Identifying Security Spots for Data Integrity
Title | Identifying Security Spots for Data Integrity |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Ogale, Pushkar, Shin, Michael, Abeysinghe, Sasanka |
Conference Name | 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) |
Date Published | jul |
Publisher | IEEE |
ISBN Number | 978-1-5386-2667-2 |
Keywords | benign code, composability, coupling, Couplings, data integrity, Databases, IBCs, insider attack, insiders, Integrity breach condition, integrity breach conditions, malicious code, Malware, Metrics, object oriented security, object-oriented programming, object-oriented programs, program diagnostics, pubcrawl, resilience, Resiliency, security of data, Security spot, security spots identification, Tools |
Abstract | This paper describes an approach to detecting malicious code introduced by insiders, which can compromise the data integrity in a program. The approach identifies security spots in a program, which are either malicious code or benign code. Malicious code is detected by reviewing each security spot to determine whether it is malicious or benign. The integrity breach conditions (IBCs) for object-oriented programs are specified to identify security spots in the programs. The IBCs are specified by means of the concepts of coupling within an object or between objects. A prototype tool is developed to validate the approach with a case study. |
URL | https://ieeexplore.ieee.org/document/8377905/ |
DOI | 10.1109/COMPSAC.2018.10277 |
Citation Key | ogale_identifying_2018 |
- malware
- tools
- security spots identification
- Security spot
- security of data
- Resiliency
- resilience
- pubcrawl
- program diagnostics
- object-oriented programs
- object-oriented programming
- object oriented security
- Metrics
- benign code
- malicious code
- integrity breach conditions
- Integrity breach condition
- insiders
- insider attack
- IBCs
- Databases
- data integrity
- Couplings
- coupling
- composability