Research Article
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System
Table 2
Rank and value of function node security features in Cflow.
| Vulnerability | Propagation | Function name | Cflow-1.3 | Cflow-1.4 | Function name | Cflow-1.3 | Cflow-1.4 | (rank/value) | (rank/value) |
| parse_variable_declaration | 1/45.05 | 1/47.07 | nexttoken | 1/33.73 | 1/36.17 | parse_declaration | 2/40.77 | 2/41.85 | tokpush | 2/19.74 | 3/20.96 | yyparse | 3/37.50 | 4/38.82 | putback | 3/19.32 | 4/19.32 | parse_typedef | 4/19.33 | 6/20.78 | get_token | 4/17.86 | 5/19.08 | tree_output | 5/18.50 | 5/25.56 | linked_list_append | 5/15.47 | 2/21.06 | func_body | 6/18.15 | 7/18.28 | lookup | 6/13.79 | 6/13.94 | parse_function_declaration | 7/17.80 | 8/17.99 | hash_symbol_hasher | 7/12.90 | 8/13.04 | parse_dcl | 8/16.92 | 9/17.41 | hash_symbol_compare | 7/12.90 | 8/13.04 | expression | 9/16.17 | 10/16.42 | yy_load_buffer_state | 8/12.86 | 7/13.27 | initializer_list | 10/12.53 | 13/12.72 | yylex | 9/9.93 | 11/10.54 |
|
|