Synonyms
Related Concepts
Definition
Dynamic analysis refers to the broad class of techniques that make inferences about a program by observing its runtime execution behavior.
Theory
Program analysis techniques can broadly be classified as static or dynamic. Whereas static analysis techniques attempt to make inferences about program behavior without ever executing the program, dynamic analysis techniques typically make inferences by observing the execution of the program on several inputs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Baliga A, Ganapathy V, Iftode L (2008) Automatic inference and enforcement of kernel data structure invariants. In: ACSAC’08: Proceedings of the 24th Annual Computer Security Applications Conference, Anaheim, 8–12 December 2008. IEEE Computer Society Press, Los Alamitos, pp 77–86. http://dx.doi.org/10.1109/ACSAC.2008.29.
Christodorescu M, Kruegel C, Jha S (2007) Mining specifications of malicious behavior. In: Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the 14th ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’07), Dubrovnik, 3–7 September 2007. ACM Press, New York, pp 5–14
Comparetti PM, Salvaneschi G, Kolbitsch C, Kruegel C, Kirda E, Zanero S (2010) Identifying dormant functionality in malware programs. In: 31st IEEE Symposium on Security and Privacy (SP 2010), Berkeley/Oakland, 16–19 May 2010. IEEE Computer Society Press, Los Alamitos
Feng HH, Kolesnikov OM, Fogla P, Lee W, Gong W (2003) Anomaly detection using call stack information. In: Proceedings 2003 IEEE Symposium on Security and Privacy, Berkeley, 11–14 May 2003. IEEE Computer Society Press, Los Alamitos, p 62
Ganapathy V, Jaeger T, Jha S (2006) Retrofitting legacy code for authorization policy enforcement. In: 2006 IEEE Symposium on Security and Privacy (SP’06): Proceedings, Oakland, 21–24 May 2006. IEEE Computer Society Press, Los Alamitos, pp 214–229. http://doi.ieeecomputersociety.org/10.1109/SP.2006.34.
Giffin JT, Dagon D, Jha S, Lee W, Miller BP (2005) Environment-sensitive intrusion detection. In: Valdes A, Zamboni D (eds) Recent Advances In Intrusion Detection: 8th international symposium, RAID 2005, Seattle, 7–9 September 2005. Lecture notes in computer science, vol 3858. Springer, Berlin, pp 185–206
Godefroid P, Klarlund N, Sen K (2005) Dart: directed automated random testing. In: PLDI ’05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, vol 40, Chicago, 12–15 June 2005. ACM Press, New York, pp 213–223
Hildebrandt R, Zeller A (2002) Simplifying and isolating failure-inducing input. IEEE Trans Softw Eng 28(2):183–200
Liblit BR (2004) Cooperative bug isolation. PhD thesis, University of California, Berkeley, December 2004
Martignoni L, Christodorescu M, Jha S (2007) Omniunpack: fast, generic, and safe unpacking of malware. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, December 2007
Moser A, Kruegel C, Kirda E (2007) Exploring multiple execution paths for malware analysis. In: SP’07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Berkeley, 20–23 May 2007. IEEE Computer Society Press, Los Alamitos, pp 231–245
Sekar R, Bendre M, Dhurjati D, Bollineni P (2001) A fast automaton-based method for detecting anomalous program behaviors. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, 14–16 May 2001. IEEE Computer Society Press, Los Alamitos, pp 144–155
Wagner D, Dean D (2001) Intrusion detection via static analysis. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P’01), Oakland, 14–16 May 2001. IEEE Computer Society Press, Los Alamitos
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Christodorescu, M., Ganapathy, V. (2011). Dynamic Analysis. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_836
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_836
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering