Research Article
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System
Table 3
Rank and value of function node security features in Tar.
| Vulnerability | Propagation | Function name | Tar-1.27 | Tar-1.28 | Function name | Tar-1.27 | Tar-1.28 | (rank/value) | (rank/value) |
| dump_file0 | 1/42.84 | 1/44.09 | to_chars | 1/17.28 | 1/17.28 | create_archive | 2/32.02 | 2/33.21 | assign_string | 2/11.67 | 2/11.67 | dump_file | 3/25.92 | 4/27.04 | to_octal | 3/9.64 | 3/9.64 | dump_regular_file | 4/19.37 | 5/19.37 | tar_copy_str | 4/7.13 | 4/7.13 | dump_hard_link | 5/17.37 | 6/17.37 | set_next_block_after | 5/6.64 | 5/6.64 | start_header | 6/15.62 | 8/15.62 | find_next_block | 6/6.16 | 6/6.16 | dump_dir0 | 7/15.37 | 7/16.37 | start_header | 7/5.84 | 7/5.84 | dump_dir | 8/10.68 | 9/11.18 | finish_header | 7/5.84 | 7/5.84 | close_archive | 9/7.50 | 11/8.00 | current_block_ordinal | 7/5.84 | 7/5.84 | _open_archive | 10/7.25 | 10/8.75 | flush_archive | 8/5.83 | 8/5.83 |
|
|