A rule-based security auditing tool for software vulnerability detection

被引:0
|
作者
Lee, Moohun
Cho, Sunghoon
Jang, Changbok
Park, Heeyong
Choi, Euiin
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its reverse function is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area In addition, they can not detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based security auditing tool that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing tool can construct secure ubiquitous computing environment, because it will be used by a common software audit tool that detects malicious codes and software vulnerabilities at the same time.
引用
收藏
页码:505 / 512
页数:8
相关论文
共 50 条
  • [1] Rule-Based Auditing System for Software Security Assurance
    Jang, Changbok
    Kim, Jeongseok
    Jang, Hyokyung
    Park, Sundo
    Jang, Bokman
    Kim, Bonghoi
    Choi, Euiin
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 198 - +
  • [2] Rule-based system for vulnerability detection of software
    Cho, Sung-Hoon
    Jang, Chang-Bok
    Lee, Moo-Hun
    Choi, Eui-In
    [J]. Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1630 - 1633
  • [3] Fault detection in Rule-based Software systems
    Wang, D
    Hao, RB
    Lee, D
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (12) : 865 - 871
  • [4] Rule-based noise detection for software measurement data
    Khoshgoftaar, TM
    Seliya, N
    Gao, K
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 302 - 307
  • [5] Rule-based topological vulnerability analysis
    Swarup, V
    Jajodia, S
    Pamula, J
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 23 - 37
  • [6] Rule-based systems security model
    Smirnov, M
    [J]. COMPUTER NETWORK SECURITY, 2003, 2776 : 135 - 146
  • [7] Auditing system using rule-based reasoning in ubiquitous computing
    Lee, Moohun
    Clio, Sunghoon
    Chang, Hyokyung
    Jo, Junghee
    Jung, Hoiyoung
    Choi, Euiin
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCES AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 261 - +
  • [8] Ciruvis: a web-based tool for rule networks and interaction detection using rule-based classifiers
    Susanne Bornelöv
    Simon Marillet
    Jan Komorowski
    [J]. BMC Bioinformatics, 15
  • [9] Ciruvis: a web-based tool for rule networks and interaction detection using rule-based classifiers
    Bornelov, Susanne
    Marillet, Simon
    Komorowski, Jan
    [J]. BMC BIOINFORMATICS, 2014, 15
  • [10] Rule-Based Detection of Anomalous Patterns in Device Behavior for Explainable IoT Security
    Costa, Gianni
    Forestiero, Agostino
    Ortale, Riccardo
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4514 - 4525