首页 | 本学科首页   官方微博 | 高级检索  
     

对应用软件进行安全测试的对手模式及其应用
引用本文:贺红,徐宝文,袁胜忠.对应用软件进行安全测试的对手模式及其应用[J].计算机科学,2006,33(9):266-269.
作者姓名:贺红  徐宝文  袁胜忠
作者单位:1. 东南大学计算机科学与工程系,南京,210096;山东大学威海分校现代教育技术部,威海,264209
2. 东南大学计算机科学与工程系,南京,210096
3. 山东大学威海分校信息工程学院,威海,264209
摘    要:基于网络应用软件对安全性需求的日益加强,提出将安全性测试增加到软件功能性测试之中的观点,并且给出对应用软件进行安全测试的对手模式,以及为快速高效实施对手模式进行软件分解的方法和对手模式的应用范围。基于对手模式给出一种应用软件系统的抗攻击定理,该理论从安全性角度导出了一种实用的估算网络应用软件寿命的方法。

关 键 词:安全性测试  攻击  对手模式  随机算法  软件寿命

The Adversary Pattern and Attack-proof Theorem in Application Software's Security Testing
HE Hong,XU Bao-Wen,YUAN Sheng-Zhong.The Adversary Pattern and Attack-proof Theorem in Application Software''''s Security Testing[J].Computer Science,2006,33(9):266-269.
Authors:HE Hong  XU Bao-Wen  YUAN Sheng-Zhong
Affiliation:1.Departmenl of Computer Science and Technology, Southeast University, Nanjing 210096;2. School of Information Engineering, Shandong University at Weihai, Weihai 264209;Department of Modern Education TechnoLogy, Shandong University at Weihai, Weihai 264209
Abstract:The security of application software is more important in network days.A kind of adversary pattern to find out security bugs in a software is raised which can be used in all testing steps.We discuss the software decomposition ways and application of the adversary pattern,put forward an attack-proof theorem.It shows a method of computing average number of attack times before a software system having concealed bugs becomes invalid.We also give a new way to estimate the software's lifetime under various randomized attacks.
Keywords:Security testing  Attack  Adversary pattern  Randomized algorithm  Software's lifetime
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号