浏览全部资源
扫码关注微信
河北大学 数学与计算机学院,河北 保定 071002
[ "田俊峰(1965-),男,河北保定人,河北大学教授、博士生导师,主要研究方向为信息安全与可信计算。" ]
[ "张亚姣(1988-),女,河北秦皇岛人,河北大学硕士生,主要研究方向为信息安全与可信计算。" ]
网络出版日期:2015-01,
纸质出版日期:2015-01-25
移动端阅览
田俊峰, 张亚姣. 基于马尔可夫的检查点可信评估方法[J]. 通信学报, 2015,36(1):230-236.
Jun-feng TIAN, Ya-jiao ZHANG. Checkpoint trust evaluation method based on Markov[J]. Journal on communications, 2015, 36(1): 230-236.
田俊峰, 张亚姣. 基于马尔可夫的检查点可信评估方法[J]. 通信学报, 2015,36(1):230-236. DOI: 10.11959/j.issn.1000-436x.2015026.
Jun-feng TIAN, Ya-jiao ZHANG. Checkpoint trust evaluation method based on Markov[J]. Journal on communications, 2015, 36(1): 230-236. DOI: 10.11959/j.issn.1000-436x.2015026.
为了发现软件的脆弱点,通过动态监测行为,对软件及其模块在一段时间内运行的可信状况进行研究,提出了基于马尔可夫的检查点可信评估模型。模型通过在软件行为轨迹中织入若干检查点来反映软件运行的行为表现,然后对检查点可信程度进行等级划分,通过马尔可夫模型及检查点权重反映检查点可信情况,最后综合每个检查点的可信情况得到软件整体的可信性。实验结果表明该模型能够有效反映软件中各部分可信情况,验证了模型的合理性和有效性。
According to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically.The model reflected the software running situation by some checkpoints worked in the software behavior trace
then divided some trust levels to reflect the checkpoint trusted situation by the Markov model and the weight of checkpoint
and finally synthesized the checkpoint trusted situation to determine the software trust value.Experimental results showed that the model could effectively reflect the trusted situation of the various parts of the software
and verify the rationality and availability of the model.
尚珊珊 , 赵轶群 . 软件可靠性综述 [J ] . 软件导刊 , 2006 , 5 ( 15 ): 3 - 5 .
SHANG S S , ZHAO Y Q . Overview of software reliability [J ] . Software Guide , 2006 , 5 ( 15 ): 3 - 5 .
ZHANG H G , LUO J , JIN G , et al . Development of trusted computing research [J ] . Journal of Wuhan University ( Natural Science Edition ), 2006 , 52 ( 5 ): 513 - 518 .
Trusted Computing Group . TCG specification architecture overview [EB/OL ] . https://www.trustedcomputinggroup.org/groups/TCG_1_0_Architecture_overview.pdf https://www.trustedcomputinggroup.org/groups/TCG_1_0_Architecture_overview.pdf . 2013 .
WANG H M , TANG Y B , YIN G , et al . Trustworthiness of Internet-based software [J ] . Science in China:Series F Information Sciences , 2006 , 49 ( 6 ): 759 - 773 .
杨善林 , 丁帅 , 褚伟 . 一种基于效用和证据理论的可信软件评估方法 [J ] . 计算机研究与发展 , 2009 , 46 ( 7 ): 1152 - 1159 .
YANG S L , DING S , CHU W . Trustworthy software evaluation using utility based evidence theory [J ] . Journal of Computer Research and Development , 2009 , 46 ( 7 ): 1152 - 1159 .
蔡斯博 , 邹艳珍 , 邵凌霜 等 . 一种支持软件资源可信评估的框架 [J ] . 软件学报 , 2010 , 21 ( 2 ): 359 - 372 .
CAI S B , ZOU Y Z , SHAO L S , et al . Framework supporting software assets evaluation on trustworthiness [J ] . Journal of Software , 2010 , 21 ( 2 ): 359 - 372 .
沈国华 , 黄志球 , 钱巨 等 . 软件可信评估模型及其工具实现 [J ] . 计算机科学与探索 , 2011 , 5 ( 6 ): 553 - 561 .
SHEN G H , HUANG Z Q , QIAN J , et al . Research on software trustworthiness evaluation model and its implementation [J ] . Journal of Frontiers of Computer Science an Technology , 2011 , 5 ( 6 ): 553 - 561 .
丁帅 , 鲁忖俊 , 杨善林 等 . 一种需求驱动的软件可信性评估及演化模型 [J ] . 计算机研究与发展 , 2011 , 48 ( 4 ): 647 - 655 .
