Software defect based method for quantificationally estimating software credibility

A quantitative evaluation and software defect technology, applied in platform integrity maintenance, instruments, electrical digital data processing, etc., can solve problems that are difficult to quantify, and achieve the effect of reducing costs

Inactive Publication Date: 2010-09-01
TIANJIN UNIV
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing software credibility assessment methods are all for software products, and it is difficult to quantify

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software defect based method for quantificationally estimating software credibility
  • Software defect based method for quantificationally estimating software credibility
  • Software defect based method for quantificationally estimating software credibility

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] 1. The exact positioning of the problem:

[0025] Although there is no consensus on the precise definition of trustworthiness, conceptually, trustworthiness can be positioned as a guarantee that a system should be trusted: whether it is due to environmental interference, human error, malicious attack or design and implementation errors. In all cases, the system behaves as expected. Properties covered by this definition include: correctness, reliability, security (secrecy, confidentiality, integrity, availability), privacy security, and fault tolerance [3] Wait. The precise definition of the above concepts can be found in the literature [3], and the hierarchical relationship between them is as follows: figure 1 shown.

[0026] Correctness is a property closely related to software attacks, which can be evaluated through model checking and functional testing; reliability refers to the ability of software to provide stable services, and can be evaluated through performan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of software security and relates to a software defect based method for quantificationally estimating software credibility. The method comprises steps of: classifying each defect according to a credible definition; confirming attack modes probably existed in each defect; confirming corresponding threaten degree levels of the attack modes in high and low damage degrees by analyzing the damage degree caused by the involved attack modes; selecting corresponding threaten degree with the maximum quantitative degree as the defect damage degree of the defect in each probably existed attack mode of each defect; confirming the level of an impact factor of each defect to the whole software according to the influence degree of each defect to the software; and for some kinds of defects, confirming the credibility metric of the defects according to a credibility metric formula. The method enables a developer to more clearly understand the security problem their software products face and improves the weakness of the product again till the effect is satisfied.

Description

technical field [0001] The invention takes the trustworthy nature of software as the main research object, devotes itself to quantifying and measuring the trustworthy nature and degree of trustworthiness of software, and belongs to the field of software security. Background technique [0002] With the rapid development of the software industry in the information age, software has penetrated into all aspects of modern life. However, the information industry has caused a lot of security risks while making more users feel convenient. How to guarantee the service quality and service quality of the software has naturally become a major issue of concern to the majority of users. In this context, the importance of information security technology is self-evident, and the concept of trusted software and related technologies have emerged as the times require. [0003] Compared with the United States and some European countries, my country's research on trusted software started relati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/50
Inventor 李晓红胡昌王翔宇杜洪伟曹燕
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products