The Improvement of GK-tail Algorithm of Software Behavior Modeling

Software behavior modeling is very important to analyze software system security. The goal of software behavior analysis is to obtain the semantic description and understanding of the software behavior. Software behavior modeling and testing are the key steps to achieve the goal. Therefore, this paper studies the software behavior model algorithm, GK-tail algorithm. GK-tail algorithm uses interaction trace to describe the software behavior, which is concerned interaction between the software components. However, GK-tail algorithm is not accurate. Because GK-tail algorithm uses Daikon analysis tool to obtain the predicates, which contain some errors. In order to improve the accuracy of the GK-tail algorithm in software behavior modeling, this paper improves the traditional GK-tail algorithm based on the extended finite automaton. The improved GK-tail algorithm utilizes the combination of Daikon and static (ESC/Java) tools to filter out some errors of the generated predicates. In addition, this paper designs and implements a prototype system of the improved GK-tail algorithm. The prototype system proves that the improved GK-tail algorithm can filter out errors in the second step of GK-tail algorithm effectively.

[1]  Geoffrey Zweig,et al.  From captions to visual concepts and back , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[2]  Eleni Stroulia,et al.  Mining system-user interaction traces for use case models , 2002, Proceedings 10th International Workshop on Program Comprehension.

[3]  Jun Ai,et al.  Software Network Models Based on Dynamic Execution for Fault Propagation Research , 2015, 2015 IEEE International Conference on Software Quality, Reliability and Security - Companion.

[4]  MengChu Zhou,et al.  Modeling and Validating E-Commerce Business Process Based on Petri Nets , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[5]  Leonardo Mariani,et al.  GK-Tail+ An Efficient Approach to Learn Software Models , 2017, IEEE Transactions on Software Engineering.

[6]  Zhou Min Research on Combat Command Intelligence Activities and Information Model Based on IDEF3 , 2014 .

[7]  Davar Pishva,et al.  A TOR-based anonymous communication approach to secure smart home appliances , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).

[8]  Steven Drager,et al.  Cyber-physical specification mismatch identification with dynamic analysis , 2015, ICCPS.

[9]  V. L. Stefanyuk The behavior of a finite-state automaton in a fuzzy environment: Theory and applications , 2015, Scientific and Technical Information Processing.

[10]  Horst Lichter,et al.  A framework for model recommenders requirements, architecture and tool support , 2014, 2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD).

[11]  Mila Dalla Preda,et al.  Infections as Abstract Symbolic Finite Automata: Formal Model and Applications , 2015, 2015 IEEE/ACM 1st International Workshop on Software Protection.

[12]  Nikolai Kosmatov,et al.  Frama-C - A Software Analysis Perspective , 2012, SEFM.

[13]  Todd R. Andel,et al.  Comparing the effectiveness of commercial obfuscators against MATE attacks , 2016, SSPREW '16.

[14]  Luigi Ciminiera,et al.  Modeling Complex Packet Filters With Finite State Automata , 2015, IEEE/ACM Transactions on Networking.