Security Framework to Verify the Low Level Implementation Codes

With the development of web-application, especially E-commerce, many software designers need to incorporate either low-level security functionalities into their programs. This involves the implementation of security features using Java Cryptography Architecture (JCA), Java Cryptography Extension (JC...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kim, Haeng-Kon, Yang, Hae-Sool
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 61
container_issue
container_start_page 52
container_title
container_volume
creator Kim, Haeng-Kon
Yang, Hae-Sool
description With the development of web-application, especially E-commerce, many software designers need to incorporate either low-level security functionalities into their programs. This involves the implementation of security features using Java Cryptography Architecture (JCA), Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE) API provided by Sun Corporation [1]. Through our discovery, we find that many functional security related features in software systems are usually implemented by a few methods. The use of these methods results to some necessary structural patterns in reduced control flow graph of the program. In this papers, we present our way to recover the security features by recognizing these methods invocations automatically and transform the reduced control flow graph to state transition diagram through functional abstractions. We believe that it would not only facilitate the comprehension of the security framework implemented in the program, but also make the further verification of the security features possible.
doi_str_mv 10.1007/11424826_6
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_16990991</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>16990991</sourcerecordid><originalsourceid>FETCH-LOGICAL-p218t-a7105aabfa81628fac09c4627f2a8f3242978c82aa2cf22606aa7c71e4325de73</originalsourceid><addsrcrecordid>eNpFkEtLAzEUheMLrLUbf0E2gpvR5CaTx0qkWC0MuPCxHW7TRMfOi2Rs6b-3UtHVWXyHw-Ej5IKza86YvuFcgjSgSnVAJlYbkUsmgElpD8mIK84zIaQ9-mOQG8XhmIyYYJBZLcUpOUvpkzEG2sKI3D579xWrYUtnERu_6eKKDh1987EKWzp8eFp0G1r4ta_pvOlr3_h2wKHqWjrtlj6dk5OAdfKT3xyT19n9y_QxK54e5tO7IuuBmyFDzVmOuAhouAIT0DHrpAIdAE0QIGF32BlABBcAFFOI2mnupYB86bUYk8v9bo_JYR0itq5KZR-rBuO25MpaZi3f9a72vbRD7buP5aLrVqnkrPwRWP4LFN9fxlw9</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security Framework to Verify the Low Level Implementation Codes</title><source>Springer Books</source><creator>Kim, Haeng-Kon ; Yang, Hae-Sool</creator><contributor>Gervasi, Osvaldo ; Gavrilova, Marina L. ; Taniar, David ; Laganà, Antonio ; Mun, Youngsong ; Lee, Heow Pueh ; Tan, Chih Jeng Kenneth ; Kumar, Vipin</contributor><creatorcontrib>Kim, Haeng-Kon ; Yang, Hae-Sool ; Gervasi, Osvaldo ; Gavrilova, Marina L. ; Taniar, David ; Laganà, Antonio ; Mun, Youngsong ; Lee, Heow Pueh ; Tan, Chih Jeng Kenneth ; Kumar, Vipin</creatorcontrib><description>With the development of web-application, especially E-commerce, many software designers need to incorporate either low-level security functionalities into their programs. This involves the implementation of security features using Java Cryptography Architecture (JCA), Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE) API provided by Sun Corporation [1]. Through our discovery, we find that many functional security related features in software systems are usually implemented by a few methods. The use of these methods results to some necessary structural patterns in reduced control flow graph of the program. In this papers, we present our way to recover the security features by recognizing these methods invocations automatically and transform the reduced control flow graph to state transition diagram through functional abstractions. We believe that it would not only facilitate the comprehension of the security framework implemented in the program, but also make the further verification of the security features possible.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540258612</identifier><identifier>ISBN: 3540258612</identifier><identifier>ISBN: 9783540258605</identifier><identifier>ISBN: 3540258604</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540320449</identifier><identifier>EISBN: 354032044X</identifier><identifier>DOI: 10.1007/11424826_6</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Exact sciences and technology ; Reduced Control Flow Graph ; Security features ; Slicing ; State Transition Diagram</subject><ispartof>Computational Science and Its Applications – ICCSA 2005, 2005, p.52-61</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11424826_6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11424826_6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=16990991$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Gervasi, Osvaldo</contributor><contributor>Gavrilova, Marina L.