@inproceedings{ec256c927c5747d582b7a60dfa90f5eb,
title = "Identifying Security Spots for Data Integrity",
abstract = "This paper describes an approach to detecting malicious code introduced by insiders, which can compromise the data integrity in a program. The approach identifies security spots in a program, which are either malicious code or benign code. Malicious code is detected by reviewing each security spot to determine whether it is malicious or benign. The integrity breach conditions (IBCs) for object-oriented programs are specified to identify security spots in the programs. The IBCs are specified by means of the concepts of coupling within an object or between objects. A prototype tool is developed to validate the approach with a case study.",
keywords = "Coupling, Data integrity, Insider attack, Integrity breach condition, Malicious code, Security spot",
author = "Pushkar Ogale and Michael Shin and Sasanka Abeysinghe",
note = "Publisher Copyright: {\textcopyright} 2018 IEEE. Copyright: Copyright 2018 Elsevier B.V., All rights reserved.; null ; Conference date: 23-07-2018 Through 27-07-2018",
year = "2018",
month = jun,
day = "8",
doi = "10.1109/COMPSAC.2018.10277",
language = "English",
series = "Proceedings - International Computer Software and Applications Conference",
publisher = "IEEE Computer Society",
pages = "462--467",
editor = "Claudio Demartini and Sorel Reisman and Ling Liu and Edmundo Tovar and Hiroki Takakura and Ji-Jiang Yang and Chung-Horng Lung and Ahamed, {Sheikh Iqbal} and Kamrul Hasan and Thomas Conte and Motonori Nakamura and Zhiyong Zhang and Toyokazu Akiyama and William Claycomb and Stelvio Cimato",
booktitle = "Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018",
}