Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set

  • JingFeng Xue
  • Yan Zhang
  • ChangZhen Hu
  • HongYu Ren
  • ZhiQiang LiEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9473)


Structural analysis represented by FSMDiff algorithm is the main measuring approach for existing software behavior model which is based on finite state automata. This method just focus on the data structure of finite state automata as figure characteristics, however, as software behavior model, it is more important for finite state automaton to reflect the characteristics of software behavior. So we need to find out a method to distinguish the importance in the finite state automata between different state nodes. This paper shows how the output of the FSMDiff algorithm can provide a quantified expression of structural difference between two models. According to this, we also introduce the language-set analysis, which uses the depth-first traversal algorithm to solve the language set of finite state automata. Above all, we propose a new strategy of assigning weights for the local elements of software behavior model, which can fusion assigning weight results and structural analysis for evaluation of software behavioral models. Experiment results demonstrate the effectiveness and feasibility of software behavioral model measuring approach of combining structural analysis and language set, and laid the foundation for constructing evaluation system of software behavior model inference technology.


Software behavior model Finite state automata Structural analysis Language-set FSMDiff algorithm 



This work was supported by the Key Project of National Defense Basic Research Program of China (Grant No. B1120132031) and the Ph.D. Programs Foundation of Ministry of Education of China (Grant No. 20131101120043).


  1. 1.
    Wang, X.Z., Sun, L.C., Lu, Y.L.: Intrusion detection approach towards software behavior trustworthiness. J. Univ. Sci. Technol. China 41(7), 626–635 (2011)Google Scholar
  2. 2.
    Peng, G.J., Tao, F., Zhang, H.G.: Research on theory model of software dynamic trustiness based on behavior integrity. In: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security, pp. 130–134. Washington, DC, USA (2009)Google Scholar
  3. 3.
    Godefroid, E., Levin, M.Y., Molnar, D.: Automated whitebox fuzz testing. In: Proceedings of the 16th Annual Network & Distributed System Security Symposium, pp. 1–10. San Diego, USA (2008)Google Scholar
  4. 4.
    Borger, E.: Abstract state machines and high-level system design and analysis. Theor. Comput. Sci. 336(2), 205–207 (2005)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Quante, J., Koschke, R.: Dynamic protocol recovery. In: Proceedings of the 14th International Working Conference on Reverse Engineering, pp. 219–228. Vancouver, Canada (2007)Google Scholar
  6. 6.
    Hopcroft, J., Motwani, R., Ullman, J.: Introduction to automata theory, languages and computation, 3rd edn. Addison-Wesley, New Jersey (2007)Google Scholar
  7. 7.
    Walkinshaw, N., Bogdanov, K.: Comparing software behavior models. Technical report: CS-08-16, The University of Sheffield, Sheffield, UK (2008)Google Scholar
  8. 8.
    Walkinshaw, N., Bogdanov, K., Johnson, K.: Evaluation and comparison of inferred regular grammars. In: Clark, A., Coste, F., Miclet, L. (eds.) ICGI 2008. LNCS (LNAI), vol. 5278, pp. 252––265. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  9. 9.
    Lo, D., Khoo, S.: QUARK: empirical assessment of automaton-based specification miners. In: Proceedings of the 13th Working Conference on Reverse Engineering, pp. 51–60. Benevento, Italy (2006)Google Scholar
  10. 10.
    Frossi, A., Maggi, F., Rizzo, G.L., Zanero, S.: Selecting and improving system call models for anomaly detection. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 206––223. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  11. 11.
    Lang, K.J., Pearlmutter, B.A., Price, R.A.: In: Honavar, V.G., Slutzki, G. (eds.) ICGI 1998. LNCS (LNAI), vol. 1433, p. 1. Springer, Heidelberg (1998)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • JingFeng Xue
    • 1
  • Yan Zhang
    • 1
  • ChangZhen Hu
    • 1
  • HongYu Ren
    • 1
  • ZhiQiang Li
    • 1
    Email author
  1. 1.School of SoftwareBeijing Institute of TechnologyBeijingChina

Personalised recommendations