Abstract
The current Internet environment is complex, and in the face of endless vulnerability, patching is one of the main means to mitigate vulnerability hazards. In the past few decades, the research on patch detection has mainly focused on detecting patches that modify functions and classes, without fully considering function-irrelevant patches. In this article, we first propose the concept of function-irrelevant patches, and focus on analyzing the types of different elements in their source code, such as functions, global variables, macros, and complex data types. Next, we study how to fix bugs with function-irrelevant patches, and take the CVE-2017- 3737 vulnerability patch as an example. Then, we analyze the impact of function-irrelevant patches on binary files. Finally, we conduct an analysis of the functions of existing patch presence testing tools to clarify their limitations and identify directions for improving function-irrelevant patch detection, with the hope of implementing these improvements in the blockchain field. © 2024 IEEE.
| Original language | English |
|---|---|
| Pages (from-to) | 122-127 |
| Number of pages | 6 |
| Journal | IEEE Communications Magazine |
| Volume | 62 |
| Issue number | 11 |
| Online published | 4 Jun 2024 |
| DOIs | |
| Publication status | Published - Nov 2024 |
Research Keywords
- Computer bugs
- Source coding
- Linux
- Kernel
- Codes
- Blockchains
- Syntactics
Fingerprint
Dive into the research topics of 'An Empirical Study of Function-Irrelevant Patches Based on Internet Software'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver