loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Katsuhisa Maruyama

Affiliation: Ritsumeikan University, Japan

Keyword(s): Refactoring, software restructuring, software security, program analysis, software design.

Related Ontology Subjects/Areas/Topics: Applications ; Enterprise Software Technologies ; Maintenance ; Operational Research ; Pattern Recognition ; Reliable Software Technologies ; Software Engineering

Abstract: Software security is ever-increasingly becoming a serious issue; nevertheless, a large number of software programs are still defenseless against malicious attacks. This paper proposes a new class of refactoring, which is called secure refactoring. This refactoring is not intended to improve the maintainability of existing code. Instead, it helps programmers to increase the protection level of sensitive information stored in the code without changing its observable behavior. In this paper, four secure refactorings of Java source code and their respective mechanics based on static analysis are presented. All transformations of the proposed refactorings can be designed to be automated on our refactoring browser which supports the application of traditional refactorings.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.140.185.170

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Maruyama, K. (2007). SECURE REFACTORING - Improving the Security Level of Existing Code. In Proceedings of the Second International Conference on Software and Data Technologies - Volume 1: ICSOFT; ISBN 978-989-8111-06-7; ISSN 2184-2833, SciTePress, pages 222-229. DOI: 10.5220/0001339102220229

@conference{icsoft07,
author={Katsuhisa Maruyama.},
title={SECURE REFACTORING - Improving the Security Level of Existing Code},
booktitle={Proceedings of the Second International Conference on Software and Data Technologies - Volume 1: ICSOFT},
year={2007},
pages={222-229},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001339102220229},
isbn={978-989-8111-06-7},
issn={2184-2833},
}

TY - CONF

JO - Proceedings of the Second International Conference on Software and Data Technologies - Volume 1: ICSOFT
TI - SECURE REFACTORING - Improving the Security Level of Existing Code
SN - 978-989-8111-06-7
IS - 2184-2833
AU - Maruyama, K.
PY - 2007
SP - 222
EP - 229
DO - 10.5220/0001339102220229
PB - SciTePress