{"title":"Research on security defect assessment technology for Java source code","authors":"Dongyang Cai, Yue Sun, Xiaolong Su, Yongmin Cao","doi":"10.1117/12.2653742","DOIUrl":null,"url":null,"abstract":"In recent years, with the rapid development of technology fields such as big data, cloud computing, Internet of Things, and mobile Internet, security incidents such as network attacks and data information leakage have occurred frequently, which shows that the current information system falls in the serious security situation, and methods relying on the traditional security protection mechanism to ensure information security has gradually become inadequate. Compared with other software languages, Java language is widely used in the development of large-scale business systems due to its high access, concurrency, and clustering. Source code is the basic element of building a business application system, and logic vulnerabilities or nonstandard programming in code are the roots of application security events. This paper proposes a source code security defect assessment method based on the entropy weight method by deeply analyzing the Java source code security defect detection and repair methods.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JITeCS Journal of Information Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2653742","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, with the rapid development of technology fields such as big data, cloud computing, Internet of Things, and mobile Internet, security incidents such as network attacks and data information leakage have occurred frequently, which shows that the current information system falls in the serious security situation, and methods relying on the traditional security protection mechanism to ensure information security has gradually become inadequate. Compared with other software languages, Java language is widely used in the development of large-scale business systems due to its high access, concurrency, and clustering. Source code is the basic element of building a business application system, and logic vulnerabilities or nonstandard programming in code are the roots of application security events. This paper proposes a source code security defect assessment method based on the entropy weight method by deeply analyzing the Java source code security defect detection and repair methods.