6 CONCLUSIONS AND FUTURE
WORKS
In this paper, I proposed data-centric based approach
to compute precise dependency information (by re-
moving false alarms) among the database statement
of a database application. To refine the syntax-
based DD-dependency information (may exist false
alarm), I design a Database-Database Dependency
Analyzer (D3A) based on the following key modules:
(i) Identifying database statements, (ii) Augmentation
of syntax-based DOPDG and (iii) Analyzer. Cur-
rently, I am implementing the proposed tool D3A, as
per the description provided in the tool architecture,
in a modular way to support scalability. In future, this
tool will be used to address efficiently several soft-
ware engineering problems like Database Code Slic-
ing (Larsen and Harrold, 1996), Database Leakage
Analysis (Halder et al., 2014), Data Provenance (Ch-
eney et al., 2007), Materialization View Creation (Sen
et al., 2012), Concurrent System modeling, etc.
REFERENCES
Ahuja, B. K., Jana, A., Swarnkar, A., and Halder, R. (2016).
On preventing sql injection attacks. In Advanced
Computing and Systems for Security, pages 49–64.
Springer.
Alam, M. I. and Halder, R. (2016). Refining Dependencies
for Information Flow Analysis of Database Applica-
tions. In International Journal of Trust Management
in Computing and Communications. Inderscience.
Amtoft, T. and Banerjee, A. (2007). A logic for information
flow analysis with an application to forward slicing of
simple imperative programs. Sci. Comput. Program.,
64(1):3–28.
Baralis, E. and Widom, J. (1994). An Algebraic Approach
to Rule Analysis in Expert Database Systems. In Pro-
ceedings of the 20th International Conference on Very
Large Data Bases, VLDB ’94, pages 475–486. Mor-
gan Kaufmann Publishers Inc.
Bondhugula, U., Hartono, A., Ramanujam, J., and Sadayap-
pan, P. (2008). PLUTO: A practical and fully au-
tomatic polyhedral program optimization system. In
Proceedings of the ACM SIGPLAN 2008 Conference
on Programming Language Design and Implementa-
tion (PLDI 08), Tucson, AZ (June 2008).
Cheney, J., Ahmed, A., and Acar, U. A. (2007). Provenance
As Dependency Analysis. In Proceedings of the 11th
ICDPL, DBPL’07, pages 138–152.
Date, C. J. (2006). An introduction to database systems.
Pearson Education India.
Ferrante, J., Ottenstein, K. J., and Warren, J. D. (1987). The
program dependence graph and its use in optimiza-
tion. ACM Trans. on Programming Lang. and Sys.,
9(3):319–349.
Goldin, D., Srinivasa, S., and Srikanti, V. (2004). Ac-
tive databases as information systems. In Database
Engineering and Applications Symposium, 2004.
IDEAS’04. Proceedings. International, pages 123–
130. IEEE.
Goldin, D., Srinivasa, S., and Thalheim, B. (2000). Is=dbs +
interaction: towards principles of information system
design. In International Conference on Conceptual
Modeling, pages 140–153. Springer.
Halder, R. and Cortesi, A. (2013). Abstract Program Slicing
of Database Query Languages. In Proceedings of the
the 28th Symposium On Applied Computing - Special
Track on Database Theory, Technology, and Applica-
tions, pages 838–845, Coimbra, Portugal. ACM Press.
Halder, R., Jana, A., and Cortesi, A. (2016). Data leakage
analysis of the hibernate query language on a propo-
sitional formulae domain. In Transactions on Large-
Scale Data-and Knowledge-Centered Systems XXIII,
pages 23–44. Springer.
Halder, R., Zanioli, M., and Cortesi, A. (2014). Infor-
mation leakage analysis of database query languages.
In Proceedings of the 29th Annual ACM Symposium
on Applied Computing (SAC’14), pages 813–820,
Gyeongju, Korea. ACM Press.
Hammer, C. (2010). Experiences with PDG-Based IFC.
In Proc. of the Engineering Secure Software and Sys-
tems, pages 44–60, Pisa, Italy. Springer-Verlag.
Horwitz, S., Reps, T., and Binkley, D. (1990). Interproce-
dural slicing using dependence graphs. ACM Trans-
actions on PLS, 12(1):26–60.
Jana, A., Alam, M. I., and Halder, R. (2018a). A symbolic
model checker for database programs. In ICSOFT,
pages 381–388.
Jana, A. and Halder, R. (2016). Defining abstract semantics
for static dependence analysis of relational database
applications. In International Conference on Infor-
mation Systems Security, pages 151–171. Springer.
Jana, A., Halder, R., Chaki, N., and Cortesi, A. (2015).
Policy-based slicing of hibernate query language. In
IFIP International Conference on Computer Informa-
tion Systems and Industrial Management, pages 267–
281. Springer.
Jana, A., Halder, R., Kalahasti, A., Ganni, S., and Cortesi,
A. (2018b). Extending abstract interpretation to de-
pendency analysis of database applications. IEEE
Transactions on Software Engineering.
Jiang, L. (2009). Scalable Detection of Similar Code: Tech-
niques and Applications. PhD thesis, Davis, CA,
USA.
Krinke, J. (2007). Information flow control and taint
analysis with dependence graphs. In 3rd Interna-
tional Workshop on Code Based Security Assessments
(CoBaSSA 2007), pages 6–9.
Larsen, L. and Harrold, M. J. (1996). Slicing object-
oriented software. In Proceedings of the 18th ICSE,
pages 495–505, Berlin, Germany. IEEE CS.
Mandal, K. K., Jana, A., and Agarwal, V. (2014). A new
approach of text steganography based on mathemati-
cal model of number system. In 2014 International
ICSOFT 2020 - 15th International Conference on Software Technologies
240