different relations between the topological statistics and the community size. To reveal the organization vulnerability in different scale, we also perform the percolation analysis and identify the critical structures of this software networks. Our findings may help to understand the system complexity and design corresponding software testing methods.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Evolution of Function-Call Network Reliability in Android Operating System
    Yao, Anzhuo
    Sun, Pengfei
    Yang, Shunkun
    Li, Daqing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (04) : 1264 - 1275
  • [2] The empirical analysis of function-call graph
    Guo, Yang
    Zhao, Zhengxu
    ADVANCES IN APPLIED SCIENCE AND INDUSTRIAL TECHNOLOGY, PTS 1 AND 2, 2013, 798-799 : 663 - +
  • [3] AIT: A method for operating system kernel function call graph generation with a virtualization technique
    Jiao, Longlong
    Luo, Senlin
    Liu, Wangtong
    Pan, Limin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (05): : 2084 - 2100
  • [4] Research on Software Vulnerability Testing Based on Function-Call
    Zeng, Fanping
    Chen, Minghui
    Yin, Kaitao
    Wang, Xufa
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 564 - 568
  • [5] IoT malware classification based on reinterpreted function-call graphs
    Wu, Chia-Yi
    Ban, Tao
    Cheng, Shin-Ming
    Takahashi, Takeshi
    Inoue, Daisuke
    COMPUTERS & SECURITY, 2023, 125
  • [6] Support for the safety of EVM bytecode via function-call interceptor
    Kim, Jisoo
    Cho, Eun-Sun
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 676 - 684
  • [7] Analysis of function-call graphs of open-source software systems using complex network analysis
    Tunali, Volkan
    Tuysuz, Mehmet Ali Aksoy
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2020, 26 (02): : 352 - 358
  • [8] Welcome to Binder: A Kernel Level Attack Model for the Binder in Android Operating System
    Salehi, Majid
    Daryabar, Farid
    Tadayon, Mohammad Hesam
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 156 - 161
  • [9] Large-Scale Malware Indexing Using Function-Call Graphs
    Hu, Xin
    Chiueh, Tzi-cker
    Shin, Kang G.
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 611 - 620
  • [10] Toward efficient and accurate function-call graph matching of binary codes
    Huang, DongXing
    Tang, Yong
    Wang, Yi
    Wei, ShuNing
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):