مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

742
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

INDUCTIVE LEARNING OF THE OPERATIONAL LOGIC OF A PROGRAM FROM ITS MANY CORRECT EXECUTIONS AND APPLYING IT TO RUNTIME VERIFICATION OF THE PROGRAM EXECUTION

Pages

  11-30

Abstract

 To be sure, that a program behaves correctly at runtime; the behavior of the program should be verified. Where the program source code is available, it is possible to extract the operational logic (i.e., behavior) of the program. But in this paper, programs are considered as black boxes, so no information is available about the operational logic of programs. However, some efforts are spent to learn inductively the operational logic of programs by executing them successfully (i.e., correctly) for many (i.e., > 1000) times and logging their SYSTEM CALLs implicitly. Therefore, in the first phase, few mechanisms are developed to discover inductively the loops and branching points of a program using its log SYSTEM CALLs. Then, the operational logic of the program is constructed in SYSTEM CALL level abstraction by applying a novel method. In the second phase, any deviation of the program execution (in SYSTEM CALL level abstraction) from its operational logic (in SYSTEM CALL level abstraction) is detected, just like white box approaches. Two major applications for the proposed approach are suggested: (1) to make critical programs somehow, detect their misuses (i.e., buffer overflow attack) by themselves, and (2) to protect programs against their runtime faults. The effectiveness of the proposed approach is demonstrated by some experiments.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    JALILI, SAIED, & BOLAND GHAMAT AZAR, H.. (2007). INDUCTIVE LEARNING OF THE OPERATIONAL LOGIC OF A PROGRAM FROM ITS MANY CORRECT EXECUTIONS AND APPLYING IT TO RUNTIME VERIFICATION OF THE PROGRAM EXECUTION. MODARES TECHNICAL AND ENGINEERING, -(26 (SPECIAL ISSUE ON ELECTRICAL ENGINEERING)), 11-30. SID. https://sid.ir/paper/25048/en

    Vancouver: Copy

    JALILI SAIED, BOLAND GHAMAT AZAR H.. INDUCTIVE LEARNING OF THE OPERATIONAL LOGIC OF A PROGRAM FROM ITS MANY CORRECT EXECUTIONS AND APPLYING IT TO RUNTIME VERIFICATION OF THE PROGRAM EXECUTION. MODARES TECHNICAL AND ENGINEERING[Internet]. 2007;-(26 (SPECIAL ISSUE ON ELECTRICAL ENGINEERING)):11-30. Available from: https://sid.ir/paper/25048/en

    IEEE: Copy

    SAIED JALILI, and H. BOLAND GHAMAT AZAR, “INDUCTIVE LEARNING OF THE OPERATIONAL LOGIC OF A PROGRAM FROM ITS MANY CORRECT EXECUTIONS AND APPLYING IT TO RUNTIME VERIFICATION OF THE PROGRAM EXECUTION,” MODARES TECHNICAL AND ENGINEERING, vol. -, no. 26 (SPECIAL ISSUE ON ELECTRICAL ENGINEERING), pp. 11–30, 2007, [Online]. Available: https://sid.ir/paper/25048/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button