首页 | 本学科首页   官方微博 | 高级检索  
     

基于模糊测试的软件安全漏洞发掘技术研究
引用本文:刘彪.基于模糊测试的软件安全漏洞发掘技术研究[J].网络安全技术与应用,2014(3):37-37,40.
作者姓名:刘彪
作者单位:69230部队,新疆833000
摘    要:近年来,随着计算机网络技术的不断推广和应用的普及人们生活和工作越来越离不开计算机技术。目前,各行各业的发展都逐渐实现信息化。在当今互联网络时代,计算计研究工作仍然在不断深入,很多新专业软件层出不穷,但是软件的安全性是人们高度重视和思考的问题。因此,本文主要分析了模糊测试的定义,阐述了软件安全漏洞存在的危害性。针对模糊测试的软件安全性进行深入的研究,最后,通过软件安全测试试验分析静态测试和动态测试状态下,并且通过本文的研究,对未来模糊软件安全漏洞发掘技术的相关研究进行展望。希望通过本文的分析能为模糊软件安全漏洞发掘技术的研究和推广奠定坚实的基础。

关 键 词:模糊测试  软件安全  安全漏洞  发掘技术

Excavation technique based on fuzzy test software security vulnerabilities
Liu Biao.Excavation technique based on fuzzy test software security vulnerabilities[J].Net Security Technologies and Application,2014(3):37-37,40.
Authors:Liu Biao
Abstract:In recent years, along with the further promotion of computer network technology and application of the spread of people's life and work more and more inseparable from the computer technology.At present, the development of all walks of life are gradually realize the informationization.Computer research work in the Internet era, still further, a lot of new professional software emerge in endlessly, but the software security is people attaches great importance to and thinking of problem.Therefore, this article mainly analyzes the definition of fuzzy test, this paper expounds the harmfulness of software security vulnerabilities exist.In view of the fuzzy test software security in-depth research, finally, through the analysis of static testing and dynamic testing of software security testing experiment condition, and through the research ofthis paper, fuzzy software security hole excavation technology for the future research were discussed.Hope that through this article analysis for research and popularization of the technology of fuzzy software security vulnerabilities discovered lay a solid foundation.
Keywords:fuzzy test  Software security  Security vulnerabilities  Excavation technology
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号