A Study on Software Vulnerability of Programming Languages Interoperability

  • Yunsik Son
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 195)


In internet computing environments, security is a very important issue. And, Recently, There are many researches on developing secure software, and it is another method from researches on the existing security system. In particular, researches on coding rules and vulnerability analysis tools for developing secure software are active in the field of programming languages. However, existing researches for the development of secure software, the target was an individual language. In this study, we were present a methodology to define and analyze for software vulnerability on the case of language interoperability.


Secure Software Secure Coding Programming Languages Interoperability 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, & Tools. Addision-Wesley, Reading (2007)zbMATHGoogle Scholar
  2. 2.
    Oh, S.M.: Introduction to Compilers, 3rd edn. Jungik Publishing, Seoul (2006)Google Scholar
  3. 3.
    Yi, C.H., Oh, S.M.: Java Preprocessor for Integration of Java and C. Journal of Korea Multimedia Society 10(4), 537–547 (2007)Google Scholar
  4. 4.
    Gordon, R.: Essential JNI: Java Native Interface. Prentice Hall, Englewood Cliffs (1998)Google Scholar
  5. 5.
    Liang, S.: The Java Native Interface: Programmer’s Guide and Specification. Addison Wesley, Reading (1999)Google Scholar
  6. 6.
    Campione, M., Walrath, K., Huml, A.: The Java Tutorial Contin ued: The Rest of the JDK. Addison Wesley, Reading (1998)Google Scholar
  7. 7.
    Keserovic, S., Mortenson, D., Nathan, A.: An Overview of Managed/ Unmanaged Code Interoperability. MSDN Library, Microsoft Corporation (2003) Google Scholar
  8. 8.
    Common Weakness Enumeration(CWE): A community-Developed Dictionary of Software Weakness Types,
  9. 9.
    McManus, J., Mohindra, D.: The CERT Sun Microsystems Secure Coding Standard for Java, CERT (2009) Google Scholar
  10. 10.
  11. 11.
  12. 12.
    Chen, H., Wagner, D.: MOPS: an infrastructure for examining security properties of software. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 235–244 (2002)Google Scholar
  13. 13.
    Overview of Safe-Secure Project: Safe-Secure C/C++,
  14. 14.
  15. 15.
    Fortify Source Code Analysis(SCA),
  16. 16.
    Son, Y.S., Yi, C.H., Oh, S.M.: Memory Fault Analyzer for Contents Development on Embedded and Mobile Devices. In: Proceedings of SIGGAME Conference on Korea Information Processing Society, vol. 3(1,2), pp. 23–32 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Yunsik Son
    • 1
  1. 1.Dept. of Computer EngineeringDongguk UniversitySeoulKorea

Personalised recommendations