{"title":"Flaw and Configuration Analysis of Cloud Component Using First Order Logic","authors":"R. Ando","doi":"10.1109/AsiaJCIS.2012.25","DOIUrl":null,"url":null,"abstract":"Nowadays, large scale systems of open source code are adopted for mission critical systems on Cloud computing environment. However, despite of availability of Cloud component as open source software, there has been no methodology proposed for analyzing configuration flaw for these open source systems. In this paper we propose a FoL (First order Logic) based configuration analysis for detecting configuration flaw of source code. In proposed system, programming code is translated into clausal representation of FoL. Extracting call chain from a flaw detected to configuration part enables us to find where and how to erase the flaw of large scale Cloud component. In experiment, we have discovered several configurations which has potential vulnerabilities in large scale open source code of Cloud component.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Seventh Asia Joint Conference on Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2012.25","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, large scale systems of open source code are adopted for mission critical systems on Cloud computing environment. However, despite of availability of Cloud component as open source software, there has been no methodology proposed for analyzing configuration flaw for these open source systems. In this paper we propose a FoL (First order Logic) based configuration analysis for detecting configuration flaw of source code. In proposed system, programming code is translated into clausal representation of FoL. Extracting call chain from a flaw detected to configuration part enables us to find where and how to erase the flaw of large scale Cloud component. In experiment, we have discovered several configurations which has potential vulnerabilities in large scale open source code of Cloud component.