Software Vulnerability Discovery Techniques: A Survey

被引:64
|
作者
Liu, Bingchang [1 ]
Shi, Liang [1 ]
Cai, Zhuhua [1 ]
Li, Min [1 ]
机构
[1] Xiamen Univ, Software Sch, Xiamen, Peoples R China
关键词
Vulnerability; Software static analysis; Fuzzing; Penetration testing; vulnerability discovery model;
D O I
10.1109/MINES.2012.202
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software vulnerabilities are the root cause of computer security problem. How people can quickly discover vulnerabilities existing in a certain software has always been the focus of information security field. This paper has done research on software vulnerability techniques, including static analysis, Fuzzing, penetration testing. Besides, the authors also take vulnerability discovery models as an example of software vulnerability analysis methods which go hand in hand with vulnerability discovery techniques. The ending part of the paper analyses the advantages and disadvantages of each technique introduced here and talks about the future direction of this field.
引用
收藏
页码:152 / 156
页数:5
相关论文
共 50 条
  • [31] A SURVEY OF SOFTWARE-DESIGN TECHNIQUES
    YAU, SS
    TSAI, JJP
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1986, 12 (06) : 713 - 721
  • [32] A Survey of Practical Software Adaptation Techniques
    Kell, Stephen
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (13) : 2110 - 2157
  • [33] A Survey on Software Effort Estimation Techniques
    Rastogi, Himani
    Dhankar, Swati
    Kakkar, Misha
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 826 - 830
  • [34] A Survey of Automated Root Cause Analysis of Software Vulnerability
    Jurn, JeeSoo
    Kim, Taeeun
    Kim, Hwankuk
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 756 - 761
  • [35] A Survey of Vulnerability Detection Techniques by Smart Contract Tools
    Khan, Zulfiqar Ali
    Namin, Akbar Siami
    IEEE ACCESS, 2024, 12 : 70870 - 70910
  • [36] Survey of Machine Learning Techniques in Drug Discovery
    Stephenson, Natalie
    Shane, Emily
    Chase, Jessica
    Rowland, Jason
    Ries, David
    Justice, Nicola
    Zhang, Jie
    Chan, Leong
    Cao, Renzhi
    CURRENT DRUG METABOLISM, 2019, 20 (03) : 185 - 193
  • [37] Service discovery techniques in Internet of Things: a survey
    Zorgati, Hela
    Ben Djemaa, Raoudha
    Ben Amor, Ikram Amous
    2019 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2019, : 1720 - 1725
  • [38] Machine learning techniques for software vulnerability prediction: a comparative study
    Jabeen, Gul
    Rahim, Sabit
    Afzal, Wasif
    Khan, Dawar
    Khan, Aftab Ahmed
    Hussain, Zahid
    Bibi, Tehmina
    APPLIED INTELLIGENCE, 2022, 52 (15) : 17614 - 17635
  • [39] Vulnerability Discovery Model for a Software System Using Stochastic Differential Equation
    Shrivastava, A. K.
    Sharma, Ruchi
    Kapur, P. K.
    2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 199 - 205
  • [40] Machine learning techniques for software vulnerability prediction: a comparative study
    Gul Jabeen
    Sabit Rahim
    Wasif Afzal
    Dawar Khan
    Aftab Ahmed Khan
    Zahid Hussain
    Tehmina Bibi
    Applied Intelligence, 2022, 52 : 17614 - 17635