SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Introducing function extraction into software testing
ACM SIGMIS Database
Computing the behavior of malicious code with function extraction technology
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Computing the behavior of malware
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
Invariant relations, invariant functions, and loop functions
Innovations in Systems and Software Engineering
Hi-index | 0.00 |
Malicious attacks on systems are a threat to business, government, and defense. Many attacks exploit system behavior unknown to the developers who created it. In today's state of art, software engineers have no practical means to determine how a sizable program will behave in all circumstances of use. This sobering reality lies at the heart of many problems in security and survivability. If full behavior is unknown, so too are embedded errors, vulnerabilities, and malicious code. This paper describes function-theoretic foundations for automated calculation of full program behavior. These foundations treat program control structures as mathematical functions or relations. The function, or behavior, of control structures can be abstracted in a stepwise process into procedure-free expressions that specify their net functional effects. Problems of computability and complexities of languagesemantics appear to have engineering solutions. Automated behavior calculation will add rigor to security and survivability engineering.