首页> 外文会议>International Conference for Young Computer Scientists; 20050920-22; Beijing(CN) >An Input Flow Model Based Method for Software Security Design
【24h】

An Input Flow Model Based Method for Software Security Design

机译:基于输入流模型的软件安全设计方法

获取原文
获取原文并翻译 | 示例

摘要

An evil input may pose a serious threat to software security. In order to prevent such input based attacks as buffer overruns attacks, SQL injection attacks, an input flow model and a method for modeling is proposed as a way to design secure software using an object oriented approach. A source-destination relationship for input flow between two classes and the concept of affected range for input are defined. A new diagram, named Input Flow Diagram, is extended to UML. This diagram precisely describes the range that is affected by input. Based on this diagram, a firewall technique is proposed for designing a secure software system. A firewall acts as the boundary between untrustworthy and trusted classes. By using the firewall, all inputs are guaranteed to be validated before they cross this boundary, so the threats of evil inputs are prevented, resulting a secure software system.
机译:恶意输入可能会严重威胁软件安全。为了防止诸如缓冲区溢出攻击,SQL注入攻击等基于输入的攻击,提出了一种输入流模型和一种建模方法,作为使用面向对象方法设计安全软件的一种方法。定义了两类之间输入流的源-目的地关系以及输入影响范围的概念。一个名为Input Flow Diagram的新图被扩展到UML。该图准确地描述了受输入影响的范围。基于该图,提出了一种用于设计安全软件系统的防火墙技术。防火墙充当不可信任类和可信任类之间的边界。通过使用防火墙,可以确保所有输入都在经过此边界之前得到验证,因此可以防止恶意输入的威胁,从而形成安全的软件系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号