Abstract
Although the quality of computer software consists of many different aspects, the security and the optimization are by far the most important metrics for estimating quality of software systems. The security ensures that application will work correctly and the optimization reduces the amount of resources needed: computation, memory, size of code, etc. Those techniques can be done by applying rules in abstract syntax tree, a tree representation of the abstract syntactic structure of source code. However, the process to optimize code often makes negative effect to the security of program. This work studies about applying rules in abstract syntax tree in Java and its effect on code optimization and secure programming problems.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-319-05939-6_37
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Viega, J., Messier, M.: Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More. O’Reilly Media, Inc., Sebastopol (2009)
Wheeler, D.A.: Secure programming for linux and unix howto (2003)
Oaks, S.: Java Security. O’Reilly, Sebastopol (1998). (ISBN 1565924037)
Bloch, J.: Effective Java. Addison-Wesley Professional, Amsterdam (2008)
Aho, A.V., et al.: Compilers: principles, techniques, & tools. Pearson Education India (2007)
Gross, T.K.R.: Code optimization of pipeline constraints (1983)
Leupers, R.: Code Optimization Techniques for Embedded Processors: Methods, Algorithms, and Tools. Springer Publishing Company, Incorporated, New York (2010)
Pham, H.: System Software Reliability. Springer, London (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Hung-Cuong, N., Quyet-Thang, H., Ba-Vuong, T. (2014). Rule-Based Techniques Using Abstract Syntax Tree for Code Optimization and Secure Programming in Java. In: Vinh, P., Alagar, V., Vassev, E., Khare, A. (eds) Context-Aware Systems and Applications. ICCASA 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 128. Springer, Cham. https://doi.org/10.1007/978-3-319-05939-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-05939-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05938-9
Online ISBN: 978-3-319-05939-6
eBook Packages: Computer ScienceComputer Science (R0)