On Controlling the Attack Surface of Object-Oriented Refactorings
dc.contributor.author | Ruland, Sebastian | |
dc.contributor.author | Kulcsár, Géza | |
dc.contributor.author | Leblebici, Erhan | |
dc.contributor.author | Peldszus, Sven | |
dc.contributor.author | Lochau, Malte | |
dc.contributor.editor | Felderer, Michael | |
dc.contributor.editor | Hasselbring, Wilhelm | |
dc.contributor.editor | Rabiser, Rick | |
dc.contributor.editor | Jung, Reiner | |
dc.date.accessioned | 2020-02-03T13:03:28Z | |
dc.date.available | 2020-02-03T13:03:28Z | |
dc.date.issued | 2020 | |
dc.description.abstract | The results of this work have originally been published in. Refactorings constitute an effective means to improve quality and maintainability of evolving object-oriented programs. Search-based techniques have shown promising results in finding near-optimal sequences of behavior-preserving program transformations that (1) maximize code-quality metrics and (2) minimize the number of code changes. However, the impact of refactorings on non-functional properties like security has received little attention so far. To this end, we propose, as a further objective, to minimize the attack surface of object-oriented programs (i.e., to maximize strictness of declared accessibility of class members). Minimizing the attack surface naturally competes with applicability of established refactorings like MoveMethod, frequently used for improving code quality in terms of coupling/cohesion measures. Our tool implementation is based on an EMF meta-model for Java-like programs and utilizes MOMoT, a search-based model-transformation and optimization framework. Our experimental results gained from applying different accessibility-control strategies to a collection of real-world Java programs show the impact of attack surface minimization on design-improving refactorings. We further compare the results to those of existing refactoring tools. | en |
dc.identifier.doi | 10.18420/SE2020_26 | |
dc.identifier.isbn | 978-3-88579-694-7 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/31703 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Software Engineering 2020 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-300 | |
dc.subject | Object-Oriented Refactorings | |
dc.subject | Search-based Refactorings | |
dc.subject | Attack Surface | |
dc.subject | Model Transformation | |
dc.title | On Controlling the Attack Surface of Object-Oriented Refactorings | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | ||
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 89 | |
gi.conference.date | 24.-28. Feburar 2020 | |
gi.conference.location | Innsbruck, Austria | |
gi.conference.sessiontitle | Wartung und Evolution 1 |
Dateien
Originalbündel
1 - 1 von 1