메뉴 건너뛰기




Volumn , Issue , 2008, Pages 445-452

Security-aware refactoring alerting its impact on code vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

REFACTORING; REFACTORING TOOLS; SECURITY FEATURES; SECURITY VULNERABILITIES; SECURITY-AWARE; SOFTWARE SYSTEMS;

EID: 67650563932     PISSN: 15301362     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (30)
  • 1
    • 67650518579 scopus 로고    scopus 로고
    • Java-XML Tools Project
    • Java-XML Tools Project. http://www.jtool.org/.
  • 2
    • 67650560622 scopus 로고    scopus 로고
    • Jif: Java information flow
    • Jif: Java information flow. http://www.cs.cornell.edu/jif/.
  • 5
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 15
  • 19
    • 0032646625 scopus 로고    scopus 로고
    • Jflow: Practical mostly-static information flow
    • January
    • A. C.Myers. Jflow: Practical mostly-static information flow. In Proc. POPL'99, pages 228-241, January 1999.
    • (1999) Proc. POPL'99 , pp. 228-241
    • Myers, A.C.1
  • 20
    • 0003547217 scopus 로고    scopus 로고
    • 2nd ed. Addison-Wesley
    • S. Oaks. Java Security, 2nd ed. Addison-Wesley, 2001.
    • (2001) Java Security
    • Oaks, S.1
  • 21
    • 33751059718 scopus 로고    scopus 로고
    • JAAT: Java alias analysis tool for program maintenance activities
    • F.Ohata and K. Inoue. JAAT: Java alias analysis tool for program maintenance activities. In Proc. ISORC 2006, pages 232-244, 2006.
    • (2006) Proc. ISORC 2006 , pp. 232-244
    • Ohata, F.1    Inoue, K.2
  • 22
    • 0003489758 scopus 로고
    • Refactoring object-oriented frameworks
    • Ph.D. thesis, University of Illinois, Urbana-Champaign
    • W. F. Opdyke. Refactoring object-oriented frameworks. Technical report, Ph.D. thesis, University of Illinois, Urbana-Champaign, 1992.
    • (1992) Technical report
    • Opdyke, W.F.1
  • 25
    • 0002379404 scopus 로고    scopus 로고
    • Analysis of programs with exception-handling constructs
    • S. Sinha and M. J. Harrold. Analysis of programs with exception-handling constructs. In Proc. ICSM'98, pages 358-367, 1998.
    • (1998) Proc. ICSM'98 , pp. 358-367
    • Sinha, S.1    Harrold, M.J.2
  • 26
    • 0034270432 scopus 로고    scopus 로고
    • Statically scanning Java code: Finding security vulnerabilities
    • DOI 10.1109/52.877869
    • J. Viega, G. McGraw, T. Mutdosch, and E. W. Felten. Statically scanning Java code: Finding security vulnerabilities. IEEE Software, 17(5):68-74, 2000. (Pubitemid 30940417)
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 68-74
    • Viega, J.1    McGraw, G.2    Mutdosch, T.3    Felten, E.W.4
  • 28
    • 67650518578 scopus 로고    scopus 로고
    • Secure programming for linux and unix howto.
    • D. A. Wheeler. Secure programming for linux and unix howto. http://www.dwheeler.com/secure-programs/.
    • Wheeler, D.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.