About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Towards new e-Infrastructure and e-Services for Developing Countries. 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings

Research Article

Software Vulnerabilities Detection Using a Trace-Based Analysis Model

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-34896-9_27,
        author={Gouayon Koala and Didier Bassole and Telesphore Tiendrebeogo and Oumarou Sie},
        title={Software Vulnerabilities Detection Using a Trace-Based Analysis Model},
        proceedings={Towards new e-Infrastructure and e-Services for Developing Countries. 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings},
        proceedings_a={AFRICOMM},
        year={2023},
        month={6},
        keywords={Execution traces Vulnerabilities Tracing techniques Applications Attacks},
        doi={10.1007/978-3-031-34896-9_27}
    }
    
  • Gouayon Koala
    Didier Bassole
    Telesphore Tiendrebeogo
    Oumarou Sie
    Year: 2023
    Software Vulnerabilities Detection Using a Trace-Based Analysis Model
    AFRICOMM
    Springer
    DOI: 10.1007/978-3-031-34896-9_27
Gouayon Koala1,*, Didier Bassole1, Telesphore Tiendrebeogo2, Oumarou Sie1
  • 1: Laboratoire de Mathématiques et d’Informatique
  • 2: Laboratoire d’Algèbre, de Mathématiques Discrètes et d’Informatique
*Contact email: gouayonkoala1@gmail.com

Abstract

Over the years, digital technology has grown considerably. With this growth, the information systems’ security has increasingly become a major concern. In this paper, we propose an analysis model based on application execution traces. This model makes it possible to improve the detection of vulnerabilities in applications. Indeed, after an evaluation of each of the tracing techniques we derived this model which takes into account these techniques and combines them with machine learning techniques. In this way, the applications undergo several analyses. This reduces the effect of evasion techniques used by hackers to circumvent the proposed solutions. We focused on Android applications because of their increasing popularity with a variety of services and features offered, making them a favourite target for hackers. These hackers use every means to exploit the slightest flaw in the applications. Unfortunately, the solutions proposed remain insufficient and sometimes ineffective in the face of their determination.

Keywords
Execution traces Vulnerabilities Tracing techniques Applications Attacks
Published
2023-06-30
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-34896-9_27
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL