US20140157419A1 - Discovery of application vulnerabilities involving multiple execution flows - Google Patents
Discovery of application vulnerabilities involving multiple execution flows Download PDFInfo
- Publication number
- US20140157419A1 US20140157419A1 US13/705,799 US201213705799A US2014157419A1 US 20140157419 A1 US20140157419 A1 US 20140157419A1 US 201213705799 A US201213705799 A US 201213705799A US 2014157419 A1 US2014157419 A1 US 2014157419A1
- Authority
- US
- United States
- Prior art keywords
- flow
- analysis
- application
- control flows
- vulnerabilities
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Definitions
- the present invention relates to security analysis of applications, and, more particularly, to static security analysis of applications.
- Web applications are both widespread and highly popular. However, web applications are often highly vulnerable, as their interactions with users of the web can provide the users with opportunities to insert malicious code in the applications. As such, this potential has led to increasing interest in static security analysis as an effective compile-time means of discovering web vulnerabilities.
- Static analysis tools typically leverage existing program analysis techniques.
- a particularly useful tool is taint analysis, which provides a way of reducing security analysis to a graph reachability problem.
- Taint analysis is parameterized by a set of security rules, each rule being a triple ⁇ Src,San,Snk> denoting: 1) source statements reading untrusted user inputs (Src); 2) downgrader statements endorsing untrusted data by either validating or sanitizing the data (San); and 3) sink statements performing security-sensitive operations (Snk).
- Src source statements reading untrusted user inputs
- Snk downgrader statements endorsing untrusted data by either validating or sanitizing the data
- sink statements performing security-sensitive operations
- a characteristic of standard taint analysis is that its design assumes a single control flow. Thus, to track the flow of tainted data arising at a source statement, the analysis propagates this data along control-flow edges until reaching a fixpoint.
- One embodiment is directed to a method for security analysis of an application.
- a flow-insensitive analysis is conducted on the application to obtain a set of potential vulnerabilities in the application.
- a relevant set of control flows that include the respective vulnerability is determined.
- a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set is performed by a hardware processor to assess the validity of the respective vulnerability.
- Another embodiment is directed to a method for security analysis of a web application.
- a flow-insensitive analysis is conducted on the application to obtain a set of potential witnesses of vulnerabilities in the application.
- a scope of analysis within program code of the application is restricted to a relevant set of control flows.
- a flow-sensitive analysis of a concatenation of the control flows in the corresponding relevant set is performed by a hardware processor to assess the validity of the respective witness across multiple executions of the web application.
- Another embodiment is also directed to a method for security analysis of an application.
- a flow-insensitive analysis is conducted on the application to obtain a set of potential vulnerabilities in the application.
- a relevant sequence of control flows that enable source to sink data propagation is determined.
- a flow-sensitive analysis of a concatenation of a plurality of control flows in the corresponding relevant sequence is performed to assess the validity of the respective vulnerability.
- An alternative embodiment is directed to a system for security analysis of an application.
- the system includes a flow-insensitive analyzer, a control flow assessment module and a flow-sensitive analyzer.
- the flow-insensitive analyzer is configured to conduct a flow-insensitive analysis on the application to obtain a set of potential vulnerabilities in the application.
- the control flow assessment module is configured to determine, for each of the potential vulnerabilities, a relevant set of control flows that include the respective vulnerability.
- the flow-sensitive analyzer is configured to perform, by a hardware processor, for each relevant set of control flows, a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set to assess the validity of the respective vulnerability.
- Another embodiment is directed to a computer readable storage medium comprising a computer readable program for security analysis of a web application, where the computer readable program when executed on a computer causes the computer to perform a series of steps including: conducting a flow-insensitive analysis on the application to obtain a set of potential witnesses of vulnerabilities in the application; for each of the potential witnesses, restricting a scope of analysis within program code of the application to a relevant set of control flows; and for at least one of the relevant sets of control flows, performing a flow-sensitive analysis of a concatenation of the control flows in the corresponding relevant set to assess the validity of the respective witness across multiple executions of the web application.
- the system includes a flow-insensitive analyzer, a control flow assessment module and a flow-sensitive analyzer.
- the flow-insensitive analyzer is configured to conduct a flow-insensitive analysis on the application to obtain a set of potential vulnerabilities in the application.
- the control flow assessment module is configured to determine, for at least one of the potential vulnerabilities, a relevant sequence of control flows that enable source to sink data propagation.
- the flow-insensitive analyzer is configured to perform, by a hardware processor, for at least one relevant sequence of control flows, a flow-sensitive analysis of a concatenation of a plurality of control flows in the corresponding relevant sequence to assess the validity of the respective vulnerability.
- FIG. 1 is a high-level block/flow diagram of a system for security analysis of an application in accordance with exemplary embodiments of the present principles
- FIG. 2 is a high-level flow diagram of a method for security analysis of an application in accordance with exemplary embodiments of the present principles.
- FIG. 3 is a high-level block diagram of a computing system by which method and system embodiments of the present principles can be implemented.
- Attackers frequently make malicious use of the persistent state, for example, by injecting a security payload into the session object in one round of interaction, then triggering the retrieval and processing of the payload via an additional interaction(s) with the web application.
- One solution for detecting vulnerabilities of this sort using static analysis is to relinquish flow sensitivity in the analysis.
- the analysis abstracts away the control-flow structure of the subject application and processes the effect of all statements without being sensitive to control restrictions on ordering between the statements. This indeed enables discovery of vulnerabilities involving multiple control flows, as taint propagation is considered along all possible “directions” through the code.
- the processing cost is very high, as the analysis now reports many more spurious vulnerabilities compared to a flow-sensitive analysis.
- Table 1 below, provides a simple example illustrating the problems with this type of analysis.
- the “name” attribute stored in the session object is overwritten with a constant value prior to having its value rendered to the response HTML. This makes the code in Table 1 safe.
- a flow-insensitive analysis which abstracts away the order of assignments to the “name” attribute, would wrongly conclude that the code is vulnerable.
- Embodiments of the present principles described herein are directed to methods and systems for detecting multi-flow vulnerabilities.
- the embodiments provide a means for detecting vulnerabilities in an application due to multiple, separate interactions with a user that is both efficient and complete.
- the methods described herein are as accurate as flow-sensitive analysis, and are as complete as flow-insensitive analysis.
- the system first runs a flow-insensitive analysis, yielding a report R.
- the system restricts the scope of analysis to relevant portions within the program. For example, the system determines which control flows c 1 . . . c k in the program support source-to-sink data propagation. Further, for each sequence c 1 . . . c k of control flows accounting for a vulnerability, the system runs a flow-sensitive analysis on the concatenation c 1 . . . c k of these flows.
- . c k in the concatenation may denote a separate interaction of the application with a user, thereby enabling the system to efficiently account for potential vulnerabilities that a standard taint analysis described above, which assumes a single control flow, cannot detect.
- aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
- a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
- a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
- a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof.
- a computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
- Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- LAN local area network
- WAN wide area network
- Internet Service Provider an Internet Service Provider
- These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- any of the following “/”, “and/or”, and “at least one of”, for example, in the cases of “A/B”, “A and/or B” and “at least one of A and B”, is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of both options (A and B).
- such phrasing is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of the third listed option (C) only, or the selection of the first and the second listed options (A and B) only, or the selection of the first and third listed options (A and C) only, or the selection of the second and third listed options (B and C) only, or the selection of all three options (A and B and C).
- This may be extended, as readily apparent by one of ordinary skill in this and related arts, for as many items listed.
- the system 104 can include a flow-insensitive analyzer 106 , a control flow assessment module 108 , a flow-sensitive analyzer 110 and a controller 112 .
- each of the elements 106 - 112 can be implemented by one or more hardware processors.
- each of the elements 104 - 112 can be implemented by one or more hardware processors configured to execute program code of software stored on a storage medium 114 .
- the program code can incorporate steps of method embodiments described in more detail herein below.
- the flow-insensitive analyzer 106 can be configured to receive a program input 102 including code of an application, such as a web application, and to conduct a flow-insensitive analysis on the code, as discussed in more detail herein below.
- the result of the analysis is provided to the control flow assessment module 108 , which restricts the scope of the program to be analyzed by the flow-sensitive analyzer 110 .
- the flow-sensitive analyzer 110 then performs a flow-sensitive on the scope provided by the module 108 to capture vulnerabilities in the program, which can include vulnerabilities stemming from multiple execution flows.
- the controller 112 compiles the vulnerabilities and outputs a report 116 of the vulnerabilities of the program. Details of the functions of the various elements of the system 104 are described herein below with respect to method embodiments.
- Table 2 depicting an exemplary program including a multi-flow vulnerability.
- a flow-insensitive analysis would flag two multi-flow vulnerabilities.
- the first vulnerability is denoted as [I-Spurious].
- [I-Spurious] one starts at the getParameter(“name”) call in NewUserServlet, and ends at the first sink call in ProcessActionServlet. This is a false finding, as the value of parameter “name” is overwritten already in NewUserServlet.
- the second vulnerability is denoted as [II-Real].
- the second flow starts at getParameter(“surname”). This flow highlights a real vulnerability.
- an exemplary method 200 for security analysis of an application in accordance with exemplary embodiments is respectively depicted.
- the method can begin at step 202 , at which the flow-insensitive analyzer 106 can receive program code 102 .
- the program can be a parallel program web application, such as the program illustrated in Table 2 above.
- the application can be any application in which remote or unauthenticated users can input malicious code into the application through interactions with the application.
- the flow-insensitive analyzer 106 can conduct a flow-insensitive analysis on the application 102 to obtain a set of potential vulnerabilities in the application.
- the flow-insensitive analyzer 106 can apply a flow-insensitive analysis S 1 on the program P 102 to obtain a set of potential witnesses of vulnerabilities in the program.
- the witnesses can include the specific source statements and/or flows in the application 102 that may lead to potential security vulnerabilities.
- step 202 can produce a report containing both [I-Spurious] and [II-Real].
- the flow insensitive analysis detects when tainted data, such as that provided by an untrusted user, is written to an object. The analysis then tracks that data through assignments and function calls until it detects that a tainted object is being used in a sink.
- the control flow assessment module 108 In response to receiving the report from the flow-insensitive analyzer 106 , the control flow assessment module 108 , the flow-sensitive analyzer 110 and the controller 112 can iteratively assess each potential vulnerability/witness denoted by the report. For example, at step 206 , the controller 112 can determine whether all vulnerabilities or witnesses indicated in the report provided by the flow-insensitive analyzer 106 have been assessed. If not, then the method can proceed to step 208 .
- the control flow assessment module 108 can construct a limited scope within the program 102 for analysis of the vulnerability or witness. For example, the control flow assessment module 108 can determine a relevant set of control flows that include the respective vulnerability/witness. To determine the relevant set, the control flow assessment module 108 can determine and select all control flows that support or enable sink to source data propagation. The set can include a sequence of control flows c 1 . . . c k , at least a subset of which denote separate, temporal interactions between a user and the application that occur at different times.
- the execution of the entry point of NewUserServlet can be one control flow that is succeeded by running the ProcessActionServlet's entry point, which is another control flow.
- a relevant set of control flows determined for a given vulnerability or witness can include more than one sequence of control flows.
- a given control flow in the set can be included in more than one sequence of control flows.
- various control flows can be concatenated in one or more ways.
- the set of control flows may consist of one control flow.
- all control flows that lead from a source to a sink would be relevant.
- every relevant set of control flows will have c 1 that includes a source and c k that includes a sink for the source, with the possibility that control flows therebetween can also have sources and sinks.
- the flow-sensitive analyzer 110 can perform a flow-sensitive analysis of at least one of the control flows in the relevant set to assess the validity of the respective vulnerability.
- the flow-sensitive analyzer 110 can apply a flow sensitive analysis S 2 to the limited scope determined at step 208 .
- the flow-sensitive analyzer 110 can perform the flow sensitive analysis on a concatenation of at least a plurality of the control flows c 1 . . . c k in a corresponding relevant set or sequence determined at step 208 .
- Step 210 can be implemented for each vulnerability or witness and, hence, for each relevant set of control flows determined for the respective vulnerability or witness.
- not all sets of relevant control flows found at iterations of step 208 necessarily include multiple interactions with a user or a sequence of control flows, as these qualities will depend on the particular characteristics of the program that is analyzed by the method.
- a flow sensitive analysis takes instruction order and structure into account while the analysis is executing. For example, in Table 1, the name value is set using the set method. In accordance with one example, a flow sensitive analysis will only analyze parts of the program that follow this instruction. Since getAttribute follows the set method call, it will be analyzed. Furthermore, since the order of instructions is being investigated, an instruction that removes tainted data will remove a flow. Because there is a second set command following the first one (that introduced tainted data), the second set command removes the tainted data along this flow-sensitive-control-flow and thus removes the control flow, preventing it from being reported as a vulnerability.
- the controller 112 can determine whether the vulnerability or witness, respectively, has been confirmed. For example, the controller 112 can determine whether the respective vulnerability or witness is reproduced by S 2 . For example, returning to the example of Table 2, at step 210 , the flow-sensitive analyzer 110 can track data propagation across the two servlets NewUserServlet and ProcessActionServlet's precisely (i.e., in a flow-sensitive manner), thereby permitting the controller 112 to conclude that [I-Spurious] is a false vulnerability.
- step 206 the controller 112 proceeds to step 206 and repeats the respective method for another vulnerability or witness reported by the flow-insensitive analyzer 106 . If the vulnerability or witness is confirmed, then the controller 112 adds the vulnerability or witness to the output report 116 at step 214 , respectively. Thereafter, the method proceeds to step 206 and can be repeated for another vulnerability or witness reported by the flow-insensitive analyzer 106 . If at step 206 the controller 112 determines that all vulnerabilities or witnesses provided in the report compiled by the flow-insensitive analyzer 106 have been considered, then the controller 112 can output the report 116 indicating the vulnerabilities or witnesses for the program at step 216 .
- the computing system 300 includes a hardware processor 308 that can access random access memory 302 and read only memory 304 through a central processing unit bus 306 .
- the hardware processor 308 can also access a storage medium 320 through an input/output controller 310 , an input/output bus 312 and a storage interface 318 , as illustrated in FIG. 3 .
- software instructions implementing method 200 can be stored in and accessed form the storage medium 320 .
- the system 300 can also include an input/output interface 314 , which can be coupled to a display device, keyboard, mouse, touch screen, external drives or storage mediums, etc., for the input and output of data to and from the system 300 .
- the application code 102 described above can be input into the system 300 through the interface 314 .
- the processor 308 can access the software instructions stored in the storage medium 320 and can access memories 302 and 304 to run the software and thereby implement method 200 described above.
- the processor 308 can implement each of the system elements described above, such as the flow-insensitive analyzer 106 , the control flow assessment module 108 , the flow-sensitive analyzer 110 and the controller 112 . Alternatively, each of these system elements can be implemented via a plurality of processors 308 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Stored Programmes (AREA)
- Debugging And Monitoring (AREA)
Abstract
Methods and systems for security analysis of an application are disclosed. In accordance with one method, a flow-insensitive analysis is conducted on the application to obtain a set of potential vulnerabilities in the application. For each of the potential vulnerabilities, a relevant set of control flows that include the respective vulnerability is determined. Further, for each relevant set of control flows, a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set is performed by a hardware processor to assess the validity of the respective vulnerability.
Description
- 1. Technical Field
- The present invention relates to security analysis of applications, and, more particularly, to static security analysis of applications.
- 2. Description of the Related Art
- Web applications are both widespread and highly popular. However, web applications are often highly vulnerable, as their interactions with users of the web can provide the users with opportunities to insert malicious code in the applications. As such, this potential has led to increasing interest in static security analysis as an effective compile-time means of discovering web vulnerabilities.
- Static analysis tools typically leverage existing program analysis techniques. A particularly useful tool is taint analysis, which provides a way of reducing security analysis to a graph reachability problem. Taint analysis is parameterized by a set of security rules, each rule being a triple <Src,San,Snk> denoting: 1) source statements reading untrusted user inputs (Src); 2) downgrader statements endorsing untrusted data by either validating or sanitizing the data (San); and 3) sink statements performing security-sensitive operations (Snk). Given a security rule r, a flow from a source in Srcr to a sink in Snkr that does not pass through a downgrader from Sanr comprises a potential vulnerability.
- A characteristic of standard taint analysis is that its design assumes a single control flow. Thus, to track the flow of tainted data arising at a source statement, the analysis propagates this data along control-flow edges until reaching a fixpoint.
- One embodiment is directed to a method for security analysis of an application. In accordance with the method, a flow-insensitive analysis is conducted on the application to obtain a set of potential vulnerabilities in the application. For each of the potential vulnerabilities, a relevant set of control flows that include the respective vulnerability is determined. Further, for each relevant set of control flows, a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set is performed by a hardware processor to assess the validity of the respective vulnerability.
- Another embodiment is directed to a method for security analysis of a web application. In the method, a flow-insensitive analysis is conducted on the application to obtain a set of potential witnesses of vulnerabilities in the application. For each of the potential witnesses, a scope of analysis within program code of the application is restricted to a relevant set of control flows. For at least one of the relevant sets of control flows, a flow-sensitive analysis of a concatenation of the control flows in the corresponding relevant set is performed by a hardware processor to assess the validity of the respective witness across multiple executions of the web application.
- Another embodiment is also directed to a method for security analysis of an application. In accordance with the method, a flow-insensitive analysis is conducted on the application to obtain a set of potential vulnerabilities in the application. For at least one of the potential vulnerabilities, a relevant sequence of control flows that enable source to sink data propagation is determined. For at least one relevant sequence of control flows, a flow-sensitive analysis of a concatenation of a plurality of control flows in the corresponding relevant sequence is performed to assess the validity of the respective vulnerability.
- An alternative embodiment is directed to a system for security analysis of an application. The system includes a flow-insensitive analyzer, a control flow assessment module and a flow-sensitive analyzer. The flow-insensitive analyzer is configured to conduct a flow-insensitive analysis on the application to obtain a set of potential vulnerabilities in the application. In addition, the control flow assessment module is configured to determine, for each of the potential vulnerabilities, a relevant set of control flows that include the respective vulnerability. Further, the flow-sensitive analyzer is configured to perform, by a hardware processor, for each relevant set of control flows, a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set to assess the validity of the respective vulnerability.
- Another embodiment is directed to a computer readable storage medium comprising a computer readable program for security analysis of a web application, where the computer readable program when executed on a computer causes the computer to perform a series of steps including: conducting a flow-insensitive analysis on the application to obtain a set of potential witnesses of vulnerabilities in the application; for each of the potential witnesses, restricting a scope of analysis within program code of the application to a relevant set of control flows; and for at least one of the relevant sets of control flows, performing a flow-sensitive analysis of a concatenation of the control flows in the corresponding relevant set to assess the validity of the respective witness across multiple executions of the web application.
- Another embodiment is directed to a system for security analysis of an application. The system includes a flow-insensitive analyzer, a control flow assessment module and a flow-sensitive analyzer. The flow-insensitive analyzer is configured to conduct a flow-insensitive analysis on the application to obtain a set of potential vulnerabilities in the application. In addition, the control flow assessment module is configured to determine, for at least one of the potential vulnerabilities, a relevant sequence of control flows that enable source to sink data propagation. Further, the flow-insensitive analyzer is configured to perform, by a hardware processor, for at least one relevant sequence of control flows, a flow-sensitive analysis of a concatenation of a plurality of control flows in the corresponding relevant sequence to assess the validity of the respective vulnerability.
- These and other features and advantages will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings.
- The disclosure will provide details in the following description of preferred embodiments with reference to the following figures wherein:
-
FIG. 1 is a high-level block/flow diagram of a system for security analysis of an application in accordance with exemplary embodiments of the present principles; -
FIG. 2 is a high-level flow diagram of a method for security analysis of an application in accordance with exemplary embodiments of the present principles; and -
FIG. 3 is a high-level block diagram of a computing system by which method and system embodiments of the present principles can be implemented. - As indicated above, a key limitation of standard taint analysis is that its design assumes a single control flow, where the analysis propagates data that is potentially tainted at a source statement along control-flow edges until the analysis reaches a fixpoint. However, restricting the analysis to single execution flows, without accounting for vulnerabilities spanning a series of interactions with the subject web application, is an important source of unsoundness, as the analysis may miss true and critical vulnerabilities. This is not at all a theoretical concern. An important foundation in the design of web applications is the ability to maintain a persistent state through, for example, cookies, the session object, backend databases, etc. Otherwise web interaction would be stateless, and thus of limited functional value.
- Attackers frequently make malicious use of the persistent state, for example, by injecting a security payload into the session object in one round of interaction, then triggering the retrieval and processing of the payload via an additional interaction(s) with the web application. One solution for detecting vulnerabilities of this sort using static analysis is to relinquish flow sensitivity in the analysis. For example, in this case, the analysis abstracts away the control-flow structure of the subject application and processes the effect of all statements without being sensitive to control restrictions on ordering between the statements. This indeed enables discovery of vulnerabilities involving multiple control flows, as taint propagation is considered along all possible “directions” through the code. However, the processing cost is very high, as the analysis now reports many more spurious vulnerabilities compared to a flow-sensitive analysis.
- Table 1, below, provides a simple example illustrating the problems with this type of analysis. The “name” attribute stored in the session object is overwritten with a constant value prior to having its value rendered to the response HTML. This makes the code in Table 1 safe. However, a flow-insensitive analysis, which abstracts away the order of assignments to the “name” attribute, would wrongly conclude that the code is vulnerable.
-
TABLE 1 A program with which a flow-insensitive analysis yields a spurious vulnerability String name = request.getParameter(“name”); // Source response.getSession( ).set(“name”, name); ... response.getSession( ).set(“name”, “admin”); ... response.getWriter( ).write( response.getSession( ).getAttribute(“name”)); // Sink - Embodiments of the present principles described herein are directed to methods and systems for detecting multi-flow vulnerabilities. In particular, the embodiments provide a means for detecting vulnerabilities in an application due to multiple, separate interactions with a user that is both efficient and complete. Specifically, the methods described herein are as accurate as flow-sensitive analysis, and are as complete as flow-insensitive analysis.
- An important aspect of the exemplary approaches described herein below is the use the flow-insensitive analysis as guidance for a flow-sensitive analysis conducted on the code of an application. For example, the system first runs a flow-insensitive analysis, yielding a report R. For each vulnerability in R, the system restricts the scope of analysis to relevant portions within the program. For example, the system determines which control flows c1 . . . ck in the program support source-to-sink data propagation. Further, for each sequence c1 . . . ck of control flows accounting for a vulnerability, the system runs a flow-sensitive analysis on the concatenation c1 . . . ck of these flows. Here, each of the control flows c1 . . . ck in the concatenation may denote a separate interaction of the application with a user, thereby enabling the system to efficiently account for potential vulnerabilities that a standard taint analysis described above, which assumes a single control flow, cannot detect.
- As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
- A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks. The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
- It should be further noted that reference in the specification to “one embodiment” or “an embodiment” of the present principles, as well as other variations thereof, means that a particular feature, structure, characteristic, and so forth described in connection with the embodiment is included in at least one embodiment of the present principles. Thus, the appearances of the phrase “in one embodiment” or “in an embodiment”, as well any other variations, appearing in various places throughout the specification are not necessarily all referring to the same embodiment.
- It is to be appreciated that the use of any of the following “/”, “and/or”, and “at least one of”, for example, in the cases of “A/B”, “A and/or B” and “at least one of A and B”, is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of both options (A and B). As a further example, in the cases of “A, B, and/or C” and “at least one of A, B, and C”, such phrasing is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of the third listed option (C) only, or the selection of the first and the second listed options (A and B) only, or the selection of the first and third listed options (A and C) only, or the selection of the second and third listed options (B and C) only, or the selection of all three options (A and B and C). This may be extended, as readily apparent by one of ordinary skill in this and related arts, for as many items listed.
- Referring now to the drawings in which like numerals represent the same or similar elements and initially to
FIG. 1 , asystem 104 for security analysis of an application in accordance with an exemplary embodiment of the present principles is illustratively depicted. Thesystem 104 can include a flow-insensitive analyzer 106, a controlflow assessment module 108, a flow-sensitive analyzer 110 and acontroller 112. It should be noted that each of the elements 106-112 can be implemented by one or more hardware processors. For example, each of the elements 104-112 can be implemented by one or more hardware processors configured to execute program code of software stored on astorage medium 114. For example, the program code can incorporate steps of method embodiments described in more detail herein below. Generally, the flow-insensitive analyzer 106 can be configured to receive aprogram input 102 including code of an application, such as a web application, and to conduct a flow-insensitive analysis on the code, as discussed in more detail herein below. The result of the analysis is provided to the controlflow assessment module 108, which restricts the scope of the program to be analyzed by the flow-sensitive analyzer 110. The flow-sensitive analyzer 110 then performs a flow-sensitive on the scope provided by themodule 108 to capture vulnerabilities in the program, which can include vulnerabilities stemming from multiple execution flows. In turn, thecontroller 112 compiles the vulnerabilities and outputs areport 116 of the vulnerabilities of the program. Details of the functions of the various elements of thesystem 104 are described herein below with respect to method embodiments. - To illustrate the operation of exemplary security analysis techniques in accordance with embodiments of the present principles, reference is made to Table 2, below, depicting an exemplary program including a multi-flow vulnerability. For this example, a flow-insensitive analysis would flag two multi-flow vulnerabilities. The first vulnerability is denoted as [I-Spurious]. For [I-Spurious], one starts at the getParameter(“name”) call in NewUserServlet, and ends at the first sink call in ProcessActionServlet. This is a false finding, as the value of parameter “name” is overwritten already in NewUserServlet. The second vulnerability is denoted as [II-Real]. Here, the second flow starts at getParameter(“surname”). This flow highlights a real vulnerability. In this case, the untrusted data to which the “surname” attribute maps is not overwritten and survives up to the sink call, which renders the payload to the response HTML. In the approaches described herein below, the distinction between these two reports will be captured accurately and correctly by the analysis.
-
TABLE 2 A program containing a multi-flow vulnerability /* in New UserServlet.java */ String name = request.getParameter(“name”); // Source String surname = request.getParameter(“name”); // Source response.getSession( ).set(“name”, name); response.getSession( ).set(“surname”, name); ... response.getSession( ).set(“name”, “admin”); ... /* in ProcessActionServlet.java */ ... response.getWriter( ).write( response.getSession( ).getAttribute(“name”)); // Sink ... String name = response.getSession( ).getAttribute(“name”); String surname = response.getSession( ).getAttribute(“surname”) response.getWriter( ).write(name); // Sink response.getWriter( ).write(surname); // Sink ... - Referring now to
FIG. 2 , with continuing reference toFIG. 1 and Table 2, anexemplary method 200 for security analysis of an application in accordance with exemplary embodiments is respectively depicted. The method can begin atstep 202, at which the flow-insensitive analyzer 106 can receiveprogram code 102. For example, the program can be a parallel program web application, such as the program illustrated in Table 2 above. However, it should be noted that the application can be any application in which remote or unauthenticated users can input malicious code into the application through interactions with the application. - At
step 202, the flow-insensitive analyzer 106 can conduct a flow-insensitive analysis on theapplication 102 to obtain a set of potential vulnerabilities in the application. For example, the flow-insensitive analyzer 106 can apply a flow-insensitive analysis S1 on theprogram P 102 to obtain a set of potential witnesses of vulnerabilities in the program. Here, the witnesses can include the specific source statements and/or flows in theapplication 102 that may lead to potential security vulnerabilities. For example, for the program of Table 2, step 202 can produce a report containing both [I-Spurious] and [II-Real]. The flow insensitive analysis detects when tainted data, such as that provided by an untrusted user, is written to an object. The analysis then tracks that data through assignments and function calls until it detects that a tainted object is being used in a sink. - In response to receiving the report from the flow-
insensitive analyzer 106, the controlflow assessment module 108, the flow-sensitive analyzer 110 and thecontroller 112 can iteratively assess each potential vulnerability/witness denoted by the report. For example, atstep 206, thecontroller 112 can determine whether all vulnerabilities or witnesses indicated in the report provided by the flow-insensitive analyzer 106 have been assessed. If not, then the method can proceed to step 208. - At
step 208, the controlflow assessment module 108 can construct a limited scope within theprogram 102 for analysis of the vulnerability or witness. For example, the controlflow assessment module 108 can determine a relevant set of control flows that include the respective vulnerability/witness. To determine the relevant set, the controlflow assessment module 108 can determine and select all control flows that support or enable sink to source data propagation. The set can include a sequence of control flows c1 . . . ck, at least a subset of which denote separate, temporal interactions between a user and the application that occur at different times. For example, in the program of Table 2, the execution of the entry point of NewUserServlet can be one control flow that is succeeded by running the ProcessActionServlet's entry point, which is another control flow. It should be noted that a relevant set of control flows determined for a given vulnerability or witness can include more than one sequence of control flows. In addition, a given control flow in the set can be included in more than one sequence of control flows. Thus, various control flows can be concatenated in one or more ways. Further, in certain cases, the set of control flows may consist of one control flow. In accordance with one exemplary aspect, all control flows that lead from a source to a sink would be relevant. In addition, in one example, every relevant set of control flows will have c1 that includes a source and ck that includes a sink for the source, with the possibility that control flows therebetween can also have sources and sinks. - At
step 210, the flow-sensitive analyzer 110 can perform a flow-sensitive analysis of at least one of the control flows in the relevant set to assess the validity of the respective vulnerability. For example, the flow-sensitive analyzer 110 can apply a flow sensitive analysis S2 to the limited scope determined atstep 208. Here, atstep 210, to assess the validity of the respective witness across multiple executions of the application, the flow-sensitive analyzer 110 can perform the flow sensitive analysis on a concatenation of at least a plurality of the control flows c1 . . . ck in a corresponding relevant set or sequence determined atstep 208. If there are a plurality of sequences in the relevant set of control flows, then the flow-sensitive analyzer 110 can perform the flow sensitive analysis on each concatenation of the respective sequences. Further, as noted above, a plurality of the control flows in a concatenation can denote multiple executions of the application. In addition, as also noted above, the multiple executions can denote temporally separate interactions with a user. Step 210 can be implemented for each vulnerability or witness and, hence, for each relevant set of control flows determined for the respective vulnerability or witness. However, it should be noted that not all sets of relevant control flows found at iterations ofstep 208 necessarily include multiple interactions with a user or a sequence of control flows, as these qualities will depend on the particular characteristics of the program that is analyzed by the method. - It should be noted that a flow sensitive analysis takes instruction order and structure into account while the analysis is executing. For example, in Table 1, the name value is set using the set method. In accordance with one example, a flow sensitive analysis will only analyze parts of the program that follow this instruction. Since getAttribute follows the set method call, it will be analyzed. Furthermore, since the order of instructions is being investigated, an instruction that removes tainted data will remove a flow. Because there is a second set command following the first one (that introduced tainted data), the second set command removes the tainted data along this flow-sensitive-control-flow and thus removes the control flow, preventing it from being reported as a vulnerability.
