Skip to Main content Skip to Navigation
Conference papers

Normalization of Java source codes

Léopold Ouairy 1 Hélène Le Bouder 2, 3 Jean-Louis Lanet 1
1 CIDRE - Confidentialité, Intégrité, Disponibilité et Répartition
CentraleSupélec, Inria Rennes – Bretagne Atlantique , IRISA-D1 - SYSTÈMES LARGE ÉCHELLE
2 OCIF - Objets communicants pour l'Internet du futur
IMT Atlantique - IMT Atlantique Bretagne-Pays de la Loire, IRISA-D2 - RÉSEAUX, TÉLÉCOMMUNICATION ET SERVICES
Abstract : Security issues can be leveraged when input parameters are not checked. These missing checks can lead an application to an unexpected state where an attacker can get access to assets. The tool Chucky-ng aims at detecting such missing checks in source code. Such source codes are the only input required for Chuck-yJava. Since it is sensible to the identifier names used in these source codes, we want to normalize them in order to improve its efficiency. To achieve this, we propose an algorithm which works in four steps. It renames constant, parameter , variable and method names. We evaluate the impact of this renaming on two different experiments. Since our results are concluding, we show the benefits of using our tool. Moreover, we suggest another new way to improve Chucky-ng
Document type :
Conference papers
Complete list of metadatas

Cited literature [9 references]  Display  Hide  Download

https://hal.inria.fr/hal-01976747
Contributor : Léopold Ouairy <>
Submitted on : Thursday, January 10, 2019 - 11:40:54 AM
Last modification on : Wednesday, September 16, 2020 - 10:19:02 AM

File

paper_32.pdf
Files produced by the author(s)

Identifiers

Citation

Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet. Normalization of Java source codes. SECITC 2018 : 11th International Conference on Security for Information Technology and Communications, Nov 2018, Bucarest, Romania. pp.29-40, ⟨10.1007/978-3-030-12942-2_4⟩. ⟨hal-01976747⟩

Share

Metrics

Record views

284

Files downloads

404