Research Article

A Quantitative Assessment Approach to COTS Component Security

Table 1

Exceptional predication rules and vulnerability factors.

IDPredication rulesDescriptionVC

01General exception The general exception code is detected, or throw an exception0.5
02Access out of rangeRunning a thread attempts to read or write the memory address, but has no corresponding access authority1
03Matrix visited beyond scopeA thread tries to access an array element beyond scope1
04Access the memory page not exiting The file system returns a read error resulting in page fault which can-not meet the requirements0.8
05Visit the protected page A thread tries to access memory page that has the attribute of PAGE_GUARD 1
06Stack of thread is overflowA thread runs out of all stack space assigned to it1
07Execute illegal instructionA thread running an instruction that is not allowed in the current thread or executing an invalid instruction1
08Divisor is 0A thread tries to divide an integer or a float by 0 0.8
09Operation out of rangeAn operation result exceeds the specified range values0.8
10Floating-point stack overflowStack overflow or underflow because of floating-point operations1
11Buffer overflowWritten contents beyond the buffer length, resulting in written data covering the original return address and destroying the program stack1
12Memory leakageMonitoring the input and output values of malloc(), free(), realloc() functions and making a statistical analysis to achieve a memory leakage check1
13Format string exceptionsFormat or parameter mismatch when using printf() function, such as ā€œ%n%n%s%dā€1