期刊文献+

常见源代码安全漏洞分析与研究 被引量:7

Common Source Code Vulnerability Analysis and Research
在线阅读 下载PDF
导出
摘要 源代码安全作为软件安全最为重要的安全点之一,是软件安全最底层的关键点。文章提出了源代码安全的一些常见的检测指标,结合SQL注入、跨站脚本、路径篡改和空指针4个比较常见的源代码安全漏洞对源代码安全进行了详细的分析研究。文章提出了源代码安全必须规避的一些基本方法,提高了源代码的安全和质量。 As one of the most important safety points in software security, source code security is the lowest key point of software security. This paper presents some of the common source code security testing indicators, carries out a detailed analysis on the four common source code security vulnerabilities of SQL injection, cross-site scripting, path tampering and null pointer. This paper proposes some basic methods that the source code security must circumvent to improve the safety and quality of the source code.
出处 《信息网络安全》 2014年第2期48-52,共5页 Netinfo Security
基金 国家科技支撑计划[H50B02]
关键词 源代码安全 应用安全 SQL注入 跨站脚本 source code security application security SQL injection cross site scripting
  • 相关文献

参考文献10

二级参考文献19

  • 1Li Z,Harman M,Hierons R M.Search algorithms for regression test case prioritization[J].IEEE Transactions on Software Engineering,2007,23(4):225-237.
  • 2Do H,Rothermel G.On the use of mutation faults in empirical as sessments of test case prioritization techniques[J].IEEE Transactions on Software Engineering,2006,32(9):733-752.
  • 3Do H,Rothermel G,Kinneer A.Empirical studies of test case prioritization in a JUnit testing environment[C].Lincoln,NE:Interuational Symposium of software Reliability Engineering,IEEE,2004:113-124.
  • 4Mirarab S,Tahvildari L.An empirical study on bayesian networkbased approach for test case prioritization[C].Lillehammer:1st International Conference on Software Testing,IEEE,2008:278-287.
  • 5Jones J A,Harrold M J.Test-suite reduction and prioritization for modified condition/decision coveragc[J].lEEE Transactions on Software Engineering,2003,29(3):195-209.
  • 6Zhang X,Nie C,Xu B,et al.Test case prioritization based on varying testing requirement priorities and test case costs[C].Portland,OR:7th International Conference on Quality Software,IEEE,2007:15-24.
  • 7Qu B,Nie C,Xu B.Test case prioritization for black box testing[C].Bcijing:31st Annual International Computer Sofhvarc and Applications Conference,IEEE,2007:465-474.
  • 8Lima L,Iyoda J,Sampaio A.Test case prioritization based on data reuse an experimental study[C].Lake Buena Vista,FL:3rd International Symposium on Empirical Software Engineering and Measurement,IEEE,2009:279-290.
  • 9Fazlalizadeh Y,Khalilian A,Azgomi M A.Prioritizing test cases for resource constraint environments using historical test case performance data[C].Beijing:2nd IEEE International Conference on Computer Science and Information Teclmology,IEEE,2009:190-195.
  • 10Park H,Ryu H,Baik J.Historical value-based approach for costcognizant test case prioritization to improve the effectiveness of regression testing[C].Yokohama:2nd Internatioual Conference on Secure System Integration and Reliability Improvement,IEEE,2008:39-46.

共引文献35

同被引文献75

  • 1忽朝俭,张甲,李舟军,时志伟,张.基于可执行代码的漏洞检测技术[J].清华大学学报(自然科学版),2009(S2):2176-2180. 被引量:2
  • 2李葆萍,李秀兰.网络课程的评价指标体系研究[J].中国电化教育,2004(11):65-68. 被引量:27
  • 3MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 4ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 5KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 6PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.
  • 7NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008.
  • 8XiongH, Liu Z, Xu W, et al. Libvmi: A Library for Bridging theSemantic Gap between vip OS and VMM[C]//Computer andInformation Technology (CIT), 2012 IEEE 12th International Conferenceon. IEEE, 2012: 549-556.
  • 9WangY, Hu C, Li B. Vmdetector: a VMM-based platform to detecthidden process by multi-view comparison[C]//High-Assurance SystemsEngineering (HASE), 2011 IEEE 13th International Symposium on. IEEE,2011: 307-312.
  • 10Li tty L, Lagar-CavilJa H A, Lie D. Hypervisor Support for IdentifyingCovertly Executing Binaries[C]//USENIX Security Symposium. 2008:243-258.

引证文献7

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部