DocumentCode :
2578134
Title :
Ownership Object Graphs with Dataflow Edges
Author :
Vanciu, Radu ; Abi-Antoun, Marwan
Author_Institution :
Dept. of Comput. Sci., Wayne State Univ., Detroit, MI, USA
fYear :
2012
fDate :
15-18 Oct. 2012
Firstpage :
267
Lastpage :
276
Abstract :
During architectural risk analysis, security experts look for architectural flaws based on a documented runtime structure, which for object-oriented systems can be approximated by an object graph. Architectural risk analysis involves thinking about worst-case scenarios, and thus requires a sound object graph, which shows all possible objects and dataflow communication between them. Extracting a sound object graph that conveys architectural abstraction is challenging. One solution is to apply a hierarchy to the object graph to convey both high-level understanding and detail. Achieving soundness requires a static analysis, but architectural hierarchy is not available in general purpose programming languages. To achieve hierarchy, we annotate the program with ownership types and use abstract interpretation to extract a global, sound, hierarchical object graph that has dataflow communication edges showing the flow of objects due to field reads, field writes, and method invocations. We formalize the static analysis, prove its soundness, then show that the extracted edges are similar to those drawn by a security expert.
Keywords :
data flow analysis; graph theory; object-oriented programming; risk analysis; software architecture; abstract interpretation; architectural abstraction; architectural flaws; architectural hierarchy; architectural risk analysis; data flow communication edges; edge extraction; field reads; field writes; global object graph extraction; hierarchical object graph extraction; method invocations; object-oriented system approximation; ownership object graphs; program annotation; sound object graph extraction; static analysis; worst-case scenarios; Abstracts; Analytical models; Context; Object oriented modeling; Risk analysis; Runtime; Security; architectural risk analysis; dataflow communication; hierarchical object graph; sound static analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reverse Engineering (WCRE), 2012 19th Working Conference on
Conference_Location :
Kingston, ON
ISSN :
1095-1350
Print_ISBN :
978-1-4673-4536-1
Type :
conf
DOI :
10.1109/WCRE.2012.36
Filename :
6385122
Link To Document :
بازگشت