SECURE CODE OPTIMIZATION METHOD AND SYSTEM
A method of automatically generating secure code (12, 26) comprises: receiving source code (22) and security constraints (24) for the source code (22), the security constraints (24) encoding, to what extent a variable (44) in the source code (22) is considered secure; and generating secure code (12,...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A method of automatically generating secure code (12, 26) comprises: receiving source code (22) and security constraints (24) for the source code (22), the security constraints (24) encoding, to what extent a variable (44) in the source code (22) is considered secure; and generating secure code (12, 26) from the source code (22) and the security constraints (24) by replacing non-secure operations (46) in the source code (22), which operate on the variables (44) considered as secure, with secure operations (46a); wherein a secure operation (46a) is an operation, which, when applied to at least one encrypted variable (44), generates an encrypted result, which, when decrypted, is the result of the non-secure operation (46) applied to the not encrypted variable (44). |
---|