Trust Management

LAUR Repository

Show simple item record

dc.date.accessioned 2020-05-15T10:24:04Z
dc.date.available 2020-05-15T10:24:04Z
dc.date.copyright 2007 en_US
dc.identifier.isbn 9780387736556 en_US
dc.identifier.uri http://hdl.handle.net/10725/11894
dc.description.abstract In this paper, we present two new control flow based point-cuts to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. They allow to identify particular join points in a program’s control flow graph (CFG). The first proposed primitive is the GAFlow, the closest guaranteed ancestor, which returns the closest ancestor join point to the pointcuts of interest that is on all their runtime paths. The second proposed primitive is the GDFlow, the closest guaranteed descendant, which returns the closest child join point that can be reached by all paths starting from the pointcuts of interest. We find these pointcuts to be necessary because they are needed to perform many security hardening practices and, to the best of our knowledge, none of the existing pointcuts can provide their functionalities. Moreover, we show the viability and correctness of our proposed pointcuts by elaborating and implementing their algorithms and presenting the results of a testing case study. en_US
dc.language.iso en en_US
dc.publisher Springer en_US
dc.title Trust Management en_US
dc.type Book / Chapter of a Book en_US
dc.author.school SAS en_US
dc.author.idnumber 200904853 en_US
dc.author.department Computer Science And Mathematics en_US
dc.publication.place Boston, Mass. en_US
dc.keywords Critical Section en_US
dc.keywords Execution Path en_US
dc.keywords Control Flow Graph en_US
dc.keywords Security Hardening en_US
dc.keywords Library Initialization en_US
dc.description.bibliographiccitations Includes bibliographical references en_US
dc.identifier.doi http://dx.doi.org/10.1007/978-0-387-73655-6_20 en_US
dc.identifier.ctation Laverdière, M. A., Mourad, A., Soeanu, A., & Debbabi, M. (2007, July). Control flow based pointcuts for security hardening concerns. In IFIP International Conference on Trust Management (pp. 301-316). Springer, Boston, MA. en_US
dc.chapter.author Laverdière, Marc-André
dc.chapter.author Mourad, Azzam
dc.chapter.author Soeanu, Andrei
dc.chapter.author Debbabi, Mourad
dc.author.email azzam.mourad@lau.edu.lb en_US
dc.chapter.pages 301-316 en_US
dc.chapter.title Control flow based pointcuts for security hardening concerns en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url https://link.springer.com/chapter/10.1007/978-0-387-73655-6_20 en_US
dc.publication.date 2007 en_US
dc.book.author Etalle, Sandro
dc.book.author Marsh, Stephen
dc.author.affiliation Lebanese American University en_US
dc.orcid.id2 https://orcid.org/0000-0001-9434-5322 en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR

Advanced Search


My Account