Work place: College of Computer Science, Beijing University of Technology, Beijing, china
E-mail:
Website:
Research Interests:
Biography
By Lu Yan Wang Dan Zhao Wen Bing
DOI: https://doi.org/10.5815/ijwmt.2012.03.06, Pub. Date: 15 Jun. 2012
In order to detect the attacks to decision-making variable, this paper presents a data flow behavior constraint model for branch decision-making variables. Our model is expanded from the common control flow model, it emphasizes on the analysis and verification about the data flow for decision-making variables, so that to ensure the branch statement can execute correctly and can also detect the attack to branch decision-making variable easily. The constraints of our model include the collection of variables, the statements that the decision-making variables are dependent on and the data flow constraint with the use-def relation of these variables. Our experimental results indicate that it is effective in detecting the attacks to branch decision-making variables as well as the attacks to control-data.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals