RETRACTED: Software Vulnerability Mining Techniques Based on Data Fusion and Reverse Engineering (Retracted Article)

被引:1
|
作者
Liu, Tieming [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
关键词
Codes (symbols) - Network security - Reverse engineering - Static analysis;
D O I
10.1155/2022/4329034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software vulnerability mining is an important component of network attack and defense technology. To address the problems of high leakage rate and false positive rate of existing static analysis methods, this paper proposes a static analysis vulnerability detection technique based on data fusion for source code. By parsing the analysis results of different detection methods and fusing the data, the technique can effectively reduce the false positive rate and the false positive rate. A prototype of a scalable source code static analysis tool is designed and implemented, which can be automatically optimized by user feedback. Finally, an example is given to demonstrate how to uncover buffer overflow software vulnerabilities in the helpctr program based on reverse engineering techniques. The experimental results show that the false positive and false negative rates are significantly reduced compared to individual vulnerability detection methods.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] RETRACTED: Construction of Tourism Management Engineering Based on Data Mining Technology (Retracted Article)
    Ma, Zhichen
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2022, 2022
  • [2] RETRACTED: A review on bioinformatics using data mining techniques (Retracted Article)
    Deepthi, P. Naga
    Anitha, Raju
    Swathi, K.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [3] RETRACTED: The Explore of Some Cases with the Data Mining Techniques (Retracted Article)
    Gu, Shen-Ming
    Zheng, Yun
    Guan, Lin-Ting
    Zhuang, Yue-Ting
    [J]. ICECT: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY, PROCEEDINGS, 2009, : 59 - +
  • [4] RETRACTED: Design of Multiobjective Dynamic Software Development Based on Data Mining Algorithm (Retracted Article)
    Cai, Zhaohui
    Li, Hongbo
    Cui, Wensheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] RETRACTED: Network Teaching Technology Based on Big Data Mining and Information Fusion (Retracted Article)
    Du, Yishan
    Zhao, Tianzhong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] RETRACTED: Application of Data Mining in Network Information Dynamic Push Software (Retracted Article)
    Hong, Xiaoyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [7] RETRACTED: Learning Behavior Based on Data Mining Technology (Retracted Article)
    Wang, Jing
    Zhang, Qiuhong
    Guan, Meijing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] RETRACTED: CRM Customer Value Based On Data Mining (Retracted Article)
    Ling, Xu
    Li, Song
    Jie, Li
    [J]. THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 32 - 37
  • [9] RETRACTED: Research on Reverse Engineering for Plastic Operation (Retracted Article)
    Lv Yutao
    Yi Jinhui
    Liu Yang
    Zhao Lei
    Zhang Yugang
    Chen Jungu
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 389 - +
  • [10] RETRACTED: Data Mining Algorithm for Power User Network Based on Multi-Information Fusion (Retracted Article)
    Huang, Shutong
    [J]. INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2022, 2022