</contributor><contributor>Taniar, David</contributor><contributor>Laganà, Antonio</contributor><contributor>Mun, Youngsong</contributor><contributor>Lee, Heow Pueh</contributor><contributor>Tan, Chih Jeng Kenneth</contributor><contributor>Kumar, Vipin</contributor><creatorcontrib>Kim, Haeng-Kon</creatorcontrib><creatorcontrib>Yang, Hae-Sool</creatorcontrib><title>Security Framework to Verify the Low Level Implementation Codes</title><title>Computational Science and Its Applications – ICCSA 2005</title><description>With the development of web-application, especially E-commerce, many software designers need to incorporate either low-level security functionalities into their programs. This involves the implementation of security features using Java Cryptography Architecture (JCA), Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE) API provided by Sun Corporation [1]. Through our discovery, we find that many functional security related features in software systems are usually implemented by a few methods. The use of these methods results to some necessary structural patterns in reduced control flow graph of the program. In this papers, we present our way to recover the security features by recognizing these methods invocations automatically and transform the reduced control flow graph to state transition diagram through functional abstractions. We believe that it would not only facilitate the comprehension of the security framework implemented in the program, but also make the further verification of the security features possible.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Reduced Control Flow Graph</subject><subject>Security features</subject><subject>Slicing</subject><subject>State Transition Diagram</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540258612</isbn><isbn>3540258612</isbn><isbn>9783540258605</isbn><isbn>3540258604</isbn><isbn>9783540320449</isbn><isbn>354032044X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFkEtLAzEUheMLrLUbf0E2gpvR5CaTx0qkWC0MuPCxHW7TRMfOi2Rs6b-3UtHVWXyHw-Ej5IKza86YvuFcgjSgSnVAJlYbkUsmgElpD8mIK84zIaQ9-mOQG8XhmIyYYJBZLcUpOUvpkzEG2sKI3D579xWrYUtnERu_6eKKDh1987EKWzp8eFp0G1r4ta_pvOlr3_h2wKHqWjrtlj6dk5OAdfKT3xyT19n9y_QxK54e5tO7IuuBmyFDzVmOuAhouAIT0DHrpAIdAE0QIGF32BlABBcAFFOI2mnupYB86bUYk8v9bo_JYR0itq5KZR-rBuO25MpaZi3f9a72vbRD7buP5aLrVqnkrPwRWP4LFN9fxlw9</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Kim, Haeng-Kon</creator><creator>Yang, Hae-Sool</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Security Framework to Verify the Low Level Implementation Codes</title><author>Kim, Haeng-Kon ; Yang, Hae-Sool</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p218t-a7105aabfa81628fac09c4627f2a8f3242978c82aa2cf22606aa7c71e4325de73</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Reduced Control Flow Graph</topic><topic>Security features</topic><topic>Slicing</topic><topic>State Transition Diagram</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kim, Haeng-Kon</creatorcontrib><creatorcontrib>Yang, Hae-Sool</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kim, Haeng-Kon</au><au>Yang, Hae-Sool</au><au>Gervasi, Osvaldo</au><au>Gavrilova, Marina L.</au><au>Taniar, David</au><au>Laganà, Antonio</au><au>Mun, Youngsong</au><au>Lee, Heow Pueh</au><au>Tan, Chih Jeng Kenneth</au><au>Kumar, Vipin</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security Framework to Verify the Low Level Implementation Codes</atitle><btitle>Computational Science and Its Applications – ICCSA 2005</btitle><date>2005</date><risdate>2005</risdate><spage>52</spage><epage>61</epage><pages>52-61</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540258612</isbn><isbn>3540258612</isbn><isbn>9783540258605</isbn><isbn>3540258604</isbn><eisbn>9783540320449</eisbn><eisbn>354032044X</eisbn><abstract>With the development of web-application, especially E-commerce, many software designers need to incorporate either low-level security functionalities into their programs. This involves the implementation of security features using Java Cryptography Architecture (JCA), Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE) API provided by Sun Corporation [1]. Through our discovery, we find that many functional security related features in software systems are usually implemented by a few methods. The use of these methods results to some necessary structural patterns in reduced control flow graph of the program. In this papers, we present our way to recover the security features by recognizing these methods invocations automatically and transform the reduced control flow graph to state transition diagram through functional abstractions. We believe that it would not only facilitate the comprehension of the security framework implemented in the program, but also make the further verification of the security features possible.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11424826_6</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Computational Science and Its Applications – ICCSA 2005, 2005, p.52-61
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_16990991
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Exact sciences and technology
Reduced Control Flow Graph
Security features
Slicing
State Transition Diagram
title Security Framework to Verify the Low Level Implementation Codes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T09%3A01%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20Framework%20to%20Verify%20the%20Low%20Level%20Implementation%20Codes&rft.btitle=Computational%20Science%20and%20Its%20Applications%20%E2%80%93%20ICCSA%202005&rft.au=Kim,%20Haeng-Kon&rft.date=2005&rft.spage=52&rft.epage=61&rft.pages=52-61&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540258612&rft.isbn_list=3540258612&rft.isbn_list=9783540258605&rft.isbn_list=3540258604&rft_id=info:doi/10.1007/11424826_6&rft_dat=%3Cpascalfrancis_sprin%3E16990991%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540320449&rft.eisbn_list=354032044X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true