ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. シンポジウム
  2. シンポジウムシリーズ
  3. ソフトウェアエンジニアリングシンポジウム
  4. 2021

A Framework for Automatic Detection of Vulnerabilities in Human-Machine Pair Programming

https://ipsj.ixsq.nii.ac.jp/records/212695
https://ipsj.ixsq.nii.ac.jp/records/212695
feaa7037-e5fc-488f-a717-b4af76ca6132
名前 / ファイル ライセンス アクション
IPSJ-SES2021022.pdf IPSJ-SES2021022.pdf (919.4 kB)
Copyright (c) 2021 by the Information Processing Society of Japan
オープンアクセス
Item type Symposium(1)
公開日 2021-08-30
タイトル
タイトル A Framework for Automatic Detection of Vulnerabilities in Human-Machine Pair Programming
タイトル
言語 en
タイトル A Framework for Automatic Detection of Vulnerabilities in Human-Machine Pair Programming
言語
言語 eng
キーワード
主題Scheme Other
主題 安全性・セキュリティ
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者所属
Hiroshima University
著者所属
Hiroshima University
著者所属
Hiroshima University
著者所属(英)
en
Hiroshima University
著者所属(英)
en
Hiroshima University
著者所属(英)
en
Hiroshima University
著者名 Pingyan, Wang

× Pingyan, Wang

Pingyan, Wang

Search repository
Shaoying, Liu

× Shaoying, Liu

Shaoying, Liu

Search repository
Ai, Liu

× Ai, Liu

Ai, Liu

Search repository
著者名(英) Pingyan, Wang

× Pingyan, Wang

en Pingyan, Wang

Search repository
Shaoying, Liu

× Shaoying, Liu

en Shaoying, Liu

Search repository
Ai, Liu

× Ai, Liu

en Ai, Liu

Search repository
論文抄録
内容記述タイプ Other
内容記述 In order to mitigate the severe consequences of security threats, many software-based systems are endeavoring to detect security vulnerabilities as early as possible in the software life cycle. In this paper, we present a framework for systematically detecting and mitigating potential security vulnerabilities during the construction of programs using a particular programming paradigm known as Human-Machine Pair Programming. The framework allows developers to address the vulnerability problem in the coding phase rather than fix it at a high price when the system is in operation. Our framework advocates three critical steps: (1) generate an attack tree to model a specific security threat, (2) construct code-matching patterns based on the result of the attack tree analysis, and (3) detect corresponding vulnerable code based on the patterns during the program construction. We also present a case study to demonstrate how it works in practice.
論文抄録(英)
内容記述タイプ Other
内容記述 In order to mitigate the severe consequences of security threats, many software-based systems are endeavoring to detect security vulnerabilities as early as possible in the software life cycle. In this paper, we present a framework for systematically detecting and mitigating potential security vulnerabilities during the construction of programs using a particular programming paradigm known as Human-Machine Pair Programming. The framework allows developers to address the vulnerability problem in the coding phase rather than fix it at a high price when the system is in operation. Our framework advocates three critical steps: (1) generate an attack tree to model a specific security threat, (2) construct code-matching patterns based on the result of the attack tree analysis, and (3) detect corresponding vulnerable code based on the patterns during the program construction. We also present a case study to demonstrate how it works in practice.
書誌情報 ソフトウェアエンジニアリングシンポジウム2021論文集

巻 2021, p. 129-136, 発行日 2021-08-30
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-19 17:24:52.310657
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3