UCSY's Research Repository

Analysis of Security Assessment in Software Refactoring

Show simple item record

dc.contributor.author Maw, Myint Myint
dc.contributor.author Oo, Khine Khine
dc.date.accessioned 2019-07-11T07:07:38Z
dc.date.available 2019-07-11T07:07:38Z
dc.date.issued 2017-02-16
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/746
dc.description.abstract Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact on the security of programs has received relatively little attention. Traditionally, security of software is not considered from the very beginning of a software development life cycle, and it is only incorporated in the later stages of development as an afterthought. As a consequence, there are increased risks of security vulnerabilities that are introduced into software coding after refactoring. The proposed system analyses two versions (before/after code refactoring) with two methods such as detect code flaw by Viega’s 12 rules and detect vulnerabilities using Access Level Graphs (ALGs).This approach to automatically code security assessment and record documents by comparing consecutive code versions. Using documented code vulnerabilities facts, developers will be decide this refactoring is whether code security level is more or less. en_US
dc.language.iso en en_US
dc.publisher Fifteenth International Conference on Computer Applications(ICCA 2017) en_US
dc.subject refactorings en_US
dc.subject vulnerabilities en_US
dc.subject software security en_US
dc.subject security refactoring en_US
dc.subject code flaw en_US
dc.subject Access Level Graph (ALG) en_US
dc.title Analysis of Security Assessment in Software Refactoring en_US
dc.type Article en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository


My Account