Providing a Source Code Security Analysis Model Using Semantic Web Techniques

被引:0
|
作者
EkramiFard, Ala [1 ]
Kahani, Mohsen [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp Engn, Mashhad, Iran
关键词
Security analysis; source code; semantic web ontology;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the main issues in all phases of the software life cycle. Since most software vulnerabilities occur in coding phase, so the secure implementation is very important. Semantic Web ontology expresses the concept of a specific area. According to variety of software systems and manufacturing techniques, the Semantic Web can be effective in production of software systems. Anthology helps to review security holes and bugs in source code and produces appropriate reports. To overcome the problem of variety of source code language, in this paper, an ontology approach for source code security analysis model has been used. In this model, the source code is represented in terms of the RDF triples. The security error patterns are provided in the form of SPARQL queries. The result shows that this approach is promising and can effectively find the security flaw patterns in source codes. Experimental evaluations demonstrate that this approach is feasible and finds bug patterns that implemented. The main advantage of this method is the independence of code analysis and error inference sections so each parts can be developed.
引用
收藏
页码:33 / 37
页数:5
相关论文
共 50 条
  • [21] STraceBERT: Source Code Retrieval using Semantic Application Traces
    Spiess, Claudio
    PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 2207 - 2209
  • [22] Clustering Source Code Elements by Semantic Similarity Using Wikipedia
    Schindler, Mirco
    Fox, Oliver
    Rausch, Andreas
    2015 IEEE/ACM FOURTH INTERNATIONAL WORKSHOP ON REALIZING ARTIFICIAL INTELLIGENCE SYNERGIES IN SOFTWARE ENGINEERING (RAISE 2015), 2015, : 13 - 18
  • [23] Semantic analysis of web pages using web patterns
    Kudelka, Milos
    Snasel, Vaclav
    Lehecka, Ondrej
    E-Qawasmeh, Eyas
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, (WI 2006 MAIN CONFERENCE PROCEEDINGS), 2006, : 329 - +
  • [24] Conflict Detection in Security Policies using Semantic Web Technology
    Neri, Mario Arrigoni
    Guarnieri, Marco
    Magri, Eros
    Mutti, Simone
    Paraboschi, Stefano
    2012 IEEE FIRST AESS EUROPEAN CONFERENCE ON SATELLITE TELECOMMUNICATIONS (ESTEL), 2012,
  • [25] Semantic web service composition via model checking techniques
    Kil, Hyunyoung
    Nam, Wonhong
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2013, 9 (04) : 339 - 350
  • [26] A trusted source-based model of mobile code security
    Liu, Wei-Wei
    Li, Xiao-Yong
    Han, Zhen
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2154 - 2157
  • [28] Using Automated Model Analysis for Reasoning about Security of Web Protocols
    Kumar, Apurva
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 289 - 298
  • [29] Semantic Web Service Composition Using Formal Verification Techniques
    Kil, Hyunyoung
    Nam, Wonhong
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 72 - +
  • [30] Toward a software maintenance methodology using semantic web techniques
    Hyland-Wood, David
    Carrington, David
    Kaplan, Simon
    SECOND INTERNATIONAL IEEE WORKSHOP ON SOFTWARE EVOLVABILITY, PROCEEDINGS, 2006, : 23 - +