Software Security Validation through Regular Expressions
نویسندگان
چکیده
منابع مشابه
Repairing Data through Regular Expressions
Since regular expressions are often used to detect errors in sequences such as strings or date, it is natural to use them for data repair. Motivated by this, we propose a data repair method based on regular expression to make the input sequence data obey the given regular expression with minimal revision cost. The proposed method contains two steps, sequence repair and token value repair. For s...
متن کاملThe Power of Regular Expressions in the Software Development Process
The tutorial will present various lightweight generators to support software development. The input of these generators is either the source code or special textual models describing the application to be generated. The generators are set up by means of regular expressions that extract the relevant information from the input files.
متن کاملSoftware Security through Open Source *
The last few years have shown a worldwide rise in the attention for, and actual use of, open source software (OSS), most notably of the operating system Linux and various applications running on top of it. Variousmajor companies and governments are adopting OSS. As a result, there are many publications concerning its advantages and disadvantages. The ongoing discussions cover a wide range of to...
متن کاملAssuring Software Security Through Testing
(ISC)2®’s whitepaper, Code (In)Security, highlights various considerations that need to be taken into account to develop code that is secure. But merely developing secure code without attesting to its assurance capabilities is akin to operating an automobile without checking to ensure that the brakes work as expected. With such an outlook, a crash becomes not just possible but inevitable. This ...
متن کاملSoftware Security through Targeted Diversification
Despite current software protection techniques, applications are still analysed, tampered with, and abused on a large scale. Crackers compensate for each new protection technique by adapting their analysis and tampering tools. This paper presents a low-cost mechanism to effectively protect software against global tampering attacks. By introducing diversity per programme instance, we illustrate ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing and Digital Systems
سال: 2022
ISSN: ['2210-142X', '2535-9886']
DOI: https://doi.org/10.12785/ijcds/110156