Software vulnerabilities are an important resource for cyberspace security. The rapid development of automated bug finding methods represented by fuzzing enables vulnerabilities to be found quickly, but the precise analysis of vulnerabilities mainly relies on manual labor. To improve the efficiency of vulnerability analysis, many automated vulnerability analysis tools have emerged in recent years, and how to evaluate these analysis engines has become a new challenge. This paper designs and implements a set of anomaly sample datasets for vulnerability analysis and introduces the construction method of the datasets. The data set has the characteristics of complete variety, strong applicability, and high degree of expansion, and is expected to support the ability verification of vulnerability analysis tools.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.