dc.contributor.author |
Mourad, Azzam |
|
dc.contributor.author |
Alhadidi, Dima |
|
dc.contributor.author |
Debbabi, Mourad |
|
dc.date.accessioned |
2017-03-08T13:36:40Z |
|
dc.date.available |
2017-03-08T13:36:40Z |
|
dc.date.issued |
2017-03-08 |
|
dc.identifier.isbn |
9780769533902 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/5333 |
|
dc.description.abstract |
In this paper, we propose an approach for systematic security hardening of software based on aspect-oriented programming and Gimple language. We also present the first steps towards a formal specification for Gimple weaving together with the implementation methodology of the proposed weaving semantics. The primary contribution of this approach is providing the software architects with the capabilities to perform systematic security hardening by applying well-defined solutions and without the need to have expertise in the security solution domain. We explore the viability of our propositions by realizing the weaving semantics for Gimple by implementing it into the GCC compiler and applying our methodologies for systematic security hardening to develop a case study for securing the connections of client applications together with experimental results. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.title |
Cross-language weaving approach targeting software security hardening |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
200904853 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.keywords |
Security |
en_US |
dc.keywords |
Software |
en_US |
dc.keywords |
Weaving |
en_US |
dc.keywords |
Programming |
en_US |
dc.keywords |
Computer languages |
en_US |
dc.keywords |
Libraries |
en_US |
dc.keywords |
Laboratoires |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.1109/PST.2008.22 |
en_US |
dc.identifier.ctation |
Mourad, A., Alhadidi, D., & Debbabi, M. (2008, October). Cross-language weaving approach targeting software security hardening. In 2008 Sixth Annual Conference on Privacy, Security and Trust (pp. 87-98). IEEE. |
en_US |
dc.author.email |
azzam.mourad@lau.edu.lb |
en_US |
dc.conference.date |
1-3 Oct. 2008 |
en_US |
dc.conference.place |
Fredericton, New Brunswick, Canada |
en_US |
dc.conference.title |
2008 Sixth Annual Conference on Privacy, Security and Trust |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
http://ieeexplore.ieee.org/abstract/document/4641276/ |
en_US |
dc.orcid.id |
https://orcid.org/0000-0001-9434-5322 |
|
dc.publication.date |
2008 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |