首页> 外文会议>Third International Conference on Software Testing, Verification, and Validation—Workshops >Functional Programming Way to Interact with Software Attacks and Vulnerabilities
【24h】

Functional Programming Way to Interact with Software Attacks and Vulnerabilities

机译:与软件攻击和漏洞进行交互的功能编程方式

获取原文
获取原文并翻译 | 示例

摘要

This paper proposes using functional programming style in a way to respond to detection of and interaction with the software attacks and vulnerabilities. Additionally, our approach considers involving Description Logics, as a basis for the use of the Semantic Web and meta-programming to produce executable ontologies and to enable semantic reasoning over behavior and interaction with software attacks and vulnerabilities. Accordingly, we introduce Magic Potion, a recently defined Domain Specific meta-Language that uses Modeling Spaces framework to study heterogeneous modeling and meta-modeling problems inspired by Model Driven Architecture. As an example of formalism for modeling software attacks and vulnerabilities, we explore Attack Tree, which provides a formal methodology for analyzing the security of the system. Based on Attack Tree, which is herein specified for a particular problem of dealing with known attacks and vulnerabilities of the security layer of the Wireless Application Protocol, and which is particularly built on top of Magic Potion specification, we define our specific Domain Specific Language that we call Attack Tree Domain Specific Language. It is envisioned as a tool for modeling and interacting with software attacks and vulnerabilities.
机译:本文提出了一种使用函数式编程风格的方式来响应软件攻击和漏洞的检测以及与之交互。此外,我们的方法考虑将描述逻辑作为使用语义网和元编程的基础,以生成可执行的本体,并通过行为进行语义推理以及与软件攻击和漏洞的交互。因此,我们介绍了Magic Potion,这是一种最近定义的领域特定元语言,它使用Modeling Spaces框架来研究受模型驱动架构启发的异构建模和元建模问题。作为建模软件攻击和漏洞的形式主义示例,我们探索了“攻击树”,它提供了一种用于分析系统安全性的正式方法。基于本文针对攻击无线应用协议安全层的已知攻击和漏洞的特定问题而指定的攻击树,并且该攻击树特别基于Magic Potion规范构建,我们定义了特定的领域特定语言,我们称攻击树域专用语言。它被构想为用于对软件攻击和漏洞进行建模和交互的工具。

著录项

  • 来源
  • 会议地点 Paris(FR);Paris(FR)
  • 作者单位

    Issue Date: 6-10 April 2010rnrntOn page(s): rnt388rnttrn- 393rnrnrnLocation: Paris, FrancernrnPrint ISBN: 978-1-4244-6773-0rnrnrnrnttrnDigital Object Identifier: href='http://dx.doi.org/10.1109/ICSTW.2010.53' target='_blank'>10.1109/ICSTW.2010.53 rnrnDate of Current Version: trnrnt2010-05-13 13:19:49.0rnrnt rntt class="body-text">rntname="Abstract">>Abstractrn>This paper proposes using functional programming style in a way to respond to detection of and interaction with the software attacks and vulnerabilities. Additionally, our approach considers involving Description Logics, as a basis for the use of the Semantic Web and meta-programming to produce executable ontologies and to enable semantic reasoning over behavior and inter;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 TP311.52;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号