Please use this identifier to cite or link to this item:
https://ah.lib.nccu.edu.tw/handle/140.119/100314
DC Field | Value | Language |
---|---|---|
dc.creator | Kumar, Ch. Aswani;Charitha, M. Sai | |
dc.date | 2014-03 | |
dc.date.accessioned | 2016-08-16T08:21:35Z | - |
dc.date.available | 2016-08-16T08:21:35Z | - |
dc.date.issued | 2016-08-16T08:21:35Z | - |
dc.identifier.uri | http://nccur.lib.nccu.edu.tw/handle/140.119/100314 | - |
dc.description.abstract | There are several tools that use techniques like static analysis, lexical analysis etc to detect the vulnerabilities in Java based programs. However still there are vulnerabilities which are not traceable by the available tools. The objective of this paper is twofold. We develop a method to detect vulnerabilities in Java programs. Further we analyze the dependencies among the vulnerabilities using mathematical lattice theory based formal concept analysis. Our experimental result show that the proposed model is able to detect the untraceable vulnerabilities and the dependency analysis is in good agreement with the literature. | |
dc.format.extent | 739370 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.relation | 資管評論, 19(2), 39-56 | |
dc.relation | MIS review | |
dc.subject | Formal Concept Analysis;Java Programs;Static Analysis;Vulnerability Detection | |
dc.title | Detection and Analysis of Security Vulnerabilities in Java | |
dc.type | article | |
dc.identifier.doi | 10.6131/MISR.2014.1902.03 | |
dc.doi.uri | http://dx.doi.org/10.6131/MISR.2014.1902.03 | |
item.cerifentitytype | Publications | - |
item.grantfulltext | open | - |
item.openairetype | article | - |
item.fulltext | With Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
Appears in Collections: | 期刊論文 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
19(2)-39-56.pdf | 722.04 kB | Adobe PDF2 | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.