Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis

dc.contributor.authorGanapathy, Vinoden_US
dc.contributor.authorKing, Daveen_US
dc.contributor.authorJaeger, Trenten_US
dc.contributor.authorJha, Someshen_US
dc.date.accessioned2012-03-15T17:21:11Z
dc.date.available2012-03-15T17:21:11Z
dc.date.created2006en_US
dc.date.issued2006
dc.description.abstractWe present an approach based on concept analysis to retrofit legacy servers with mechanisms for authorization policy enforcement. Our approach is based upon the observation that security-sensitive operations are characterized by idiomatic resource manipulations, called fingerprints. We statically mine fingerprints using concept analysis and then use them to identify security-sensitive operations and locate where they are performed by the server. Case studies with three real-world servers show that our approach is affordable and effective. We were able to identify security-sensitive operations for each of these servers with a few hours of manual effort and modest domain knowledge.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationTR1580en_US
dc.identifier.urihttp://digital.library.wisc.edu/1793/60534
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleMining Security-Sensitive Operations in Legacy Code Using Concept Analysisen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR1580.pdf
Size:
2.23 MB
Format:
Adobe Portable Document Format