2010 Asia Pacific Software Engineering Conference 2010
DOI: 10.1109/apsec.2010.30
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the Impact of Refactoring on Security-Critical Object-Oriented Designs

Abstract: Abstract-Refactoring focuses on improving the reusability, maintainability and performance of programs. However, the impact of refactoring on the security of a given program has received little attention. In this work, we focus on the design of object-oriented applications and use metrics to assess the impact of a number of standard refactoring rules on their security by evaluating the metrics before and after refactoring. This assessment tells us which refactoring steps can increase the security level of a gi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…This paper builds on previous work that shows that refactoring can have a substantial effect on security metrics when applied to a software design [3]. We extend this work by using the search-based refactoring platform, Code-Imp, guided by security metrics to test if the security of source code can be improved in an automated fashion.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This paper builds on previous work that shows that refactoring can have a substantial effect on security metrics when applied to a software design [3]. We extend this work by using the search-based refactoring platform, Code-Imp, guided by security metrics to test if the security of source code can be improved in an automated fashion.…”
Section: Discussionmentioning
confidence: 99%
“…The security metrics we use in this paper are those defined by Alshammari et al [1,3,4]. These metrics are based on the information flow within a program or software design and cover such areas as data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size.…”
Section: Overview Of Security Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Bandar uses the code refactoring rules in context of security assessment and recalculated the metric values on the basis of security assessment guidelines inspired from refactoring rules to validate the results for security. Bandar picks only 16 refactoring activities and reframe his observation for security restructuring 15 . Another work developed by Maruyama that aims to improve the security of a given program's code by identifying vulnerabilities by using design set of secure refactoring rules 16 .…”
Section: Formulation Of Rulesmentioning
confidence: 99%
“…However, these approaches do not allow enterprise systems' designers to assess the overall security of a given system based on its architecture. Recent studies conducted by Alshammari et al [7], [8], [15] had defined several security metrics for UML class designs, and described a tool for automatically evaluating such metrics [16]. The defined metrics assess the potential flow of security-critical data by measuring the accessibility of such data based on the security design principles of -granting least privilege‖ [17]- [19] and -reducing the size of the attack surface‖ [20], [14].…”
Section: Related Workmentioning
confidence: 99%