DocumentCode :
1958478
Title :
Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting
Author :
Baca, Dejan
Author_Institution :
Blekinge Inst. of Technol., Ericsson AB, Karlskrona, Sweden
fYear :
2010
fDate :
15-18 Feb. 2010
Firstpage :
386
Lastpage :
390
Abstract :
Static code analysis tools are often used by developers as early vulnerability detectors. Due to their automation they are less time-consuming and error-prone then manual reviews. However, they produce large quantities of warnings that developers have to manually examine and understand.In this paper, we look at a solution that makes static code analysis tools more useful as an early vulnerability detector. We use flow-sensitive, interprocedural and context-sensitive data flow analysis to determine the point of user input and its migration through the source code to the actual exploit. By determining a vulnerabilities point of entry we lower the number of warnings a tool produces and we provide the developer with more information why this warning could be a real security threat. We use our approach in three different ways depending on what tool we examined. First, With the commercial static code analysis tool, Coverity, we reanalyze its results and create a set of warnings that are specifically relevant from a security perspective. Secondly, we altered the open source analysis tool Findbugs to only analyze code that has been tainted by user input. Third, we created an own analysis tool that focuses on XSS vulnerabilities in Java code.
Keywords :
Java; data analysis; public domain software; security of data; software tools; Findbugs analysis tool; Java code; XSS vulnerabilities; code tainting; data flow analysis; early vulnerability detectors; security relevant warning identification; static code analysis tools; Automation; Availability; Data analysis; Data security; Detectors; Information security; Java; Manufacturing; Paper technology; Telecommunications; Static code analysis; coverity; data flow; dua; findbugs; security; taint analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability, and Security, 2010. ARES '10 International Conference on
Conference_Location :
Krakow
Print_ISBN :
978-1-4244-5879-0
Type :
conf
DOI :
10.1109/ARES.2010.108
Filename :
5438066
Link To Document :
بازگشت