About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Innovations and Interdisciplinary Solutions for Underserved Areas. 5th EAI International Conference, InterSol 2022, Abuja, Nigeria, March 23-24, 2022, Proceedings

Research Article

Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-23116-2_8,
        author={Gouayon Koala and Didier Bassol\^{e} and T\^{e}lesphore Tiendr\^{e}b\^{e}ogo and Oumarou Si\^{e}},
        title={Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities},
        proceedings={Innovations and Interdisciplinary Solutions for Underserved Areas. 5th EAI International Conference, InterSol 2022, Abuja, Nigeria, March 23-24, 2022, Proceedings},
        proceedings_a={INTERSOL},
        year={2023},
        month={2},
        keywords={Detection Vulnerabilities Tracing Attacks},
        doi={10.1007/978-3-031-23116-2_8}
    }
    
  • Gouayon Koala
    Didier Bassolé
    Télesphore Tiendrébéogo
    Oumarou Sié
    Year: 2023
    Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities
    INTERSOL
    Springer
    DOI: 10.1007/978-3-031-23116-2_8
Gouayon Koala1,*, Didier Bassolé1, Télesphore Tiendrébéogo2, Oumarou Sié1
  • 1: Laboratoire de Mathématiques et d’Informatique
  • 2: Laboratoire d’Algèbre, de Mathématiques Discrètes et d’Informatique
*Contact email: gouayonkoala1@gmail.com

Abstract

Malicious attacks exploit software vulnerabilities to violate key security features in computer systems. In this paper, we review the related works of studies that propose mechanisms for detecting software vulnerabilities or ways to protect application data. The aim is to analyse how these mechanisms are exploited to detect software vulnerabilities and secure data via applications. Then, we present tracing techniques to understand the behaviour of applications. Finally, we present an approach based on the analysis of program execution traces that allows the detection of vulnerabilities.

Keywords
Detection Vulnerabilities Tracing Attacks
Published
2023-02-01
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-23116-2_8
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL