Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code.
Hongzhe LiJaesang OhHeejo LeePublished in: IEICE Trans. Inf. Syst. (2016)
Keyphrases
- source code
- security requirements
- open source
- software systems
- smart card
- security analysis
- information security
- software architecture
- security properties
- security mechanisms
- software maintenance
- security problems
- software projects
- access control
- security policies
- software engineering
- software repositories
- software evolution
- data mining
- requirements engineering
- text files
- knowledge discovery
- manual inspection
- free software
- source files
- bug reports
- program understanding
- project management
- high level
- case study
- information systems