Providing a Source Code Security Analysis Model Using Semantic Web Techniques

被引:0
|
作者
EkramiFard, Ala [1 ]
Kahani, Mohsen [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp Engn, Mashhad, Iran
关键词
Security analysis; source code; semantic web ontology;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the main issues in all phases of the software life cycle. Since most software vulnerabilities occur in coding phase, so the secure implementation is very important. Semantic Web ontology expresses the concept of a specific area. According to variety of software systems and manufacturing techniques, the Semantic Web can be effective in production of software systems. Anthology helps to review security holes and bugs in source code and produces appropriate reports. To overcome the problem of variety of source code language, in this paper, an ontology approach for source code security analysis model has been used. In this model, the source code is represented in terms of the RDF triples. The security error patterns are provided in the form of SPARQL queries. The result shows that this approach is promising and can effectively find the security flaw patterns in source codes. Experimental evaluations demonstrate that this approach is feasible and finds bug patterns that implemented. The main advantage of this method is the independence of code analysis and error inference sections so each parts can be developed.
引用
收藏
页码:33 / 37
页数:5
相关论文
共 50 条
  • [31] Network Access Control interoperation using Semantic Web techniques
    Fitzgerald, William
    Foley, Simon
    Foghlu, Micheal O.
    WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 26 - +
  • [32] Analyzing Source Code Identifiers for Code Reuse using NLP Techniques and WordNet
    Pirapuraj, P.
    Perera, Indika
    2017 3RD INTERNATIONAL MORATUWA ENGINEERING RESEARCH CONFERENCE (MERCON), 2017, : 105 - 110
  • [33] Analysis of Source Code Using UPPAAL
    Kulczynski, Mitja
    Legay, Axel
    Nowotka, Dirk
    Poulsen, Danny Bogsted
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2021, (338): : 31 - 38
  • [34] A Neural Embedding for Source Code: Security Analysis and CWE Lists
    Saletta, Martina
    Ferretti, Claudio
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 523 - 530
  • [35] Software Defect Prediction Using a Hybrid Model Based on Semantic Features Learned from the Source Code
    Miholca, Diana-Lucia
    Czibula, Gabriela
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2019, PT I, 2019, 11775 : 262 - 274
  • [36] Improving web sites by automatic source code analysis and modifications
    Ciebiera, K
    Sankowski, P
    WEB ENGINEERING, PROCEEDINGS, 2004, 3140 : 579 - 580
  • [37] Program semantic analysis model for code reuse detection
    Guo, Xi
    Wang, Pan
    Tongxin Xuebao/Journal on Communications, 2024, 45 (12): : 179 - 196
  • [38] Towards an Implementation of Information Flow Security using Semantic Web Technologies
    Ureche, Oana
    Layton, Robert
    Watters, Paul
    2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, : 75 - 80
  • [39] Research and Implementation of Security Vulnerability Detection in Application System of WEB Static Source Code Analysis Based on JAVA']JAVA
    Yuan, Hui
    Zheng, Lei
    Dong, Liang
    Peng, Xiangli
    Zhuang, Yan
    Deng, Guoru
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 444 - 452
  • [40] SE-CodeSearch: A Scalable Semantic Web-based Source Code Search Infrastructure
    Keivanloo, Iman
    Roostapour, Laleh
    Schugerl, Philipp
    Rilling, Juergen
    2010 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, 2010,