Redirigiendo al acceso original de articulo en 18 segundos...
Inicio  /  Applied Sciences  /  Vol: 10 Par: 1 (2020)  /  Artículo
ARTÍCULO
TITULO

An Approach to Analyze Vulnerability of Information Flow in Software Architecture

Tingyang Gu    
Minyan Lu    
Luyi Li and Qiuying Li    

Resumen

Current research on software vulnerability analysis mostly focus on source codes or executable programs. But these methods can only be applied after software is completely developed when source codes are available. This may lead to high costs and tremendous difficulties in software revision. On the other hand, as an important product of software design phase, architecture can depict not only the static structure of software, but also the information flow due to interaction of components. Architecture is crucial in determining the quality of software. As a result, by locating the architecture-level information flow that violates security policies, vulnerabilities can be found and fixed in the early phase of software development cycle when revision is easier with lower cost. In this paper, an approach for analyzing information flow vulnerability in software architecture is proposed. First, the concept of information flow vulnerability in software architecture is elaborated. Corresponding security policies are proposed. Then, a method for constructing service invocation diagrams based on graph theory is proposed, which can depict information flow in software architecture. Moreover, an algorithm for vulnerability determination is designed to locate architecture-level vulnerabilities. Finally, a case study is provided, which verifies the effectiveness and feasibility of the proposed methods.

 Artículos similares

       
 
Tao Feng, Taining Chen and Xiang Gong    
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analy... ver más
Revista: Information

 
Olga Kurasova, Arnoldas Bud?ys and Viktor Medvedev    
As artificial intelligence has evolved, deep learning models have become important in extracting and interpreting complex patterns from raw multidimensional data. These models produce multidimensional embeddings that, while containing a lot of informatio... ver más
Revista: Informatics

 
Alexander Robitzsch    
Item response theory (IRT) models are frequently used to analyze multivariate categorical data from questionnaires or cognitive test data. In order to reduce the model complexity in item response models, regularized estimation is now widely applied, addi... ver más
Revista: Algorithms

 
Sai Wang, Guoping Fu, Yongduo Song, Jing Wen, Tuanqi Guo, Hongjin Zhang and Tuantuan Wang    
The development of intelligent oceans requires exploration and an understanding of the various characteristics of the oceans. The emerging Internet of Underwater Things (IoUT) is an extension of the Internet of Things (IoT) to underwater environments, an... ver más

 
M. Domaneschi, R. Cucuzza, L. Sardone, S. Londoño Lopez, M. Movahedi and G. C. Marano    
Random vibration analysis is a mathematical tool that offers great advantages in predicting the mechanical response of structural systems subjected to external dynamic loads whose nature is intrinsically stochastic, as in cases of sea waves, wind pressur... ver más
Revista: Computation