SECURE CODE OPTIMIZATION METHOD AND SYSTEM

A method of automatically generating secure code (12, 26) comprises: receiving source code (22) and security constraints (24) for the source code (22), the security constraints (24) encoding, to what extent a variable (44) in the source code (22) is considered secure; and generating secure code (12,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SCHNEIDER, Johannes, OBERMEIER, Sebastian, HARVAN, Matus, LOCHER, Thomas, PIGNOLET, Yvonne-Anne
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A method of automatically generating secure code (12, 26) comprises: receiving source code (22) and security constraints (24) for the source code (22), the security constraints (24) encoding, to what extent a variable (44) in the source code (22) is considered secure; and generating secure code (12, 26) from the source code (22) and the security constraints (24) by replacing non-secure operations (46) in the source code (22), which operate on the variables (44) considered as secure, with secure operations (46a); wherein a secure operation (46a) is an operation, which, when applied to at least one encrypted variable (44), generates an encrypted result, which, when decrypted, is the result of the non-secure operation (46) applied to the not encrypted variable (44).