A Dynamic Verification Model based on Information Flow Constraint

After analyzing the common attacks for some software systems, a dynamic software behavior verification model related with the unchecked input data based on software analysis and dynamic slicing technology is proposed. Regarding a statement as a basic analysis unit, and the information flow as the ma...

Full description

Bibliographic Details
Main Authors: Dan Wang, Yan Lu, Lihua Fu, Wenbing Zhao
Format: Article
Language:English
Published: Atlantis Press 2013-08-01
Series:International Journal of Computational Intelligence Systems
Subjects:
Online Access:https://www.atlantis-press.com/article/25868417.pdf
id doaj-b3c1b1ec9e0a4fc4a88f43e2bdaca2da
record_format Article
spelling doaj-b3c1b1ec9e0a4fc4a88f43e2bdaca2da2020-11-25T01:38:05ZengAtlantis PressInternational Journal of Computational Intelligence Systems 1875-68832013-08-016410.1080/18756891.2013.802878A Dynamic Verification Model based on Information Flow ConstraintDan WangYan LuLihua FuWenbing ZhaoAfter analyzing the common attacks for some software systems, a dynamic software behavior verification model related with the unchecked input data based on software analysis and dynamic slicing technology is proposed. Regarding a statement as a basic analysis unit, and the information flow as the main behavior of the software, the direction of the information flow of each statement is defined as its behavior specification, the information flow verification problem is converted into the verification for assigning variable address's validation. During the execution, behavior of the statements that use untrusted variable is monitored to verify whether the address modified by the statements belongs to the specification or not. If it is consistent with the specification, the execution of the statement is permitted. Based on the behavior model proposed, a method of extracting of the behavior specification was researched and a method of dynamic verification was designed. In order to prove for efficiency and performance of the model, the input data related behavior acquiring framework was implemented, and a set of tests were conducted. Preliminary results show the validity of the software's behavior model.https://www.atlantis-press.com/article/25868417.pdfprogramdynamicverificationinformation flow
collection DOAJ
language English
format Article
sources DOAJ
author Dan Wang
Yan Lu
Lihua Fu
Wenbing Zhao
spellingShingle Dan Wang
Yan Lu
Lihua Fu
Wenbing Zhao
A Dynamic Verification Model based on Information Flow Constraint
International Journal of Computational Intelligence Systems
program
dynamic
verification
information flow
author_facet Dan Wang
Yan Lu
Lihua Fu
Wenbing Zhao
author_sort Dan Wang
title A Dynamic Verification Model based on Information Flow Constraint
title_short A Dynamic Verification Model based on Information Flow Constraint
title_full A Dynamic Verification Model based on Information Flow Constraint
title_fullStr A Dynamic Verification Model based on Information Flow Constraint
title_full_unstemmed A Dynamic Verification Model based on Information Flow Constraint
title_sort dynamic verification model based on information flow constraint
publisher Atlantis Press
series International Journal of Computational Intelligence Systems
issn 1875-6883
publishDate 2013-08-01
description After analyzing the common attacks for some software systems, a dynamic software behavior verification model related with the unchecked input data based on software analysis and dynamic slicing technology is proposed. Regarding a statement as a basic analysis unit, and the information flow as the main behavior of the software, the direction of the information flow of each statement is defined as its behavior specification, the information flow verification problem is converted into the verification for assigning variable address's validation. During the execution, behavior of the statements that use untrusted variable is monitored to verify whether the address modified by the statements belongs to the specification or not. If it is consistent with the specification, the execution of the statement is permitted. Based on the behavior model proposed, a method of extracting of the behavior specification was researched and a method of dynamic verification was designed. In order to prove for efficiency and performance of the model, the input data related behavior acquiring framework was implemented, and a set of tests were conducted. Preliminary results show the validity of the software's behavior model.
topic program
dynamic
verification
information flow
url https://www.atlantis-press.com/article/25868417.pdf
work_keys_str_mv AT danwang adynamicverificationmodelbasedoninformationflowconstraint
AT yanlu adynamicverificationmodelbasedoninformationflowconstraint
AT lihuafu adynamicverificationmodelbasedoninformationflowconstraint
AT wenbingzhao adynamicverificationmodelbasedoninformationflowconstraint
AT danwang dynamicverificationmodelbasedoninformationflowconstraint
AT yanlu dynamicverificationmodelbasedoninformationflowconstraint
AT lihuafu dynamicverificationmodelbasedoninformationflowconstraint
AT wenbingzhao dynamicverificationmodelbasedoninformationflowconstraint
_version_ 1725055345015914496