Wen-chao Jia, Ronggui Hu, Yong-Yi Wang, XueMeng Li
{"title":"基于程序依赖图的脆弱性多维评估方法","authors":"Wen-chao Jia, Ronggui Hu, Yong-Yi Wang, XueMeng Li","doi":"10.1109/IMCCC.2015.45","DOIUrl":null,"url":null,"abstract":"This Paper summarizes literature domestic and abroad about the vulnerability evaluation and analyzes the shortcomings of previous evaluation approaches. A novel method based on program dependence graph is presented to implement multi-dimension evaluation on vulnerability. Compared with the previous evaluation models, the new method can access the influence scope and patch fixed situation, which makes the evaluation results complete and accurate proved by the experiment successfully. Finally, we make a conclusion and propose the future research directions in this field.","PeriodicalId":438549,"journal":{"name":"2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Method for Multi-dimension Evaluation on Vulnerability Based on Program Dependence Graph\",\"authors\":\"Wen-chao Jia, Ronggui Hu, Yong-Yi Wang, XueMeng Li\",\"doi\":\"10.1109/IMCCC.2015.45\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This Paper summarizes literature domestic and abroad about the vulnerability evaluation and analyzes the shortcomings of previous evaluation approaches. A novel method based on program dependence graph is presented to implement multi-dimension evaluation on vulnerability. Compared with the previous evaluation models, the new method can access the influence scope and patch fixed situation, which makes the evaluation results complete and accurate proved by the experiment successfully. Finally, we make a conclusion and propose the future research directions in this field.\",\"PeriodicalId\":438549,\"journal\":{\"name\":\"2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)\",\"volume\":\"129 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMCCC.2015.45\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCCC.2015.45","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Method for Multi-dimension Evaluation on Vulnerability Based on Program Dependence Graph
This Paper summarizes literature domestic and abroad about the vulnerability evaluation and analyzes the shortcomings of previous evaluation approaches. A novel method based on program dependence graph is presented to implement multi-dimension evaluation on vulnerability. Compared with the previous evaluation models, the new method can access the influence scope and patch fixed situation, which makes the evaluation results complete and accurate proved by the experiment successfully. Finally, we make a conclusion and propose the future research directions in this field.