Mining security-sensitive operations in legacy code using concept analysis

Vinod Ganapathy, David King, Trent Jaeger, Somesh Jha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Scopus citations

Abstract

This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that security-sensitive operations performed by a server are characterized by idiomatic resource manipulations, called fingerprints. Candidate fingerprints are automatically mined by clustering resource manipulations using concept analysis. These fingerprints are then used to identify security-sensitive operations performed by the server. Case studies with three real-world servers show that the approach can be used to identify security-sensitive operations with a few hours of manual effort and modest domain knowledge.

Original languageEnglish (US)
Title of host publicationProceedings - 29th International Conference on Software Engineering, ICSE 2007
Pages458-467
Number of pages10
DOIs
StatePublished - 2007
Event29th International Conference on Software Engineering, ICSE 2007 - Minneapolis, MN, United States
Duration: May 20 2007May 26 2007

Publication series

NameProceedings - International Conference on Software Engineering
ISSN (Print)0270-5257

Other

Other29th International Conference on Software Engineering, ICSE 2007
Country/TerritoryUnited States
CityMinneapolis, MN
Period5/20/075/26/07

All Science Journal Classification (ASJC) codes

  • Software

Fingerprint

Dive into the research topics of 'Mining security-sensitive operations in legacy code using concept analysis'. Together they form a unique fingerprint.

Cite this