Cost Based Vulnerability Control Method Using Static Analysis Tool

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Static cost analysis

It’s oen useful to ask questions about programs without actually running them. For example, we might want to know if a program contains some class of bugs such as division by zero or memory access errors. For compilers static information is vital for good quality machine code generation. Another class of questions is about cost of running a program. For instance, we might want to know if the p...

متن کامل

Privacy Assessment Using Static Taint Analysis (Tool Paper)

When developing and maintaining distributed systems, auditing privacy properties gains more and more relevance. Nevertheless, this task is lacking support of automated tools and, hence, is mostly carried out manually. We present a formal approach which enables auditors to model the flow of critical data in order to shed new light on a system and to automatically verify given privacy constraints...

متن کامل

Implementation of Malware Analysis using Static and Dynamic Analysis Method

Malware analysis is a process to perform analysis of malware and how to study the components and behavior of malware. On this paper it will use two methods of malware analysis, static analysis and dynamic analysis. Static analysis is a method of malware analysis which done without running the malware. While dynamic analysis is a method of malware analysis which the malware is running in a secur...

متن کامل

Internet Firewall Vulnerability Analysis Method

Firewall is the main defence of our network and is no guarantee the present of hidden vulnerabilities. Under there is no well-defined general methodology for testing the firewalls, this is always a big headache for the administrators. Two firewall testing approaches are being compared and the correctness of the testing result is reported as well.

متن کامل

Static Enforcement of Role-Based Access Control on Method Invocation

We propose a new static approach to RBAC policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system’s architecture, helping to ensure that policies are correctly defined and enforced. We apply this new approach to policies restricting calls to methods in Java applications. How...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: KIPS Transactions on Software and Data Engineering

سال: 2016

ISSN: 2287-5905

DOI: 10.3745/ktsde.2016.5.3.139