A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects

Software security defects have a serious impact on the software quality and reliability. It is a major hidden danger for the operation of a system that a software system has some security flaws. When the scale of the software increases, its vulnerability has becoming much more difficult to find out....

Full description

Bibliographic Details
Main Authors: Hui He, Dongyan Zhang, Min Liu, Weizhe Zhang, Dongmin Gao
Format: Article
Language:English
Published: Hindawi Limited 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/463912
id doaj-981e2251b78a4ffeb5d62dd5239f928a
record_format Article
spelling doaj-981e2251b78a4ffeb5d62dd5239f928a2020-11-25T00:40:29ZengHindawi LimitedThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/463912463912A Coverage and Slicing Dependencies Analysis for Seeking Software Security DefectsHui He0Dongyan Zhang1Min Liu2Weizhe Zhang3Dongmin Gao4School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, ChinaDepartment of Computer Science and Technology, University of Science and Technology Beijing, Beijing, ChinaSchool of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, ChinaSchool of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, ChinaSchool of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, ChinaSoftware security defects have a serious impact on the software quality and reliability. It is a major hidden danger for the operation of a system that a software system has some security flaws. When the scale of the software increases, its vulnerability has becoming much more difficult to find out. Once these vulnerabilities are exploited, it may lead to great loss. In this situation, the concept of Software Assurance is carried out by some experts. And the automated fault localization technique is a part of the research of Software Assurance. Currently, automated fault localization method includes coverage based fault localization (CBFL) and program slicing. Both of the methods have their own location advantages and defects. In this paper, we have put forward a new method, named Reverse Data Dependence Analysis Model, which integrates the two methods by analyzing the program structure. On this basis, we finally proposed a new automated fault localization method. This method not only is automation lossless but also changes the basic location unit into single sentence, which makes the location effect more accurate. Through several experiments, we proved that our method is more effective. Furthermore, we analyzed the effectiveness among these existing methods and different faults.http://dx.doi.org/10.1155/2014/463912
collection DOAJ
language English
format Article
sources DOAJ
author Hui He
Dongyan Zhang
Min Liu
Weizhe Zhang
Dongmin Gao
spellingShingle Hui He
Dongyan Zhang
Min Liu
Weizhe Zhang
Dongmin Gao
A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
The Scientific World Journal
author_facet Hui He
Dongyan Zhang
Min Liu
Weizhe Zhang
Dongmin Gao
author_sort Hui He
title A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
title_short A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
title_full A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
title_fullStr A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
title_full_unstemmed A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
title_sort coverage and slicing dependencies analysis for seeking software security defects
publisher Hindawi Limited
series The Scientific World Journal
issn 2356-6140
1537-744X
publishDate 2014-01-01
description Software security defects have a serious impact on the software quality and reliability. It is a major hidden danger for the operation of a system that a software system has some security flaws. When the scale of the software increases, its vulnerability has becoming much more difficult to find out. Once these vulnerabilities are exploited, it may lead to great loss. In this situation, the concept of Software Assurance is carried out by some experts. And the automated fault localization technique is a part of the research of Software Assurance. Currently, automated fault localization method includes coverage based fault localization (CBFL) and program slicing. Both of the methods have their own location advantages and defects. In this paper, we have put forward a new method, named Reverse Data Dependence Analysis Model, which integrates the two methods by analyzing the program structure. On this basis, we finally proposed a new automated fault localization method. This method not only is automation lossless but also changes the basic location unit into single sentence, which makes the location effect more accurate. Through several experiments, we proved that our method is more effective. Furthermore, we analyzed the effectiveness among these existing methods and different faults.
url http://dx.doi.org/10.1155/2014/463912
work_keys_str_mv AT huihe acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
AT dongyanzhang acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
AT minliu acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
AT weizhezhang acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
AT dongmingao acoverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
AT huihe coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
AT dongyanzhang coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
AT minliu coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
AT weizhezhang coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
AT dongmingao coverageandslicingdependenciesanalysisforseekingsoftwaresecuritydefects
_version_ 1725289844554334208