scispace - formally typeset
Open AccessProceedings Article

Finding security vulnerabilities in java applications with static analysis

Reads0
Chats0
TLDR
This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks based on a scalable and precise points-to analysis.
Abstract
This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These vulnerabilities stem from unchecked input, which is widely recognized as the most common source of security vulnerabilities in Web applications. We propose a static analysis approach based on a scalable and precise points-to analysis. In our system, user-provided specifications of vulnerabilities are automatically translated into static analyzers. Our approach finds all vulnerabilities matching a specification in the statically analyzed code. Results of our static analysis are presented to the user for assessment in an auditing interface integrated within Eclipse, a popular Java development environment. Our static analysis found 29 security vulnerabilities in nine large, popular open-source applications, with two of the vulnerabilities residing in widely-used Java libraries. In fact, all but one application in our benchmark suite had at least one vulnerability. Context sensitivity, combined with improved object naming, proved instrumental in keeping the number of false positives low. Our approach yielded very few false positives in our experiments: in fact, only one of our benchmarks suffered from false alarms.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

BackREST: A Model-Based Feedback-Driven Greybox Fuzzer for Web Applications.

TL;DR: BackREST as mentioned in this paper is a model-based, coverage-and taint-driven fuzzer that uses its feedback loops to find more critical vulnerabilities, faster (speedup between 7.4x and 25.9x).
Dissertation

Selective disclosure and inference leakage problem in the Linked Data

Tarek Sayah
TL;DR: This PhD thesis proposes a fine-grained access control model for RDF data, defines the syntax and semantics of a XACML inspired language based on the subjects' attributes to allow much finer access control policies, and proposes a data-annotation approach to enforce the model.
Book ChapterDOI

GuideForce: Type-Based Enforcement of Programming Guidelines

TL;DR: The GuideForce project, whose aim is to develop automatic methods based on type systems and abstract interpretation that are capable of checking that programming guidelines related to secure web programming are correctly and reasonably applied, is introduced.
Proceedings ArticleDOI

The reality of applying security in web applications in education

TL;DR: It has been found that many academic institutions have not fully secured their web pages against some class of vulnerabilities, and these vulnerabilities are focused and their existences in the web sites of the academic institutions are shown.
Proceedings ArticleDOI

CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph

TL;DR: In this article , C HK P LUG achieves good performance with 98.8% TNR (True Negative Rate) and 89.3% TPR (True Positive Rate) in checking whether a certain WordPress plugin complies with GDPR.
References
More filters
Book

Principles of database and knowledge-base systems

TL;DR: This book goes into the details of database conception and use, it tells you everything on relational databases from theory to the actual used algorithms.
Proceedings Article

StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks

TL;DR: StackGuard is described: a simple compiler technique that virtually eliminates buffer overflow vulnerabilities with only modest performance penalties, and a set of variations on the technique that trade-off between penetration resistance and performance.
Proceedings ArticleDOI

JFlow: practical mostly-static information flow control

TL;DR: The new language JFlow is described, an extension to the Java language that adds statically-checked information flow annotations and provides several new features that make information flow checking more flexible and convenient than in previous models.
Proceedings ArticleDOI

Points-to analysis in almost linear time

TL;DR: This is the asymptotically fastest non-trivial interprocedural points-to analysis algorithm yet described and is based on a non-standard type system for describing a universally valid storage shape graph for a program in linear space.
Related Papers (5)