DocumentCode :
2745519
Title :
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
Author :
Ganapathy, Vinod ; King, David ; Jaeger, Trent ; Jha, Somesh
Author_Institution :
Univ. of Wisconsin, Milwaukee, WI
fYear :
2007
fDate :
20-26 May 2007
Firstpage :
458
Lastpage :
467
Abstract :
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that security-sensitive operations performed by a server are characterized by idiomatic resource manipulations, called fingerprints. Candidate fingerprints are automatically mined by clustering resource manipulations using concept analysis. These fingerprints are then used to identify security-sensitive operations performed by the server. Case studies with three real-world servers show that the approach can be used to identify security-sensitive operations with a few hours of manual effort and modest domain knowledge.
Keywords :
authorisation; data mining; pattern clustering; program diagnostics; safety-critical software; software maintenance; authorization policy enforcement; candidate fingerprint; concept analysis; idiomatic resource manipulation; legacy code; pattern clustering; security-sensitive operation mining; static analysis; Access control; Authorization; File servers; Fingerprint recognition; Lattices; Linux; Manuals; Pattern analysis; Resource management; Software systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering, 2007. ICSE 2007. 29th International Conference on
Conference_Location :
Minneapolis, MN
ISSN :
0270-5257
Print_ISBN :
0-7695-2828-7
Type :
conf
DOI :
10.1109/ICSE.2007.54
Filename :
4222607
Link To Document :
بازگشت