DING S , LU F J , YANG S L , et al . A requirement-driven software trustworthiness evaluation and evolution model [J ] . Journal of Computer Research and Development , 2011 , 48 ( 4 ): 647 - 655 .
DIAKOV K , BATTERAMA J , ZANDBELT H . Monitoring of distributed component interactions [A ] . Proceeding of IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing [C ] . New York,USA , 2000 . 229 - 243 .
LI J . Monitoring and characterization of component-based systems with global causality capture [A ] . Proceeding of the 23rd International Conference on Distributed Computing Systems [C ] . Rhode Island,USA , 2003 . 422 - 433 .
MARIANI L , PEZZE M . A technique for verifying component-based software [J ] . Electronic Notes in Theoretical Computer Science , 2005 , 116 ( 1 ): 17 - 30 .
CHEN F , GRIGORE R . Mop:an efficient and generic runtime verification framework [A ] . Proceeding of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications [C ] . Montreal,Canada , 2007 . 569 - 588 .
古亮 , 郭耀 , 王华 等 . 基于 TPM 的运行时软件可信证据收集机制 [J ] . 软件学报 , 2010 , 21 ( 2 ): 373 - 388 .
GU L , GUO Y , WANG H , et al . Runtime software trustworthiness evidence collection mechanism based on TPM [J ] . Journal of Software , 2010 , 21 ( 2 ): 373 - 388 .
刘玉玲 , 杜瑞忠 , 冯建磊 等 . 基于软件行为的检查点风险评估信任模型 [J ] . 西安电子科技大学学报 , 2012 , 39 ( 1 ): 179 - 184 .
LIU Y L , DU R Z , FENG J L , et al . Trust model of software behaviors based on check point risk assessment [J ] . Journal of Xidian University , 2012 , 39 ( 1 ): 179 - 184 .
刘辉 , 白峰杉 . 基于混合高斯过程模型的高光谱图像分类算法 [J ] . 高校应用数学学报 , 2010 , 25 ( 4 ): 379 - 385 .
LIU H , BAI F S . Hyperspectral image classification based on mixed Gaussian process model [J ] . Applied Mathematics A Journal of Chinese Universities , 2010 , 25 ( 4 ): 379 - 385 .
王爱萍 , 张功营 , 刘方 . EM算法研究与应用 [J ] . 计算机技术与发展 , 2009 , 19 ( 9 ): 108 - 110 .
WANG A P , ZHANG G Y , LIU F . Research and application of EM algorithm [J ] . Computer Technology and Development , 2009 , 19 ( 9 ): 108 - 110 .
胡宇驰 . 应用马尔科夫状态图法进行可靠性评估 [J ] . 电子科技大学学报 , 2001 , 30 ( 2 ): 175 - 180 .
HU Y C . Evaluation of reliability of a fault-tolerance computer system by Markov status graph [J ] . Journal of UEST of China , 2001 , 30 ( 2 ): 175 - 180 .
JØSANG A . A logic for uncertain probabilities [J ] . International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems , 2001 , 9 ( 3 ): 279 - 311 .
张吉军 . 模糊层次分析法(FAHP) [J ] . 模糊系统与数学 , 2000 , 12 ( 2 ): 80 - 88 .
ZHANG J J . Fuzzy analytical hierarchy process [J ] . Fuzzy Systems and Mathematics , 2000 , 12 ( 2 ): 80 - 88 .
邵建平 , 王玲 . “拉长板”木桶原理及其运用研究 [J ] . 科技管理研究 , 2005 ,( 4 ): 159 - 161 .
SHAO J P , WANG L . Study on “stretched panels” bucket theory and its applicaion [J ] . Science and Technology Management Research , 2005 , 4 : 159 - 161 .
国家信息安全漏洞平台 . GNU GZip 文档处理多个安全漏洞 [EB/OL ] . http://www.cnvd.org.cn/sites/main/preview/ldgg_preview.htm? tid=CNVD-2009-09295 http://www.cnvd.org.cn/sites/main/preview/ldgg_preview.htm? tid=CNVD-2009-09295 , 2013 .
China National Vulnerability Database . GNU Gzip Deals with many security vulnerabilities [EB/OL ] . http://www.cnvd.org.cn/sites/main/preview/ldgg_preview.htm? tid=CNVD-2009-09295 http://www.cnvd.org.cn/sites/main/preview/ldgg_preview.htm? tid=CNVD-2009-09295 , 2013 .
0
浏览量
313
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构