메뉴 건너뛰기




Volumn SE, Issue , 2007, Pages 222-229

Secure refactoring : Improving the security level of existing code

Author keywords

Program analysis; Refactoring; Software design; Software restructuring; Software security

Indexed keywords

JAVA SOURCE CODES; MALICIOUS ATTACK; NEW CLASS; OBSERVABLE BEHAVIOR; PROGRAM ANALYSIS; PROTECTION LEVEL; REFACTORING; REFACTORINGS; SECURITY LEVEL; SENSITIVE INFORMATIONS; SOFTWARE PROGRAM; SOFTWARE RESTRUCTURING; SOFTWARE SECURITY;

EID: 42449143457     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (25)
  • 3
    • 0023385308 scopus 로고
    • The program dependence graph and its use in optimization
    • Ferrante, J., Ottenstein, K. J., and Warren, J. D. (1987). The program dependence graph and its use in optimization. ACM TOPLAS, 9(3):319-349.
    • (1987) ACM TOPLAS , vol.9 , Issue.3 , pp. 319-349
    • Ferrante, J.1    Ottenstein, K.J.2    Warren, J.D.3
  • 11
    • 0028514027 scopus 로고
    • A taxonomy of computer program security flaws, with examples
    • Landwehr, C. E., Bull, A. R., McDermott, J. P., and Choi, W. S. (1994). A taxonomy of computer program security flaws, with examples. ACM Computing Surveys, 26(3):211-254.
    • (1994) ACM Computing Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.E.1    Bull, A.R.2    McDermott, J.P.3    Choi, W.S.4
  • 12
    • 27744520860 scopus 로고    scopus 로고
    • Design and implementation of an extensible and modifiable refactoring tool
    • Maruyama, K. and Yamamoto, S. (2005). Design and implementation of an extensible and modifiable refactoring tool. In Proc. IWPC'05, pages 195-204.
    • (2005) Proc. IWPC'05 , pp. 195-204
    • Maruyama, K.1    Yamamoto, S.2
  • 14
    • 0037510541 scopus 로고    scopus 로고
    • Twelve rules for developing more secure Java code
    • McGraw, G. and Felten, E. (1998). Twelve rules for developing more secure Java code. Java-world. http://www.javaworld.com/javaworld/jw-12-1998/j w-12-securityrules.html.
    • (1998) Java-world
    • McGraw, G.1    Felten, E.2
  • 15
    • 1842431668 scopus 로고    scopus 로고
    • A survey of software refactoring
    • Mens, T. and Tourwé, T. (2004). A survey of software refactoring. IEEE Trans. Sofw. Eng., 30(2):126-139.
    • (2004) IEEE Trans. Sofw. Eng , vol.30 , Issue.2 , pp. 126-139
    • Mens, T.1    Tourwé, T.2
  • 16
    • 0003547217 scopus 로고    scopus 로고
    • 2nd ed. Addison-Wesley
    • Oaks, S. (2001). Java Security, 2nd ed. Addison-Wesley.
    • (2001) Java Security
    • Oaks, S.1
  • 17
    • 0003489758 scopus 로고
    • Refactoring object-oriented frameworks
    • Ph.D. thesis, University of Illinois, Urbana-Champaign
    • Opdyke, W. F. (1992). Refactoring object-oriented frameworks. Technical report, Ph.D. thesis, University of Illinois, Urbana-Champaign.
    • (1992) Technical report
    • Opdyke, W.F.1
  • 18
    • 0015482049 scopus 로고
    • On the criteria to be used in decomposing systems into modules
    • Parnas, D. L. (1972). On the criteria to be used in decomposing systems into modules. Comm. ACM, 15(12):1053-1058.
    • (1972) Comm. ACM , vol.15 , Issue.12 , pp. 1053-1058
    • Parnas, D.L.1
  • 19
    • 33745938077 scopus 로고    scopus 로고
    • Refactoring programs to secure information flows
    • Smith, S. F. and Thober, M. (2006). Refactoring programs to secure information flows. In Proc. PLAS'06, pages 75-84.
    • (2006) Proc. PLAS'06 , pp. 75-84
    • Smith, S.F.1    Thober, M.2
  • 20
    • 21644468210 scopus 로고    scopus 로고
    • SunMicrosystems (2000). Security code guidelines. http://java.sun.com/ security/seccodeguide.html.
    • (2000) Security code guidelines
  • 22
    • 0034270432 scopus 로고    scopus 로고
    • Statically scanning Java code: Finding security vulnerabilities
    • Viega, J., McGraw, G., Mutdosch, T, and Felten, E. W. (2000). Statically scanning Java code: Finding security vulnerabilities. IEEE Software, 17(5):68-74.
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 68-74
    • Viega, J.1    McGraw, G.2    Mutdosch, T.3    Felten, E.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.