Skip to main content

Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities

  • Conference paper
  • First Online:
Innovations and Interdisciplinary Solutions for Underserved Areas (InterSol 2022)

Abstract

Malicious attacks exploit software vulnerabilities to violate key security features in computer systems. In this paper, we review the related works of studies that propose mechanisms for detecting software vulnerabilities or ways to protect application data. The aim is to analyse how these mechanisms are exploited to detect software vulnerabilities and secure data via applications. Then, we present tracing techniques to understand the behaviour of applications. Finally, we present an approach based on the analysis of program execution traces that allows the detection of vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.voaafrique.com/a/une-cyberattaque-cause-des-p%C3%A9nuries-de-carburant-aux-usa/5888344.html.

  2. 2.

    https://www.cvedetails.com/.

  3. 3.

    https://nvd.nist.gov.

  4. 4.

    http://www.vupen.com.

References

  1. Lin, G., Wen, S., Han, Q-L., Zhang, J., Xiang, Y.: Software vulnerability detection using deep neural networks: a survey. In: Proceedings of the IEEE, May 2000. https://doi.org/10.1109/JPROC.2020.2993293

  2. Zhang, J.M., Harman, M., Ma, L., Liu, Y.: Machine learning testing: survey, landscapes and horizons. IEEE Trans. Softw. Eng. 48, 1 –36 (2022). https://doi.org/10.1109/TSE.2019.2962027

  3. Chakkaravarthy, S.S., Sangeetha, D., Vaidehi, V.: A Survey on malware analysis and mitigation techniques. Comput. Sci. Rev. 32, 1–23 (2019). https://doi.org/10.1016/j.cosrev.2019.01.002.,

  4. Benkhelifa, E., Welsh, T., Hamouda, W.: A Critical review of practices and challenges in intrusion detection systems for IoT: towards universal and resilient systems. IEEE Commun. Surv. Tutor. PP(99), 1 (2018)

    Google Scholar 

  5. Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: IEEE Symposium on Security and Privacy, pp. 590–604, May 2014

    Google Scholar 

  6. Liu, L., De Vel, Q., Han, Q.-L., Zhang, J., Xiang, Y.: Detecting and preventing cyber insider threats: a survey. IEEE Commun. Surv. Tuts. 20(2), 1397–1417, 2nd Quart. (2018)

    Google Scholar 

  7. Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L.Y., Xiang, Y.: Data-driven cybersecurity incident prediction: a survey. IEEE Commun. Surveys Tuts. 21(2), 1744–1772 (2019)

    Article  Google Scholar 

  8. Ghaffarian, S.M., Shahriari, H.R.: Software vulnerability analysis and discovery using machine-learning and data-mining techniques: a survey. ACM Comput. Surv. 50(4), 1–36 (2017)

    Article  Google Scholar 

  9. Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of NDSS, pp. 3–4 (2005)

    Google Scholar 

  10. Li, Z., et al.: Vuldeepecker: a deep learning-based system for vulnerability detection. In: Proceedings of NDSS, pp. 1–15 (2018)

    Google Scholar 

  11. U. N.: IDC, Intel, “A Guide to the Internet of Things Infographic.” February 2015. https://www.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot:html

  12. Vermesan, Q., Friess, P.: Internet of Things Applications - From Research and Innovation to Market Deployment Book. River Publishers, Jun. 2014. http://www.internet-of-thingsresearch.eu/pdf/IERC_Cluster_Book_2014_Ch.3_SRIA_WEB.pdf

  13. Chen, C., Seff, A., Kornhauser, A., Xiao, J.: Deepdriving: learning affordance for direct perception in autonomous driving. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2722–2730 (2015)

    Google Scholar 

  14. Litjens, G., et al.: A survey on deep learning in medical image analysis. Med. Image Anal. 42, 60–88 (2017)

    Article  Google Scholar 

  15. Pei, K., Cao, Y., Yang, J., Jana. S.: Deepxplore: automated whitebox testing of deep learning systems. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 1–18. ACM (2017)

