Paper
8 December 2022 Research on security defect assessment technology for Java source code
Dongyang Cai, Yue Sun, Xiaolong Su, Yongmin Cao
Author Affiliations +
Proceedings Volume 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022); 124740K (2022) https://doi.org/10.1117/12.2653742
Event: Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 2022, Guilin, China
Abstract
In recent years, with the rapid development of technology fields such as big data, cloud computing, Internet of Things, and mobile Internet, security incidents such as network attacks and data information leakage have occurred frequently, which shows that the current information system falls in the serious security situation, and methods relying on the traditional security protection mechanism to ensure information security has gradually become inadequate. Compared with other software languages, Java language is widely used in the development of large-scale business systems due to its high access, concurrency, and clustering. Source code is the basic element of building a business application system, and logic vulnerabilities or nonstandard programming in code are the roots of application security events. This paper proposes a source code security defect assessment method based on the entropy weight method by deeply analyzing the Java source code security defect detection and repair methods.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Dongyang Cai, Yue Sun, Xiaolong Su, and Yongmin Cao "Research on security defect assessment technology for Java source code", Proc. SPIE 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 124740K (8 December 2022); https://doi.org/10.1117/12.2653742
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Java

Network security

Computer security

Defect detection

Computer programming

RELATED CONTENT

Security architecture of the M&M mobile agent framework
Proceedings of SPIE (July 12 2001)
MPEG-J
Proceedings of SPIE (March 22 2001)
Creating the virtual enterprise with VE gateways
Proceedings of SPIE (January 21 1997)
NSL: a network-security-oriented language
Proceedings of SPIE (February 08 2005)

Back to Top