2010
DOI: 10.1007/978-3-642-11747-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Idea: Towards Architecture-Centric Security Analysis of Software

Abstract: Abstract. Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows, Cross-Site Scripting and SQL injection vulnerabilities. Complementarily to commercial static code review tools, we present an approach to the static security analysis which is based upon the software architecture using a reverse engineering tool suite called Bauhaus. This allows one to analyze software on a more abstract lev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…If we have detected a security pattern or compound, we can extract the pattern in a new view and highlight sources and sinks of the patterns. This would enhance the role-based view described by Sohr et al [25] and give the opportunity to plug in a further information flow analysis to validate the pattern's behavior. To give an example consider the communication with a database or a password manager.…”
Section: The Bauhaus Toolmentioning
confidence: 95%
See 2 more Smart Citations
“…If we have detected a security pattern or compound, we can extract the pattern in a new view and highlight sources and sinks of the patterns. This would enhance the role-based view described by Sohr et al [25] and give the opportunity to plug in a further information flow analysis to validate the pattern's behavior. To give an example consider the communication with a database or a password manager.…”
Section: The Bauhaus Toolmentioning
confidence: 95%
“…3 Security Aspects and the RFG Sohr and Berger [25] depict some possibilities to accomplish a security analysis with the RFG. We resume on their point and discuss other security aspects that can be based upon the RFG.…”
Section: The Bauhaus Toolmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on ARA, Sohr et al propose an architectural centric approach to find architectural flaws [35]. We share the same motivation in our work, but the solutions proposed differ.…”
Section: Dynamic Analysis Of Legacy Codementioning
confidence: 97%
“…Since access control is crucial to many platforms and applications, we can apply the task of extracting the access control policy on other platforms. For example, we extracted the access control policy of a Java enterprise application and compared that policy with the documentation employing the reflexion analysis [31].…”
Section: A Possible Architectural Viewsmentioning
confidence: 99%