Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/20.500.12258/19395
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBabenko, M. G.-
dc.contributor.authorБабенко, М. Г.-
dc.date.accessioned2022-04-05T09:36:12Z-
dc.date.available2022-04-05T09:36:12Z-
dc.date.issued2021-
dc.identifier.citationThai, P.N., Viet, H.N., Shone, N., Babenko, M. Function exclusion in automated security patch testing using chopped symbolic execution // Proceedings - 2021 8th NAFOSTED Conference on Information and Computer Science, NICS 2021. - 2021. - Стр.: 90 - 94. - DOI10.1109/NICS54270.2021.9701542ru
dc.identifier.urihttp://hdl.handle.net/20.500.12258/19395-
dc.description.abstractPatch testing is a core component of patch management and is used to verify that modified software modules (i.e. an update or patch) work as expected (functional testing) and do not contain any known vulnerabilities (security testing). Security patch testing requires a lot of time and a professional security knowledge from the tester. In recent years, chopped symbolic execution has been successfully applied in automatic or semiautomatic program testing, to reduce the amount of testing work. Chopped symbolic execution (Chopper) allows users to specify 'uninteresting' functions to ignore during analysis, therefore allowing the testing of software modules without running all functions of the program. It is an effective solution for path explosion (one of the main problems of symbolic execution). The effectiveness of the chopped symbolic execution method in patch testing depends on how well the ignored functions are initially chosen. In this paper, we propose a novel method to automatically exclude functions for chopped symbolic execution in patch testing, using a control flow graph. Moreover, we use cyclomatic complexity to optimize the speed of the testing process. Experimental results show that our method can automatically choose the ignored functions and reduce the required testing time, in comparison to typical Chopper techniques.ru
dc.language.isoenru
dc.publisherInstitute of Electrical and Electronics Engineers Inc.ru
dc.relation.ispartofseriesProceedings - 2021 8th NAFOSTED Conference on Information and Computer Science, NICS 2021-
dc.subjectChopperru
dc.subjectSymbolic executionru
dc.subjectControl flow graphru
dc.subjectSecurity patch testingru
dc.titleFunction exclusion in automated security patch testing using chopped symbolic executionru
dc.typeСтатьяru
vkr.instФакультет математики и компьютерных наук имени профессора Н.И. Червяковаru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 2132 .pdf
  Restricted Access
239.83 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.