    Google Scholar 

  16. Sestili, C.D., Snavely, W.S., VanHoudnos, N.M.: Towards security defect prediction with AI (2018). arXiv:1808.09897. http://arxiv.org/abs/1808.09897

  17. Akrout, R.: Analyse de vulnérabilités et évaluation de systèmes de détection d’intrusions pour les applications Web. Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse) (2013)

    Google Scholar 

  18. Meresse, S., Muratet, M., Yessad, A.: Analyse de traces d’exécution de programmes informatiques : application au jeu sérieux Prog &Play”, ORPHEE-RDV, atelier: Méthodologies et outils pour le recueil, l’analyse et la visualisation des traces d’interaction, January 2017, Font-Romeu, France. hal-01515783

    Google Scholar 

  19. Kim, S., Woo, S., Lee, H., Oh, H.: VUDDY: a scalable approach for vulnerable code clone discovery. In: Proceedings of Symposium on Security and Privacy, pp. 595–614, May 2017

    Google Scholar 

  20. Jang, J., Agrawal, A., Brumley, D.: ReDeBug: finding unpatched code clones in entire OS distributions. In: IEEE Symposium on Security and Privacy, pp. 48–62, May 2012

    Google Scholar 

  21. Votipka, D., Stevens, R., Redmiles, E., Hu, J., Mazurek, M.: Hackers vs. testers: a comparison of software vulnerability discovery processes. In: Proceedings of IEEE Symposium on Security and Privacy (SP), pp. 374–391, May 2018

    Google Scholar 

  22. Sang, F.L.: Protection des systèmes informatiques contre les attaques par entrées-sorties. Thesis, Institut National des Sciences Appliquées de Toulouse(INSA Toulouse) (2013)

    Google Scholar 

  23. Benali, F.: Modélisation et classification automatique des informations de sécurité" (2009)

    Google Scholar 

  24. Mille, A.: Des traces à l’ère du Web. Intellectica 59, 7–28 (2013)

    Google Scholar 

  25. Galli, T., Chiclana, F., Siewe, F.: Quality properties of execution tracing, an empirical study. Appl. Syst. Innov. 4, 20 (2021). https://doi.org/10.3390/asi4010020

    Article  Google Scholar 

  26. Savary, A.: "Détection de vulnérabilités appliquée à la vérification de code intermédiaire de Java Card", Université de Limoges (2016)

    Google Scholar 

  27. Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. tutor. 21, 2671 –2701 (2018)

    Google Scholar 

  28. Pewny, J., Schuster, F., Bernhard, L., Holz, T., Rossow, C.: Leveraging semantic signatures for bug search in binary programs. In: Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), pp. 406–415 (2014)

    Google Scholar 

  29. Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Yu, P.S.: A comprehensive survey on graph neural networks (2019). arXiv:1901.00596. http://arxiv.org/abs/1901.00596,

  30. Braiek, H., Khomh, F.: On testing machine learning programs (2018). arXiv preprint arXiv:1812.02257

  31. Qamar, A., Karim, A., Chang, V.: Mobile malware attacks: review, taxonomy & future directions. Futur. Gener. Comput. Syst. 97, 887–909 (2019). https://doi.org/10.1016/j.future.2019.03.007

    Article  Google Scholar 

  32. Hojaji, F., Mayerhofer, T., Zamani, B., Hamou-Lhadj, A., Bousse, E.: Model execution tracing: a systematic mapping study. Softw. Syst. Model 18, 3461–3485 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gouayon Koala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Koala, G., Bassolé, D., Tiendrébéogo, T., Sié, O. (2022). Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities. In: Mambo, A.D., Gueye, A., Bassioni, G. (eds) Innovations and Interdisciplinary Solutions for Underserved Areas. InterSol 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-031-23116-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-23116-2_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23115-5

  • Online ISBN: 978-3-031-23116-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics