메뉴 건너뛰기




Volumn , Issue , 2007, Pages 458-467

Mining security-sensitive operations in legacy code using concept analysis

Author keywords

[No Author keywords available]

Indexed keywords

CLUSTER ANALYSIS; CODES (SYMBOLS); LEGACY SYSTEMS; SECURITY OF DATA; SERVERS; STATISTICAL METHODS;

EID: 34548734722     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2007.54     Document Type: Conference Paper
Times cited : (33)

References (32)
  • 1
    • 85081451591 scopus 로고    scopus 로고
    • http://www.cs.wise.edu/~vg/papers/icse2007.
  • 3
    • 0038716505 scopus 로고    scopus 로고
    • Debugging temporal specifications with concept analysis
    • G. Ammons, D. Mandelin, R. Bodik, and J. R. Larus. Debugging temporal specifications with concept analysis. In PLDI, 2003.
    • (2003) PLDI
    • Ammons, G.1    Mandelin, D.2    Bodik, R.3    Larus, J.R.4
  • 5
    • 85081447387 scopus 로고    scopus 로고
    • Aspect-oriented software development glossary
    • Aspect-oriented software development glossary. http://aosd.net/wiki/ index.php?title=Glossary.
  • 6
    • 31844457357 scopus 로고    scopus 로고
    • L. Bauer, J. Ligatti, and D. Walker. Composing security policies with Polymer. In PLDI, 2005.
    • L. Bauer, J. Ligatti, and D. Walker. Composing security policies with Polymer. In PLDI, 2005.
  • 7
    • 0025443276 scopus 로고
    • Compartmented mode workstation: Prototype highlights
    • J. Berger, J. Picciotto, J. Woodward, and P. Cummings. Compartmented mode workstation: Prototype highlights. IEEE TSE, 16(6), 1990.
    • (1990) IEEE TSE , vol.16 , Issue.6
    • Berger, J.1    Picciotto, J.2    Woodward, J.3    Cummings, P.4
  • 9
  • 13
    • 85081443504 scopus 로고    scopus 로고
    • Case study: Open source and commercial applications in a Java-based SELinux cross-domain solution
    • B. Fletcher. Case study: Open source and commercial applications in a Java-based SELinux cross-domain solution. In 2nd Security-enhanced Linux Symp., 2006.
    • (2006) 2nd Security-enhanced Linux Symp
    • Fletcher, B.1
  • 14
    • 33745766475 scopus 로고    scopus 로고
    • Automatic placement of authorization hooks in the Linux security modules framework. In ACM
    • V. Ganapathy, T. Jaeger, and S. Jha. Automatic placement of authorization hooks in the Linux security modules framework. In ACM Conf. Comp. Sr Comm. Security, 2005.
    • (2005) Conf. Comp. Sr Comm. Security
    • Ganapathy, V.1    Jaeger, T.2    Jha, S.3
  • 16
    • 0029306863 scopus 로고
    • Incremental concept formation algorithms based on Galois (concept) lattices
    • R. Godin, R. Missaoui, and H. Alaoui. Incremental concept formation algorithms based on Galois (concept) lattices. Computational Intelligence, 11(2), 1995.
    • (1995) Computational Intelligence , vol.11 , Issue.2
    • Godin, R.1    Missaoui, R.2    Alaoui, H.3
  • 18
    • 3142518085 scopus 로고    scopus 로고
    • Consistency analysis of authorization hook placement in the Linux security modules framework
    • T. Jaeger, A. Edwards, and X. Zhang. Consistency analysis of authorization hook placement in the Linux security modules framework. ACM TISSEC, 7(2), 2004.
    • (2004) ACM TISSEC , vol.7 , Issue.2
    • Jaeger, T.1    Edwards, A.2    Zhang, X.3
  • 20
    • 24744432328 scopus 로고    scopus 로고
    • Securing the X Window system with SELinux
    • Technical Report 03-006, NAI Labs
    • D. Kilpatrick, W. Salamon, and C. Vance. Securing the X Window system with SELinux. Technical Report 03-006, NAI Labs, 2003.
    • (2003)
    • Kilpatrick, D.1    Salamon, W.2    Vance, C.3
  • 21
    • 0030615516 scopus 로고    scopus 로고
    • Assesing modular structure of legacy code based on mathematical concept analysis
    • C. Lindig and G. Snelting. Assesing modular structure of legacy code based on mathematical concept analysis. In ICSE, 1997.
    • (1997) ICSE
    • Lindig, C.1    Snelting, G.2
  • 22
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the Linux operating system
    • P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical Conf. (FREENIX), 2001.
    • (2001) USENIX Annual Technical Conf. (FREENIX)
    • Loscocco, P.1    Smalley, S.2
  • 23
  • 25
    • 0032218209 scopus 로고    scopus 로고
    • G. Snelting and F. Tip. Reengineering class hierarchies using concept analysis. In ACM SIGSOFT FSE, 1998.
    • G. Snelting and F. Tip. Reengineering class hierarchies using concept analysis. In ACM SIGSOFT FSE, 1998.
  • 26
    • 18144367757 scopus 로고    scopus 로고
    • Aspect mining through the formal concept analysis of execution traces
    • P. Tonella and M. Ceccato. Aspect mining through the formal concept analysis of execution traces. In 11th Conf. on Reverse Engineering, 2004.
    • (2004) 11th Conf. on Reverse Engineering
    • Tonella, P.1    Ceccato, M.2
  • 28
    • 0032688675 scopus 로고    scopus 로고
    • Identifying objects using cluster and concept analysis
    • A. van Duersen and T. Kuipers. Identifying objects using cluster and concept analysis. In ICSE, 1999.
    • (1999) ICSE
    • van Duersen, A.1    Kuipers, T.2
  • 29
    • 0000398336 scopus 로고
    • Restructuring lattice theory: An approach based on hierarchies of concepts
    • R. Wille. Restructuring lattice theory: An approach based on hierarchies of concepts. Ordered Sets, 1982.
    • (1982) Ordered Sets
    • Wille, R.1
  • 31
    • 85081451966 scopus 로고    scopus 로고
    • The X11 Server, version X11R6.8 (X.OrgFoundation).
    • The X11 Server, version X11R6.8 (X.OrgFoundation).
  • 32
    • 85084161756 scopus 로고    scopus 로고
    • Using CQUAL for static analysis of authorization hook placement
    • X. Zhang, A. Edwards, and T. Jaeger. Using CQUAL for static analysis of authorization hook placement. In USENIX Security Symp., 2002.
    • (2002) USENIX Security Symp
    • Zhang, X.1    Edwards, A.2    Jaeger, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.