Method and utility for recovering code algorithms of telecommunication devices for vulnerability search

M Buinevich, K Izrailov - 16th International conference on …, 2014 - ieeexplore.ieee.org
16th International conference on advanced communication technology, 2014ieeexplore.ieee.org
The article describes a method for searching vulnerabilities in machine code based on the
analysis of its algorithmized representation obtained with the help of an utility being a part of
the method. Vulnerability search falls within the field of telecommunication devices. Phase-
by-phase description of the method is discussed, as well as the software architecture of the
utility and their limitations in terms of application and preliminary effectiveness estimate
results. A forecast is given as to developing the method and the utility in the near future.
The article describes a method for searching vulnerabilities in machine code based on the analysis of its algorithmized representation obtained with the help of an utility being a part of the method. Vulnerability search falls within the field of telecommunication devices. Phase-by-phase description of the method is discussed, as well as the software architecture of the utility and their limitations in terms of application and preliminary effectiveness estimate results. A forecast is given as to developing the method and the utility in the near future.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果