Analysis and comparative researches of methods for improving the software

M Mozhaiev, V Davydov, Z Liqiang - Advanced Information Systems, 2020 - ais.khpi.edu.ua
M Mozhaiev, V Davydov, Z Liqiang
Advanced Information Systems, 2020ais.khpi.edu.ua
The results analysis of main methods for identifying software vulnerabilities presents in the
article. The results of authors' research, synthesizing and regulating knowledge about
systems for detecting software vulnerabilities, are presented. The software analysis methods
used during certification tests are considered. It is shown that the methods and techniques
existing for software security analysis use do not ensure the result accuracy under fuzzy
input data conditions. This drawback is aggravated by strict requirements for the test …
Abstract
The results analysis of main methods for identifying software vulnerabilities presents in the article. The results of authors’ research, synthesizing and regulating knowledge about systems for detecting software vulnerabilities, are presented. The software analysis methods used during certification tests are considered. It is shown that the methods and techniques existing for software security analysis use do not ensure the result accuracy under fuzzy input data conditions. This drawback is aggravated by strict requirements for the test scenarios implementation speed. This is largely due to the fact that experts, in order to a decision make, have to conflicting information large amounts analyzed. Consequently, it is necessary to develop a system for identifying vulnerabilities, the main task of which will be to the conflicting information amount minimize used by an expert when making a decision. The most promising direction the existing identifying vulnerabilities systems efficiency increasing is seen in reducing the burden on an expert by methods for identifying vulnerabilities and implementing a decision support system improving. This will significantly reduce the time spent on a decision making on software security, and, as a result, will the software security testing procedure accessible to a developer’s wide range make more.
ais.khpi.edu.ua
以上显示的是最相近的搜索结果。 查看全部搜索结果