首页> 外文期刊>Software and systems modeling >An approach to clone detection in sequence diagrams and its application to security analysis
【24h】

An approach to clone detection in sequence diagrams and its application to security analysis

机译:序列图中克隆检测的一种方法及其在安全性分析中的应用

获取原文
获取原文并翻译 | 示例

摘要

Duplication in software systems is an important issue in software quality assurance. While many methods for software clone detection in source code and structural models have been described in the literature, little has been done on similarity in the dynamic behaviour of interactive systems. In this paper, we present an approach to identifying near-miss interaction clones in reverse-engineered UML sequence diagrams. Our goal is to identify patterns of interaction (“conversations”) that can be used to characterize and abstract the run-time behaviour of web applications and other interactive systems. In order to leverage existing robust near-miss code clone technology, our approach is text-based, working on the level of XMI, the standard interchange serialization for UML. Clone detection in UML behavioural models, such as sequence diagrams, presents a number of challenges—first, it is not clear how to break a continuous stream of interaction between lifelines (representing the objects or actors in the system) into meaningful conversational units. Second, unlike programming languages, the XMI text representation for UML is highly non-local, using attributes to reference-related elements in the model file remotely. In this work, we use a set of contextualizing source transformations on the XMI text representation to localize related elements, exposing the hidden hierarchical structure of the model and allowing us to granularize behavioural interactions into conversational units. Then we adapt NICAD, a robust near-miss code clone detection tool, to help us identify conversational clones in reverse-engineered behavioural models. These conversational clones are then analysed to find worrisome interactions that may indicate security access violations.
机译:软件系统中的重复是软件质量保证中的重要问题。尽管文献中已经描述了许多用于在源代码和结构模型中进行软件克隆检测的方法,但在交互系统动态行为的相似性方面却做得很少。在本文中,我们提出了一种在逆向工程的UML序列图中识别接近缺失的相互作用克隆的方法。我们的目标是确定可用于表征和抽象化Web应用程序和其他交互式系统的运行时行为的交互模式(“对话”)。为了利用现有的健壮的近遗漏代码克隆技术,我们的方法是基于文本的,并且在XMI(UML的标准交换序列化)级别上工作。 UML行为模型(例如序列图)中的克隆检测提出了许多挑战-首先,尚不清楚如何将生命线(代表系统中的对象或参与者)之间的连续交互流分解为有意义的对话单元。其次,与编程语言不同,用于UML的XMI文本表示是高度非本地的,它使用属性远程引用模型文件中与参考相关的元素。在这项工作中,我们在XMI文本表示形式上使用了一组上下文化的源转换来定位相关元素,公开模型的隐藏层次结构,并允许我们将行为交互细化为对话单元。然后,我们采用NICAD(一种健壮的未命中代码克隆检测工具)来帮助我们在逆向行为模型中识别对话克隆。然后分析这些对话克隆,以发现可能指示安全访问冲突的令人担忧的交互。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号