The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 22nd International Conference on Program Comprehension 2014
DOI: 10.1145/2597008.2597138
|View full text |Cite
|
Sign up to set email alerts
|

Redacting sensitive information in software artifacts

Abstract: In the past decade, there have been many well-publicized cases of source code leaking from different well-known companies. These leaks pose a serious problem when the source code contains sensitive information encoded in its identifier names and comments. Unfortunately, redacting the sensitive information requires obfuscating the identifiers, which will quickly interfere with program comprehension. Program comprehension is key for programmers in understanding the source code, so sensitive information is often … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(18 citation statements)
references
References 42 publications
(43 reference statements)
0
18
0
Order By: Relevance
“…First, we show the method with only one quartile of the terms visible. We obfuscated the other three quartiles using a standard term-replacement technique (replace the terms with non-meaningful strings such as xxxx) [50]. For example, a Java method with 20 terms would have about five terms visible, and about 15 terms obfuscated.…”
Section: Methodsmentioning
confidence: 99%
“…First, we show the method with only one quartile of the terms visible. We obfuscated the other three quartiles using a standard term-replacement technique (replace the terms with non-meaningful strings such as xxxx) [50]. For example, a Java method with 20 terms would have about five terms visible, and about 15 terms obfuscated.…”
Section: Methodsmentioning
confidence: 99%
“…Values at the leaves are generalized by replacing them with the sub-ranges [3][4][5][6] or (6)(7)(8)(9)(10)(11)(12)(13)(14). These in turn can be replaced by [3][4][5][6][7][8][9][10][11][12][13][14]. Or the leaf values can be suppressed by replacing them with a symbol such as the stars at the top of 11 12 14 Datafly then replaces values in the quasi-identifiers according to the hierarchy.…”
Section: Datafly For K-anonymitymentioning
confidence: 99%
“…Randomly choose an instance from the data, for this example we will use row 1 in Table 4.2b, randomly select an attribute from A, e.g. wmc pair with its sub-range (6)(7)(8)(9)(10)(11)(12)(13)(14).…”
Section: Query Generatormentioning
confidence: 99%
See 2 more Smart Citations