Now showing items 1-2 of 2

    • Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis 

      Ganapathy, Vinod; King, Dave; Jaeger, Trent; Jha, Somesh (University of Wisconsin-Madison Department of Computer Sciences, 2006)
      We present an approach based on concept analysis to retrofit legacy servers with mechanisms for authorization policy enforcement. Our approach is based upon the observation that security-sensitive operations are characterized ...
    • Retrofitting Legacy Code for Authorization Policy Enforcement 

      Ganapathy, Vinod; Jaeger, Trent; Jha, Somesh (University of Wisconsin-Madison Department of Computer Sciences, 2005)
      Researchers have long argued that the best way to construct a secure system is to proactively integrate security into the design of the system. However, this tenet is rarely followed because of economic and practical ...