Context-Aware Systems and Applications. Second International Conference, ICCASA 2013, Phu Quoc Island, Vietnam, November 25-26, 2013, Revised Selected Papers

Research Article

Rule-Based Techniques Using Abstract Syntax Tree for Code Optimization and Secure Programming in Java

Download
494 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-05939-6_17,
        author={Nguyen Hung-Cuong and Huynh Quyet-Thang and Tru Ba-Vuong},
        title={Rule-Based Techniques Using Abstract Syntax Tree for Code Optimization and Secure Programming in Java},
        proceedings={Context-Aware Systems and Applications. Second International Conference, ICCASA 2013, Phu Quoc Island, Vietnam, November 25-26, 2013, Revised Selected Papers},
        proceedings_a={ICCASA},
        year={2014},
        month={6},
        keywords={Abstract syntax tree Code optimization Secure programming},
        doi={10.1007/978-3-319-05939-6_17}
    }
    
  • Nguyen Hung-Cuong
    Huynh Quyet-Thang
    Tru Ba-Vuong
    Year: 2014
    Rule-Based Techniques Using Abstract Syntax Tree for Code Optimization and Secure Programming in Java
    ICCASA
    Springer
    DOI: 10.1007/978-3-319-05939-6_17
Nguyen Hung-Cuong1,*, Huynh Quyet-Thang1,*, Tru Ba-Vuong1,*
  • 1: Hanoi University of Science and Technology
*Contact email: cuongnh86@gmail.com, thanghq@soict.hust.edu.vn, trubavuong@gmail.com

Abstract

Although the quality of computer software consists of many different aspects, the security and the optimization are by far the most important metrics for estimating quality of software systems. The security ensures that application will work correctly and the optimization reduces the amount of resources needed: computation, memory, size of code, etc. Those techniques can be done by applying rules in abstract syntax tree, a tree representation of the abstract syntactic structure of source code. However, the process to optimize code often makes negative effect to the security of program. This work studies about applying rules in abstract syntax tree in Java and its effect on code optimization and secure programming problems.