Bojiang Liu, Lijin Wu, Xiaomei Shen, W. He, Xinyu Han
{"title":"基于动态二进制码分析的船舶工业软件漏洞挖掘技术","authors":"Bojiang Liu, Lijin Wu, Xiaomei Shen, W. He, Xinyu Han","doi":"10.1109/DSA56465.2022.00141","DOIUrl":null,"url":null,"abstract":"This paper takes the shipbuilding industry software as the research object, uses the dynamic binary code technology to track the instructions to realize the program defect detection, records the instruction flow, data flow and the execution of each instruction on the system state during the program execution at the assembly instruction level. The impact and other information are studied from the dynamic binary code analysis method and the tracking and debugging model. Finally, the advantages and disadvantages of this method are given according to the effect of software vulnerability mining in the shipbuilding industry.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"4 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Software Vulnerability Mining Technology of Shipbuilding Industry based on Dynamic Binary Code Analysis\",\"authors\":\"Bojiang Liu, Lijin Wu, Xiaomei Shen, W. He, Xinyu Han\",\"doi\":\"10.1109/DSA56465.2022.00141\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper takes the shipbuilding industry software as the research object, uses the dynamic binary code technology to track the instructions to realize the program defect detection, records the instruction flow, data flow and the execution of each instruction on the system state during the program execution at the assembly instruction level. The impact and other information are studied from the dynamic binary code analysis method and the tracking and debugging model. Finally, the advantages and disadvantages of this method are given according to the effect of software vulnerability mining in the shipbuilding industry.\",\"PeriodicalId\":208148,\"journal\":{\"name\":\"2022 9th International Conference on Dependable Systems and Their Applications (DSA)\",\"volume\":\"4 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 9th International Conference on Dependable Systems and Their Applications (DSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DSA56465.2022.00141\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSA56465.2022.00141","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Software Vulnerability Mining Technology of Shipbuilding Industry based on Dynamic Binary Code Analysis
This paper takes the shipbuilding industry software as the research object, uses the dynamic binary code technology to track the instructions to realize the program defect detection, records the instruction flow, data flow and the execution of each instruction on the system state during the program execution at the assembly instruction level. The impact and other information are studied from the dynamic binary code analysis method and the tracking and debugging model. Finally, the advantages and disadvantages of this method are given according to the effect of software vulnerability mining in the shipbuilding industry.