• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Jinfu, Lu Yansheng, and Xie Xiaodong. A Fault Injection Model of Component Security Testing[J]. Journal of Computer Research and Development, 2009, 46(7): 1127-1135.
Citation: Chen Jinfu, Lu Yansheng, and Xie Xiaodong. A Fault Injection Model of Component Security Testing[J]. Journal of Computer Research and Development, 2009, 46(7): 1127-1135.

A Fault Injection Model of Component Security Testing

More Information
  • Published Date: July 14, 2009
  • The reliability and security of components block the development of component technology. Currently, component security testing is rarely researched as a special subject, and there are not some feasible approaches or technologies in detecting component security vulnerabilities. Problems with the component reliability and security have not yet been solved. The authors propose a FIM (fault injection model) of component security testing, and then specify some related definitions of FIM model and its matrix specification. A TGSM (test-cases generating based on solution matrix) algorithm of fault injection for component security is proposed based on FIM. The algorithm TGSM generates solution matrix that meets K factors coverage according to the matrix form of the FIM model. All rows data of the solution matrix compose the fault injection test-cases. The FIM model is implemented well based on research projects CSTS (component security testing system). Finally, the experimental results show that the approach which generates the fault injection test-cases of 3 factors coverage is effective. It can trigger the vast majority of the security exceptions by using the appropriate test-cases. FIM is effective and operable.
  • Related Articles

    [1]Chen Zhiqiang, Zhou Hongwei, Feng Quanyou, Deng Rangyu. Design and Implementation of Configurable Cache Coherence Protocol for Multi-Core Processor[J]. Journal of Computer Research and Development, 2021, 58(6): 1166-1175. DOI: 10.7544/issn1000-1239.2021.20210174
    [2]Hou Pengpeng, Zhang Heng, Wu Yanjun, Yu Jiageng, Tai Yang, Miao Yuxia. Kernel Configuration Infographic Based on Multi-Label and Its Application[J]. Journal of Computer Research and Development, 2021, 58(3): 651-667. DOI: 10.7544/issn1000-1239.2021.20200186
    [3]Wang Tao, Chen Wei, Li Juan, Liu Shaohua, Su Lingang, Zhang Wenbo. Association Mining Based Consistent Service Configuration[J]. Journal of Computer Research and Development, 2020, 57(1): 188-201. DOI: 10.7544/issn1000-1239.2020.20190079
    [4]Wu Weiguo, Wang Chaohui, Wang Jinyu, Nie Shiqiang, Hu Zhuang. MH-RLE: A Compression Algorithm for Dynamic Reconfigurable System Configuration Files Based on Run-Length Coding[J]. Journal of Computer Research and Development, 2018, 55(5): 1049-1064. DOI: 10.7544/issn1000-1239.2018.20170015
    [5]Shen Jianliang, Li Sikun, Liu Lei, Wang Guanwu, Wang Xin, Liu Qinrang. Hierarchical Configuration Memory Design for Coarse-Grained Reconfigurable SoC[J]. Journal of Computer Research and Development, 2017, 54(5): 1121-1129. DOI: 10.7544/issn1000-1239.2017.20150889
    [6]Wang Cong, Yuan Ying, Peng Sancheng, Wang Xingwei, Wang Cuirong, Wan Cong. Fair Virtual Network Embedding Algorithm with Topology Pre-Configuration[J]. Journal of Computer Research and Development, 2017, 54(1): 212-220. DOI: 10.7544/issn1000-1239.2017.20150785
    [7]Li Yong, Wang Zhiying, Zhao Xuemi, and Yue Hong. Design of Application Specific Instruction-Set Processors Directed by Configuration Stream Driven Computing Architecture[J]. Journal of Computer Research and Development, 2007, 44(4): 714-721.
    [8]Fan Yibo, Zeng Xiaoyang, and Yu Yu. VLSI Design of a High-Speed RSA Crypto-Coprocessor with Reconfigurable Architecture[J]. Journal of Computer Research and Development, 2006, 43(6): 1076-1082.
    [9]Gu Haiyun, Li Li, Xu Juyan, Gao Minglun. Lossless Configuration Bitstream Compression for Virtex FPGAs[J]. Journal of Computer Research and Development, 2006, 43(5): 940-945.
    [10]Tian Junfeng, Liu Yuling, Du Ruizhong. The Model and Adaptive Configuration Management Strategy for a Distributed Database Server System[J]. Journal of Computer Research and Development, 2005, 42(1): 126-133.

Catalog

    Article views (574) PDF downloads (592) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return