Vulnerability Analysis

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 128508 Experts worldwide ranked by ideXlab platform

Dai Yiqi - One of the best experts on this subject based on the ideXlab platform.

  • WCNIS - A software Vulnerability Analysis environment based on virtualization technology
    2010 IEEE International Conference on Wireless Communications Networking and Information Security, 2010
    Co-Authors: Wang Chunlei, Dai Yiqi
    Abstract:

    The accurate identification and effective Analysis of software vulnerabilities depends on flexible and extensible Analysis environment. However, current research work cannot provide highly available environment supporting for different types of vulnerabilities. Aiming at the problem, this paper proposes a novel method for constructing software Vulnerability Analysis environment based upon virtualization technique, defines the system level simulation model for Vulnerability Analysis, and describes the simulation model based Vulnerability Analysis method. Based upon the simulation model and Analysis method, we have designed and implemented the Virtualization-based Vulnerability Analysis Environment (VirtualVAE), which can examine the operation behaviors of guest operation system and applications at hardware level, and analyze the operation process of sensitive data in the whole system. Therefore, it can accurately simulate a wide variety of system behaviors, and provide dynamic Analysis capabilities for different types of vulnerabilities. The experimental results show that it provides a flexible environment for accurately identifying and analyzing the vulnerabilities of software systems.

  • Vulnerability Analysis Framework for Binaries Based on Model Checking
    Computer Science, 2010
    Co-Authors: Dai Yiqi
    Abstract:

    In order to analyze vulnerabilities in executable programs,a Vulnerability Analysis framework for binaries based upon model checking was proposed.Firstly,the abstract model of binary was defined,and the formal models of vulnerabilities based upon finite state automaton and the representations of software security attributes based upon event system were described.Then,the model checking based Vulnerability Analysis process and algorithm were proposed with respect to the abstract models of binaries and the security attributes to be checked.After that,the prototype of Vulnerability Analysis tool was designed and implemented based upon the framework.The illustrative sample program was analyzed to show in detail the principles of the framework,and the experimental results show the effectiveness of the Analysis method.

Jong In Lim - One of the best experts on this subject based on the ideXlab platform.

  • ISGT - Automated Vulnerability Analysis technique for smart grid infrastructure
    2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), 2017
    Co-Authors: Yoojin Kwon, Huy Kang Kim, Koudjo M. Koumadi, Yong Hun Lim, Jong In Lim
    Abstract:

    A smart grid is a fully automated power electricity network, which operates, protects and controls all its physical environments of power electricity infrastructure being able to supply energy in an efficient and reliable way. As the importance of cyber-physical system (CPS) security is growing, various Vulnerability Analysis methodologies for general systems have been suggested, whereas there has been few practical research targeting the smart grid infrastructure. In this paper, we highlight the significance of security Vulnerability Analysis in the smart grid environment. Then we introduce various automated Vulnerability Analysis techniques from executable files. In our approach, we propose a novel binary-based Vulnerability discovery method for AMI and EV charging system to automatically extract security-related features from the embedded software. Finally, we present the test result of Vulnerability discovery applied for AMI and EV charging system in Korean smart grid environment.

Hamid Reza Shahriari - One of the best experts on this subject based on the ideXlab platform.

  • Neural software Vulnerability Analysis using rich intermediate graph representations of programs
    Information Sciences, 2021
    Co-Authors: Seyed Mohammad Ghaffarian, Hamid Reza Shahriari
    Abstract:

    Abstract Security vulnerabilities are among the major concerns of modern software engineering. Successful results of machine learning techniques in various challenging applications have led to an emerging field of research to investigate the effectiveness of machine learning, and more recently, deep learning techniques, for the problem of software Vulnerability Analysis and discovery. In this paper, we explore the utilization of Graph Neural Networks as the latest trend and progress in the field of artificial neural networks. To this end, we propose an original neural Vulnerability Analysis approach, using customized intermediate graph representations of programs to train graph neural network models. Experimental results on a public suite of vulnerable programs show that the proposed approach is effective at the task of software Vulnerability Analysis. Additional empirical experiments answer complementary research questions about the proposed approach. In particular, we present experimental results for the challenging task of cross-project Vulnerability Analysis, with interesting insights on the capabilities of our novel approach. Furthermore, a software utility that was developed in the course of this study is also published as a further contribution to the research community.

Zhi Xue - One of the best experts on this subject based on the ideXlab platform.

  • mining privilege escalation paths for network Vulnerability Analysis
    Fuzzy Systems and Knowledge Discovery, 2007
    Co-Authors: Baowen Zhang, William Zhu, Zhi Xue
    Abstract:

    Computer security is an important issue in our society. In order to prevent computer systems and networks from attacks, we should try to find flaws in these systems and evaluate them. Generally researchers and red teams use attack graphs to perform network Vulnerability Analysis, which tend to suffer scalability problems. In this paper we put forward a mining method to generate privilege escalation paths in networks. With these privilege escalation paths we create net privilege graphs and use them for network Vulnerability Analysis. Experiments show that our approach is valid and scalable to find the possible vulnerabilities exploitation ways in networks.

  • FSKD (4) - Mining Privilege Escalation Paths for Network Vulnerability Analysis
    Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), 2007
    Co-Authors: Baowen Zhang, William Zhu, Zhi Xue
    Abstract:

    Computer security is an important issue in our society. In order to prevent computer systems and networks from attacks, we should try to find flaws in these systems and evaluate them. Generally researchers and red teams use attack graphs to perform network Vulnerability Analysis, which tend to suffer scalability problems. In this paper we put forward a mining method to generate privilege escalation paths in networks. With these privilege escalation paths we create net privilege graphs and use them for network Vulnerability Analysis. Experiments show that our approach is valid and scalable to find the possible vulnerabilities exploitation ways in networks.

Li Xin - One of the best experts on this subject based on the ideXlab platform.