Security assessment of code refactoring rules


Autoria(s): Alshammari, Bandar; Fidge, Colin J.; Corney, Diane
Data(s)

2012

Resumo

Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/56382/

Publicador

IEEE (Institute of Electrical and Electronics Engineers, Inc.) & IET (The Institution of Engineering and Technology)

Relação

http://eprints.qut.edu.au/56382/1/wiar2012_secure_refactoring.pdf

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6210569

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2012) Security assessment of code refactoring rules. In Proceedings of the Saudi Arabian National Workshop on Information Assurance Research (WIAR 2012), IEEE (Institute of Electrical and Electronics Engineers, Inc.) & IET (The Institution of Engineering and Technology), Riyadh, Saudi Arabia.

http://purl.org/au-research/grants/ARC/LP0776344

Direitos

Copyright 2012 IEEE

Fonte

School of Electrical Engineering & Computer Science; Institute for Future Environments; Information Security Institute; Science & Engineering Faculty

Palavras-Chave #080303 Computer System Security #Object-orientation #Software Security #Security Metrics #Software Refactoring #Information Flow
Tipo

Conference Paper