Research Article

Security Feature Measurement for Frequent Dynamic Execution Paths in Software System

Table 3

Rank and value of function node security features in Tar.

VulnerabilityPropagation
Function nameTar-1.27Tar-1.28Function nameTar-1.27Tar-1.28
(rank/value)(rank/value)

dump_file01/42.841/44.09to_chars1/17.281/17.28
create_archive2/32.022/33.21assign_string2/11.672/11.67
dump_file3/25.924/27.04to_octal3/9.643/9.64
dump_regular_file4/19.375/19.37tar_copy_str4/7.134/7.13
dump_hard_link5/17.376/17.37set_next_block_after5/6.645/6.64
start_header6/15.628/15.62find_next_block6/6.166/6.16
dump_dir07/15.377/16.37start_header7/5.847/5.84
dump_dir8/10.689/11.18finish_header7/5.847/5.84
close_archive9/7.5011/8.00current_block_ordinal7/5.847/5.84
_open_archive10/7.2510/8.75flush_archive8/5.838/5.83