Vulnerabilities Constraint Based Analysis Approach for Java']Java Bytecode Programs

被引:0
|
作者
Achour, Safaa [1 ]
Benattou, Mohammed [1 ]
机构
[1] Ibn Tofail Univ, LASTID Lab, Kenitra, Morocco
关键词
component; Vulnerabilities; Program Analysis; Constraints; !text type='Java']Java[!/text] Bytecode; Specification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The verification process of software is of growing importance as it helps to assure that an application is correctly built. However, an efficient verification method of implementation of an application should also reject cases of invalid data which provide valid results. Thus, we propose in this paper a constraint-based analysis technique to detect vulnerabilities in Java applications at the executable level. We propose to exploit both the information contained in the Bytecode structure of the application and the information given by the user specification. Indeed, we show how the user specifications can be used to deduce the invalid input state that put the testing method in valid post-state and then to detect some defections in the Bytecode programs.
引用
收藏
页码:93 / 98
页数:6
相关论文
共 50 条
  • [1] Constraint based Testing and Verification of Java']Java Bytecode Programs
    Achour, Safaa
    Benattou, Mohammed
    [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 64 - 69
  • [2] Path Executions of Java']Java Bytecode Programs
    Soomro, Safeeullah
    Alansari, Zainab
    Belgaum, Mohammad Riyaz
    [J]. PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, VOL 2, 2018, 564 : 261 - 271
  • [3] Dynamic slicing of Java']Java bytecode programs
    Szegedi, A
    Gyimóthy, T
    [J]. FIFTH IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2005, : 35 - 44
  • [4] A Framework for Debugging Java']Java Programs in a Bytecode
    Soomro, Safeeullah
    Belgaum, Mohammad Riyaz
    Alansari, Zainab
    Miraz, Mahdi H.
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 317 - 322
  • [5] An empirical study of Java']Java bytecode programs
    Collberg, Christian
    Myles, Ginger
    Stepp, Michael
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2007, 37 (06): : 581 - 641
  • [6] A programming logic for Java']Java bytecode programs
    Quigley, CL
    [J]. THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2003, 2758 : 41 - 54
  • [7] Verification of Java']Java bytecode using analysis and transformation of logic programs
    Albert, E.
    Gomez-Zamalloa, M.
    Hubert, L.
    Puebla, G.
    [J]. PRACTICAL ASPECTS OF DECLARATIVE LANGUAGES, 2007, 4354 : 124 - +
  • [8] Refactoring Java']Java Programs for Customizable Locks Based on Bytecode Transformation
    Zhang, Yang
    Shao, Shuai
    Liu, Huan
    Qiu, Jing
    Zhang, Dongwen
    Zhang, Guanghua
    [J]. IEEE ACCESS, 2019, 7 : 66292 - 66303
  • [9] Compiling lazy functional programs to Java']Java bytecode
    Meehan, G
    Joy, M
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1999, 29 (07): : 617 - 645
  • [10] Compiling C++ programs to Java']Java bytecode
    Hu, GZ
    Gadapa, A
    [J]. SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERNG, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING AND FIRST AICS INTERNATIONAL WORKSHOP ON SELF-ASSEMBLING WIRELESS NETWORKS, PROCEEDINGS, 2005, : 56 - 61