Research Article

Security Feature Measurement for Frequent Dynamic Execution Paths in Software System

Table 2

Rank and value of function node security features in Cflow.

VulnerabilityPropagation
Function nameCflow-1.3Cflow-1.4Function nameCflow-1.3Cflow-1.4
(rank/value)(rank/value)

parse_variable_declaration1/45.051/47.07nexttoken1/33.731/36.17
parse_declaration2/40.772/41.85tokpush2/19.743/20.96
yyparse3/37.504/38.82putback3/19.324/19.32
parse_typedef4/19.336/20.78get_token4/17.865/19.08
tree_output5/18.505/25.56linked_list_append5/15.472/21.06
func_body6/18.157/18.28lookup6/13.796/13.94
parse_function_declaration7/17.808/17.99hash_symbol_hasher7/12.908/13.04
parse_dcl8/16.929/17.41hash_symbol_compare7/12.908/13.04
expression9/16.1710/16.42yy_load_buffer_state8/12.867/13.27
initializer_list10/12.5313/12.72yylex9/9.9311/10.54