
Research Article
Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities
@INPROCEEDINGS{10.1007/978-3-031-23116-2_8, author={Gouayon Koala and Didier Bassol\^{e} and T\^{e}lesphore Tiendr\^{e}b\^{e}ogo and Oumarou Si\^{e}}, title={Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities}, proceedings={Innovations and Interdisciplinary Solutions for Underserved Areas. 5th EAI International Conference, InterSol 2022, Abuja, Nigeria, March 23-24, 2022, Proceedings}, proceedings_a={INTERSOL}, year={2023}, month={2}, keywords={Detection Vulnerabilities Tracing Attacks}, doi={10.1007/978-3-031-23116-2_8} }
- Gouayon Koala
Didier Bassolé
Télesphore Tiendrébéogo
Oumarou Sié
Year: 2023
Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities
INTERSOL
Springer
DOI: 10.1007/978-3-031-23116-2_8
Abstract
Malicious attacks exploit software vulnerabilities to violate key security features in computer systems. In this paper, we review the related works of studies that propose mechanisms for detecting software vulnerabilities or ways to protect application data. The aim is to analyse how these mechanisms are exploited to detect software vulnerabilities and secure data via applications. Then, we present tracing techniques to understand the behaviour of applications. Finally, we present an approach based on the analysis of program execution traces that allows the detection of vulnerabilities.
Copyright © 2022–2025 ICST