MSMAM:Testing Resources Allocation,Obtaining Non-Functional Indexes Based on Functional Testing Resu

来源 :第六届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:lijws
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Security testing is a key technology for software security.The testing results can reflect the relationship between Software testing and software security,and they can help program designers for evaluating and improving software security.However,it is difficult to describe by mathematics the relationship between the results of software functional testing and software nonfunctional security indexes.In this paper,we propose a mathematics model (MSMAM) based on principal component analysis and multiattribute utility theory.This model can get nonfunctional security indexes by analyzing quantized results of functional tests.It can also evaluate software security and guide the effective allocation of testing resources in the process of software testing.The feasibility and effectiveness of MSMAM is verified by experiments.
其他文献
利用电磁仿真软件CST对静电放电器现有构型进行仿真计算,探讨静电放电器构型各参数对静电放电噪声的影响,对静电放电器进行构型改进,新型放电器在相同激励下降低了静电放电所产生的噪声强度,降低静电放电器雷达散射截面,提高静电放电器的隐身特性。
针对加性水印中嵌入强度因子的自适应问题进行了研究,提出了一个基于信噪比的自适应音频水印算法.该算法在保证听觉质量的同时,利用信噪比自适应地调节嵌入强度因子,并将水印信号嵌入到音频数据经沃尔什-哈达玛变换后的低频系数中,水印检测时不需要原始音频信号参与.仿真实验结果表明该算法对诸如加噪、滤波、重量化、重采样和MP3压缩等常规信号处理具有较强的鲁棒性,可用于音频数据的版权保护。
To protect against algebraic attacks,a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers.In this paper,a new method based on a univariate polynomial re
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode,wherein insider attacks are the most challenging issue.To addres
Although there exist a few good schemes to protect the kernel hooks of operating systems,attackers are still able to circumvent existing defense mechanisms with spurious context information.To address
In 2010,Lee et al proposed two simple and efficient three-party password-authenticated key exchange protocols that had been proven secure in the random oracle model.They argued that the two protocols
In this paper,we present the generalized Huff curves that contain Huffs model as a special case.First,it is proved that every elliptic curve with three points of order 2 is isomorphic to a generalized
This paper contributes to the stability of linear complexity of a binary periodic Jaeobi sequence.By employing a pair of reference sequences,we prove that the linear complexity of a binary Jacobi sequ
This article proposes an enhanced differential fault analysis (DFA) method named as fault-propagation pattern-based DFA (FPP-DFA).The main idea of FPP-DFA is using the FPP of the ciphertext difference
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure enough.This article extends model checking method wit