Skip to main content

Rule-Based Techniques Using Abstract Syntax Tree for Code Optimization and Secure Programming in Java

  • Conference paper
  • First Online:
Context-Aware Systems and Applications (ICCASA 2013)

Abstract

Although the quality of computer software consists of many different aspects, the security and the optimization are by far the most important metrics for estimating quality of software systems. The security ensures that application will work correctly and the optimization reduces the amount of resources needed: computation, memory, size of code, etc. Those techniques can be done by applying rules in abstract syntax tree, a tree representation of the abstract syntactic structure of source code. However, the process to optimize code often makes negative effect to the security of program. This work studies about applying rules in abstract syntax tree in Java and its effect on code optimization and secure programming problems.

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-319-05939-6_37

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Viega, J., Messier, M.: Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More. O’Reilly Media, Inc., Sebastopol (2009)

    Google Scholar 

  2. Wheeler, D.A.: Secure programming for linux and unix howto (2003)

    Google Scholar 

  3. Oaks, S.: Java Security. O’Reilly, Sebastopol (1998). (ISBN 1565924037)

    Google Scholar 

  4. Bloch, J.: Effective Java. Addison-Wesley Professional, Amsterdam (2008)

    Google Scholar 

  5. Aho, A.V., et al.: Compilers: principles, techniques, & tools. Pearson Education India (2007)

    Google Scholar 

  6. Gross, T.K.R.: Code optimization of pipeline constraints (1983)

    Google Scholar 

  7. Leupers, R.: Code Optimization Techniques for Embedded Processors: Methods, Algorithms, and Tools. Springer Publishing Company, Incorporated, New York (2010)

    MATH  Google Scholar 

  8. Pham, H.: System Software Reliability. Springer, London (2006)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nguyen Hung-Cuong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Hung-Cuong, N., Quyet-Thang, H., Ba-Vuong, T. (2014). Rule-Based Techniques Using Abstract Syntax Tree for Code Optimization and Secure Programming in Java. In: Vinh, P., Alagar, V., Vassev, E., Khare, A. (eds) Context-Aware Systems and Applications. ICCASA 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 128. Springer, Cham. https://doi.org/10.1007/978-3-319-05939-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05939-6_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05938-9

  • Online ISBN: 978-3-319-05939-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics