Abstract
The software architecture of Internet of Things defines the component model and interconnection topology of Internet of Things systems. Refactoring is a systematic practice of improving a software structure without altering its external behaviors. When the Internet of Things software is refactored, it is necessary to detect the correctness of Internet of Things software to ensure its security. To this end, this article proposes a novel refactoring correction detection approach to ensure software security. Control flow analysis and data flow analysis are used to detect code changes before and after refactoring, and synchronization dependency analysis is used to detect changes in synchronization dependency. Three detection algorithms are designed to detect refactoring correctness. Four real-world benchmark applications are used to evaluate our approach. The experimental results show that our proposed approach can ensure correctness of Internet of Things software refactoring.
Highlights
Despite the multitude of Internet of Things (IoT) software architectures proposed in previous studies, the optimal IoT software architecture has not been found on a global scale, which means that the IoT technology still needs to be optimized.[3]
Because the functions and structures of the IoT terminals are different, some terminal devices will not be able to meet the needs of users.[7,8]
This approach uses the control flow analysis, synchronization dependency analysis, and data flow analysis to detect the security of the refactoring under the WALA software analysis framework, and detection algorithms are designed for three kinds of problems that are common in software development to ensure the security of IoT software
Summary
The wide adoption of the Internet of Things (IoT) systems and immature IoT technologies pose multiple challenges to the development of IoT software.[1,2] Despite the multitude of IoT software architectures proposed in previous studies, the optimal IoT software architecture has not been found on a global scale, which means that the IoT technology still needs to be optimized.[3]. The existing refactoring methods may incur a variety of concurrency bugs and lead to changes in behaviors. These problems can cause the security of IoT software to be compromised.[9,10] In order to avoid the problem of post-refactoring behavior inconsistency, it is necessary to study the consistency detection approaches. We propose a novel detection approach to detect software security This approach uses the control flow analysis, synchronization dependency analysis, and data flow analysis to detect the security of the refactoring under the WALA software analysis framework, and detection algorithms are designed for three kinds of problems that are common in software development to ensure the security of IoT software. The experimental results show that the proposed approach can effectively resolve the security problems
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Distributed Sensor Networks
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.