An Analytical Review of the Source Code Models for Exploit Analysis.

Saved in:
Bibliographic Details
Title: An Analytical Review of the Source Code Models for Exploit Analysis.
Authors: Fedorchenko, Elena, Novikova, Evgenia, Fedorchenko, Andrey, Verevkin, Sergei
Source: Information; Sep2023, Vol. 14 Issue 9, p497, 15p
Subject Terms: CYBERTERRORISM, COMPUTER security vulnerabilities, SOURCE code
Abstract: Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses based on an analysis of exploit source codes and real-time detection of features of their implementation. The key element of this approach is an exploit source code model. In this paper, to specify the model, we systematically analyze existing source code models, approaches to source code analysis in general, and exploits in particular in order to examine their advantages, applications, and challenges. Finally, we provide an initial specification of the proposed source code model. [ABSTRACT FROM AUTHOR]
Copyright of Information is the property of MDPI and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
Description
Abstract:Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses based on an analysis of exploit source codes and real-time detection of features of their implementation. The key element of this approach is an exploit source code model. In this paper, to specify the model, we systematically analyze existing source code models, approaches to source code analysis in general, and exploits in particular in order to examine their advantages, applications, and challenges. Finally, we provide an initial specification of the proposed source code model. [ABSTRACT FROM AUTHOR]
ISSN:20782489
DOI:10.3390/info14090497