Title :
Rule-based auditing system for software security assurance
Author :
Jang, Changbok ; Kim, Jeongseok ; Jang, Hyokyung ; Park, Sundo ; Jang, Bokman ; Kim, Bonghoi ; Choi, Euiin
Author_Institution :
Dept. of Comput. Eng., Hannam Univ., Daejeon, South Korea
Abstract :
We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they cannot detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.
Keywords :
auditing; knowledge based systems; security of data; ubiquitous computing; hacking; malicious code detection; personal information outflow; rule-based auditing system; security problems; software dissemination; software security assurance; software vulnerability detection tool; source code security; ubiquitous computing; virus diffusion; Computer security; Information security; Pattern matching; Pervasive computing; Software debugging; Software engineering; Software safety; Software systems; Software tools; Ubiquitous computing; Malicious code; Rule-based; Software auditing tools; Software security assurance; Software vulnerability;
Conference_Titel :
Ubiquitous and Future Networks, 2009. ICUFN 2009. First International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4244-4215-7
Electronic_ISBN :
978-1-4244-4216-4
DOI :
10.1109/ICUFN.2009.5174311