Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities,
Auteur(s): Gouayon Koala, Didier Bassolé, Télesphore Tiendrébéogo, Oumarou Sié
Résumé

Malicious attacks exploit software vulnerabilities to violate key security features in computer systems. In this paper, we review the related works of studies that propose mechanisms for detecting software vulnerabilities or ways to protect application data. The aim is to analyse how these mechanisms are exploited to detect software vulnerabilities and secure data via applications. Then, we present tracing techniques to understand the behaviour of applications. Finally, we present an approach based on the analysis of program execution traces that allows the detection of vulnerabilities.

Mots-clés

Detection Vulnerabilities Tracing Attacks

962
Enseignants
5577
Publications
49
Laboratoires
84
Projets