透過您的圖書館登入
IP:3.145.164.106
  • 期刊

Detection and Analysis of Security Vulnerabilities in Java

並列摘要


There are several tools that use techniques like static analysis, lexical analysis etc to detect the vulnerabilities in Java based programs. However still there are vulnerabilities which are not traceable by the available tools. The objective of this paper is twofold. We develop a method to detect vulnerabilities in Java programs. Further we analyze the dependencies among the vulnerabilities using mathematical lattice theory based formal concept analysis. Our experimental result show that the proposed model is able to detect the untraceable vulnerabilities and the dependency analysis is in good agreement with the literature.

參考文獻


Aswani Kumar, Ch.(2011).Knowledge discovery in data using formal concept analysis and random projections.International Journal of Applied Mathematics and Computer Science.21(4),745-756.
Aswani Kumar, Ch.(2011).Mining association rules using non-negative matrix factorization and formal concept analysis.Communications in Computer and Information Science.157,31-39.
Aswani Kumar, Ch.(2012).Modeling access permissions in role based access control using formal concept analysis.Wireless Networks and Computational Intelligence.(Wireless Networks and Computational Intelligence).:
Aswani Kumar, Ch.(2012).Fuzzy clustering based formal concept analysis for association rules mining.Applied Artificial Intelligence.26(3),274-301.
Aswani Kumar, Ch.(2013).Designing role based access control using formal concept analysis.Security and Communication Networks.6(3),373-383.

被引用紀錄


Shih, J. F. (2011). 一套整合的網路應用安全分析與驗證工具 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2011.01077

延伸閱讀