menu
{ "item_title" : "Incremental Construction of Code Property Graphs", "item_author" : [" Samuel Hopstock "], "item_description" : "Master's Thesis from the year 2021 in the subject Computer Science - IT-Security, grade: 2,0, Technical University of Munich (Department of Informatics), language: English, abstract: This thesis extends a modified CPG approach that is able to operate on multiple programming languages, i.e. C/C++, Java, Python and Golang, available on GitHub3Fra21a]. Graph-based code analysis systems are versatile tools for reasoning about the correctness of complex software projects. One area in which they are widely used is in source code auditing: Security vulnerabilities, for example using cryptographic functions with insecure algorithms, can be introduced by coding patterns that spread over the boundaries of several methods, classes or even files in the project. This is where graph-based analysis makes finding these vulnerabilities easier, by creating a framework where the source code can be represented as a graph and vulnerable", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/3/34/654/071/3346540715_b.jpg", "price_data" : { "retail_price" : "39.50", "online_price" : "39.50", "our_price" : "39.50", "club_price" : "39.50", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Incremental Construction of Code Property Graphs|Samuel Hopstock

Incremental Construction of Code Property Graphs

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Master's Thesis from the year 2021 in the subject Computer Science - IT-Security, grade: 2,0, Technical University of Munich (Department of Informatics), language: English, abstract: This thesis extends a modified CPG approach that is able to operate on multiple programming languages, i.e. C/C++, Java, Python and Golang, available on GitHub3 Fra21a]. Graph-based code analysis systems are versatile tools for reasoning about the correctness of complex software projects. One area in which they are widely used is in source code auditing: Security vulnerabilities, for example using cryptographic functions with insecure algorithms, can be introduced by coding patterns that spread over the boundaries of several methods, classes or even files in the project. This is where graph-based analysis makes finding these vulnerabilities easier, by creating a framework where the source code can be represented as a graph and vulnerable

This item is Non-Returnable

Details

  • ISBN-13: 9783346540713
  • ISBN-10: 3346540715
  • Publisher: Grin Verlag
  • Publish Date: December 2021
  • Dimensions: 8.27 x 5.83 x 0.14 inches
  • Shipping Weight: 0.2 pounds
  • Page Count: 60

Related Categories

You May Also Like...

    1

BAM Customer Reviews