Third-party component security testing method based on data mining

A technology of security testing and data mining, applied in software testing/debugging, electrical digital data processing, error detection/correction, etc., can solve problems such as untestable security issues, failure to achieve results, and inapplicability of third-party components. Achieve the effect of realizing automated testing and improving testing efficiency

Active Publication Date: 2017-01-04
JIANGSU UNIV
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these testing methods are mainly aimed at common components with source code or detailed requirements specifications, and are not suitable for third-party components, or cannot test some security issues related to functional behavior of components, and cannot achieve ideal results.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third-party component security testing method based on data mining
  • Third-party component security testing method based on data mining
  • Third-party component security testing method based on data mining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be further described below in conjunction with the accompanying drawings and examples. It should be noted that the described examples are only intended to facilitate the understanding of the present invention, and have no limiting effect on it.

[0047] The present invention aims to solve the problem of third-party component security testing, provides a third-party component security testing method based on data mining, effectively detects the implicit security loopholes and explicit security loopholes of third-party components, and provides a comprehensive The framework and algorithm are tested, and sufficient experiments are carried out to prove the feasibility and effectiveness of the method.

[0048] First, several concepts involved in the definition of the present invention are defined as follows.

[0049] Definition 1 Precondition: A series of constraints that must be met before the method is invoked. The constraints are composed of relati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a third-party component security testing method based on data mining. The method comprises steps as follows: 1, generating a method execution sequence set with a sequence generating algorithm according to effective component method names, method pre-conditions and post-conditions; 2, reading parameter boundary value files, assigning parameters of methods in the method execution sequences with a test case generating algorithm, and generating a test case set; 3, testing the components according to the generated test case set, recording state information during component operation, and generating a monitoring log set; 4, analyzing monitoring logs with a security vulnerability detecting algorithm to obtain a final component security vulnerability test result set. The method provides the model basis and the test criterion for the test of component security vulnerability and can be better applied to component security tests; besides, a third-party component security testing system based on data mining is also designed, automatic testing is well realized by the aid of the system, and the testing efficiency is improved.

Description

technical field [0001] The invention belongs to the field of third-party component safety testing and relates to a third-party component safety testing method based on data mining. Background technique [0002] With the vigorous development of software engineering technology, components have been widely used because of their reusable and "plug and play" characteristics. Component-based software engineering (Component-based Software Engineering, CBSE) also came into being, greatly improving the efficiency of software development, not only shortening the software development cycle, but also greatly reducing the cost of development and maintenance. Components play a vital role in software systems in various industries today. Therefore, the quality of components is particularly important. Low-quality components may cause the software system to collapse and bring irreparable consequences to various industries. To ensure the safety and reliability of components, they must be tes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3684G06F11/3688G06F11/3692
Inventor 陈锦富于敏杰赵小磊朱莉莉葛宏河黄如兵
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products