Data-flow based vulnerability analysis and java bytecode

  • Authors:
  • Hua Chen;Tao Zou;Dongxia Wang

  • Affiliations:
  • Beijing Institute of System Engineering, Beijing, PRC China;Beijing Institute of System Engineering, Beijing, PRC China;Beijing Institute of System Engineering, Beijing, PRC China

  • Venue:
  • ACS'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7
  • Year:
  • 2007

Quantified Score

Hi-index 0.01

Visualization

Abstract

The security of information systems has been the focus because of network applications. Vulnerability analysis is widely used to evaluate the security of a system to assure system security. With the help of vulnerability analysis, the security risk of a system can be predicted so that the countermeasures are arranged in advance. These will promote system security effectively. The object of vulnerability analysis is to find out the unknown security holes in a system. It could be helpful to understand the characteristics of security holes and to assess the security risk of a system. Data-flow based analysis shows its predominance in vulnerability analysis because the vulnerability is data-flow dependent. The paper discusses how to use data-flow analysis in vulnerability analysis. The way to apply data-flow analysis in Java bytecode vulnerability analyzing is presented.