Design and implementation of the compiler with secure coding rules for developing secure mobile applications in memory usages

被引:0
|
作者
Son, Yun Sik [1 ]
Lee, Yang Sun [2 ]
Oh, Se Man [1 ]
机构
[1] Dept. of Computer Engineering, Dongguk University, 26 3-Ga Phil-Dong, Jung-Gu, Seoul 100-715, Korea, Republic of
[2] Dept. of Computer Engineering, Seokyeong University, 16-1 Jungneung-Dong, Sungbuk-Ku, Seoul 136-704, Korea, Republic of
来源
International Journal of Smart Home | 2012年 / 6卷 / 04期
关键词
Mobile computing - Program compilers - Software reliability - Losses - Network security - Software design - Verification;
D O I
暂无
中图分类号
学科分类号
摘要
With the recent dynamic growth of the mobile market, the problem of personal information leakage through mobile appl cations' weaknesses has become a newly rising problem. Guaranteeing the reliability of input and output data is particularly difficult nowadays because software exchange data across the internet. There is also a risk of being the target of an arbitrary intruder's malicious attack. Such weaknesses have been the root to software security violations that can cause some serious financial damages. Such weaknesses are the direct causes of software security incidents, which generate critical economic losses. Therefore it is important eliminate weaknesses in the software development stage and these areas such as the secure software development process model are being studied, recently.In this study, a compiler which can examine applications' weaknesses at the software development stage has been designed and implemented based on existing weakness research. The proposed compiler analyzes the weaknesses within a program at the point of compilation, different to the existing development environments which separate compilers and weakness analysis tools. As a result, the new compiler enables mobile applications that are developed in rapid development cycles to be created safely from the very first stages of development.
引用
收藏
页码:153 / 168
相关论文
共 50 条
  • [1] Design and Implementation of a Compiler with Secure Coding Rules for Secure Mobile Applications
    Son, Yunsik
    Oh, Seman
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 201 - 206
  • [2] Design and implementation of the secure compiler and virtual machine for developing secure IoT services
    Lee, YangSun
    Jeong, Junho
    Son, Yunsik
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 76 : 350 - 357
  • [3] A standard for developing secure mobile applications
    Dye, Stephen M.
    Scarfone, Karen
    COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) : 524 - 530
  • [4] LAVA: Secure delegation of mobile applets: Design, implementation and applications
    Hansoty, JN
    Vouk, M
    Wu, SF
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 242 - 247
  • [6] Design and implementation of a secure mobile IP protocol
    Mufti, M
    Khanum, A
    2004 INTERNATIONAL NETWORKING AND COMMUNICATIONS CONFERENCE, PROCEEDINGS, 2004, : 53 - 57
  • [7] A design and implementation of secure API based on Windows Mobile
    Zhen, Weikun
    Liang, Weizhong
    Liang, Dongying
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5397 - +
  • [8] CODESSEAL: Compiler/FPGA approach to secure applications
    Gelbart, O
    Ott, P
    Narahari, B
    Simha, R
    Choudhary, A
    Zambreno, J
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 530 - 535
  • [9] Challenges With Developing Secure Mobile Health Applications: Systematic Review
    Aljedaani, Bakheet
    Babar, Ali
    JMIR MHEALTH AND UHEALTH, 2021, 9 (06):
  • [10] Implementation of a secure USIM COS architecture for mobile payment applications
    Xiao, Juan
    Wu, Juan
    Xu, Donglai
    SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONICS AND INFORMATION ENGINEERING, 2017, 10322