SecureQualitas: A Security Corpus of Real Java']Java Applications

被引:0
|
作者
Benabidallah, Raounak [1 ]
Sadou, Salah [1 ]
Borne, Isabelle [1 ]
机构
[1] Univ Bretagne Sud, IRISA, Lorient, France
来源
2019 INTERNATIONAL CONFERENCE ON CYBER SECURITY FOR EMERGING TECHNOLOGIES (CSET) | 2019年
关键词
D O I
10.1109/cset.2019.8904906
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to this objective. Most of them rely on empirical studies which need a realistic corpus. This corpus holds applications with different vulnerabilities and others without any known vulnerability. To the best of our knowledge, such a security corpus does not exist. In this paper, we present a novel approach based on an automatic annotation process to build a security corpus for real Java applications. Our approach takes advantage of several existing code scanners in order to annotate the corpus. We applied our process of vulnerability annotation on a well-known corpus, namely Qualitas Corpus, from the software engineering research community. We provide the resulting security corpus, namely SecureQualitas, to the research community. The experiments we conducted demonstrate that our approach gives better results than the scanners taken alone.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A security infrastructure for distributed Java']Java applications
    Balfanz, D
    Dean, D
    Spreitzer, M
    2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 15 - 26
  • [2] A security framework for reflective Java']Java applications
    Caromel, D
    Vayssière, J
    SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (09): : 821 - 846
  • [3] Java']Java in real-time applications
    Bertolissi, E
    Preece, C
    IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 1998, 45 (04) : 1965 - 1972
  • [4] Profiling real-time Java']Java applications
    Connery, J.
    Mc Enery, J.
    Hickey, D.
    Boubekeur, M.
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 319 - 324
  • [5] Secure JAVA']JAVA applets and applications: Guidelines and lessons learnt from the JAVA']JAVA security model
    Bichindaritz, I
    Siadak, MF
    Jocom, J
    Moinpour, C
    Donaldson, G
    Bush, N
    Chapko, M
    Sullivan, KM
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1999, : 1028 - 1028
  • [6] ESC/Java']Java2 as a tool to ensure security in the source code of Java']Java applications
    Schubert, Aleksy
    Chrzaszcz, Jacek
    SOFTWARE ENGINEERING TECHNIQUES: DESIGN FOR QUALITY, 2006, 227 : 337 - +
  • [7] Finding security vulnerabilities in Java']Java applications with static analysis
    Livshits, VB
    Lam, MS
    USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 271 - 286
  • [8] Using class decompilers to facilitate the security of Java']Java applications!
    Tam, V
    Gupta, RK
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING, VOL I, 2000, : 153 - 158
  • [9] JACK -: A tool for validation of security and behaviour of Java']Java applications
    Barthe, Gilles
    Burdy, Lilian
    Charles, Julien
    Gregoire, Benjamin
    Huisman, Marieke
    Lanet, Jean-Louis
    Pavlova, Mariela
    Requet, Antoine
    FORMAL METHODS FOR COMPONENTS AND OBJECTS, 2007, 4709 : 152 - +
  • [10] Develop Java']Java Card applications using security policy
    Xu, Junwu
    Niu, Zhimei
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6281 - 6283