×
Well done. You've clicked the tower. This would actually achieve something if you had logged in first. Use the key for that. The name takes you home. This is where all the applicables sit. And you can't apply any changes to my site unless you are logged in.

Our policy is best summarized as "we don't care about _you_, we care about _them_", no emails, so no forgetting your password. You have no rights. It's like you don't even exist. If you publish material, I reserve the right to remove it, or use it myself.

Don't impersonate. Don't name someone involuntarily. You can lose everything if you cross the line, and no, I won't cancel your automatic payments first, so you'll have to do it the hard way. See how serious this sounds? That's how serious you're meant to take these.

×
Register


Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only.
  • Your password can’t be too similar to your other personal information.
  • Your password must contain at least 8 characters.
  • Your password can’t be a commonly used password.
  • Your password can’t be entirely numeric.

Enter the same password as before, for verification.
Login

Grow A Dic
Define A Word
Make Space
Set Task
Mark Post
Apply Votestyle
Create Votes
(From: saved spaces)
Exclude Votes
Apply Dic
Exclude Dic

Click here to flash read.

Dataflow diagrams (DFDs) are a valuable asset for securing applications, as
they are the starting point for many security assessment techniques. Their
creation, however, is often done manually, which is time-consuming and
introduces problems concerning their correctness. Furthermore, as applications
are continuously extended and modified in CI/CD pipelines, the DFDs need to be
kept in sync, which is also challenging. In this paper, we present a novel,
tool-supported technique to automatically extract DFDs from the implementation
code of microservices. The technique parses source code and configuration files
in search for keywords that are used as evidence for the model extraction. Our
approach uses a novel technique that iteratively detects new keywords, thereby
snowballing through an application's codebase. Coupled with other detection
techniques, it produces a fully-fledged DFD enriched with security-relevant
annotations. The extracted DFDs further provide full traceability between model
items and code snippets. We evaluate our approach and the accompanying
prototype for applications written in Java on a manually curated dataset of 17
open-source applications. In our testing set of applications, we observe an
overall precision of 93% and recall of 85%.

Click here to read this post out
ID: 87326; Unique Viewers: 0
Unique Voters: 0
Total Votes: 0
Votes:
Latest Change: April 26, 2023, 7:33 a.m. Changes:
Dictionaries:
Words:
Spaces:
Views: 11
CC:
No creative common's license
Comments: