Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for analyzing safety property of software based on sequence clustering

A sequence clustering and software security technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems affecting the quality of the vulnerability knowledge base and difficulty in collecting software vulnerability sequence sets

Inactive Publication Date: 2011-03-30
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a software security feature analysis method based on clustering technology, aiming at the difficulty in collecting high-quality software vulnerability sequence sets, affecting the quality of the vulnerability knowledge base, and the problems that inappropriate similarity measures affect the accuracy of vulnerability detection. Use sequence clustering technology to analyze software vulnerability sequence sets, mine software vulnerability patterns, and improve the quality of vulnerability knowledge base; design a similarity measure based on edit distance to improve the accuracy of vulnerability detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for analyzing safety property of software based on sequence clustering
  • Method for analyzing safety property of software based on sequence clustering
  • Method for analyzing safety property of software based on sequence clustering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The technical solutions of the present invention will be described in detail below in combination with specific embodiments.

[0045] 1. Randomly select 6 vulnerability sequences from the collected software vulnerability sequences and preprocess them to create a software vulnerability sequence database, as shown in Table 1.

[0046] Table 1 Software Vulnerability Sequence Database SVSD

[0047]

[0048] 2. Using sequence clustering technology to mine the vulnerability patterns in the software vulnerability sequence database, the specific operation steps are as follows,

[0049] ①Set the value of K to 2, that is, the vulnerability sequence in SVSD is divided into two vulnerability patterns, and the two vulnerability sequences in the software vulnerability sequence database are selected as the initial central sequence of the vulnerability pattern, here S is selected 1 Vulnerability mode P 1 The initial center sequence of S 2 Vulnerability mode P 2 The initial cente...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for analyzing the safety property of software based on sequence clustering. Based on reverse software bug analysis technology, the quality of a bug knowledge base and the analysis efficiency of software bugs are improved by collecting the conventional software bugs, preprocessing the software bugs, saving a processed software bug program operation sequence in a software bug sequence database, classifying the software sequences in the software bug sequence database by an integral sequence similarity-based clustering algorithm and saving the classified sequences in the bug knowledge base; and the accuracy of the software bug detection is improved by analyzing a suspected software bug sequence extracted from to-be-detected software, measuring similarity level between the sequences by using the logic distance-based similarity measurement and analyzing the software bug.

Description

Technical field: [0001] The invention relates to a method for analyzing software safety characteristics, in particular to a method for analyzing software safety characteristics based on sequence clustering, which belongs to the field of computer software safety. Background technique: [0002] With the continuous development of computer applications, software has penetrated into various fields of national economy and national defense construction. Any security loopholes in the software will seriously threaten the safety of life and property. How to dig out the security loopholes in the software comprehensively, effectively and accurately is the fundamental way to solve this problem. [0003] In recent years, scholars at home and abroad have done a lot of research on software security issues, and put forward some methods of mining software vulnerabilities. [0004] Salas proposed a model-based security vulnerability detection framework, because other model-based methods ignor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
Inventor 胡昌振任家东王崑声蔡斌雷吴迪
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products