- At
step 212, thecontroller 112 can determine whether the vulnerability or witness, respectively, has been confirmed. For example, thecontroller 112 can determine whether the respective vulnerability or witness is reproduced by S2. For example, returning to the example of Table 2, atstep 210, the flow-sensitive analyzer 110 can track data propagation across the two servlets NewUserServlet and ProcessActionServlet's precisely (i.e., in a flow-sensitive manner), thereby permitting thecontroller 112 to conclude that [I-Spurious] is a false vulnerability. - If the vulnerability or witness is not confirmed, then the
controller 112 proceeds to step 206 and repeats the respective method for another vulnerability or witness reported by the flow-insensitive analyzer 106. If the vulnerability or witness is confirmed, then thecontroller 112 adds the vulnerability or witness to theoutput report 116 atstep 214, respectively. Thereafter, the method proceeds to step 206 and can be repeated for another vulnerability or witness reported by the flow-insensitive analyzer 106. If atstep 206 thecontroller 112 determines that all vulnerabilities or witnesses provided in the report compiled by the flow-insensitive analyzer 106 have been considered, then thecontroller 112 can output thereport 116 indicating the vulnerabilities or witnesses for the program atstep 216. - Thus, by conducting a flow sensitive analysis on concatenations of control flows denoting separate interactions of the application with one or more users found by using a flow insensitive analysis as a guide, embodiments of the present principles efficiently account for potential vulnerabilities that standard taint analyses cannot detect.
- With reference now to
FIG. 3 , anexemplary computing system 300 by which system and method embodiments of the present principles described above can be implemented is illustrated. Thecomputing system 300 includes ahardware processor 308 that can accessrandom access memory 302 and readonly memory 304 through a centralprocessing unit bus 306. In addition, thehardware processor 308 can also access astorage medium 320 through an input/output controller 310, an input/output bus 312 and astorage interface 318, as illustrated inFIG. 3 . For example, softwareinstructions implementing method 200 can be stored in and accessed form thestorage medium 320. Thesystem 300 can also include an input/output interface 314, which can be coupled to a display device, keyboard, mouse, touch screen, external drives or storage mediums, etc., for the input and output of data to and from thesystem 300. For example, theapplication code 102 described above can be input into thesystem 300 through theinterface 314. In accordance with one exemplary embodiment, theprocessor 308 can access the software instructions stored in thestorage medium 320 and can accessmemories method 200 described above. In addition, theprocessor 308 can implement each of the system elements described above, such as the flow-insensitive analyzer 106, the controlflow assessment module 108, the flow-sensitive analyzer 110 and thecontroller 112. Alternatively, each of these system elements can be implemented via a plurality ofprocessors 308. - Having described preferred embodiments of a systems and methods for discovering application vulnerabilities involving multiple execution flows (which are intended to be illustrative and not limiting), it is noted that modifications and variations can be made by persons skilled in the art in light of the above teachings. It is therefore to be understood that changes may be made in the particular embodiments disclosed which are within the scope of the invention as outlined by the appended claims. Having thus described aspects of the invention, with the details and particularity required by the patent laws, what is claimed and desired protected by Letters Patent is set forth in the appended claims.
Claims (21)
1.-25. (canceled)
26. A method for security analysis of an application comprising:
conducting a flow-insensitive analysis on the application to obtain a set of potential vulnerabilities in the application;
for each of the potential vulnerabilities, determining a relevant set of control flows that include the respective vulnerability; and
for each relevant set of control flows, performing, by a hardware processor, a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set to assess a validity of the respective vulnerability.
27. The method of claim 26 , wherein the performing the flow-sensitive analysis further comprises performing the flow sensitive analysis on a concatenation of control flows in at least one of the relevant sets.
28. The method of claim 27 , wherein a plurality of the control flows in the concatenation denote multiple executions of the application.
29. The method of claim 28 , wherein the multiple executions denote separate interactions with a user.
30. The method of claim 29 , wherein the application is a parallel program web application.
31. The method of claim 26 , wherein the determining the relevant set of control flows that include the respective vulnerability further comprises determining a set of control flows that enable source to sink data propagation.
32. The method of claim 26 , further comprising:
for each of the vulnerabilities, determining whether the respective vulnerability is reproduced by the flow-sensitive analysis.
33. The method of claim 32 , further comprising:
outputting a report denoting each of the respective vulnerabilities that are reproduced by the flow-sensitive analysis.
34. A method for security analysis of a web application comprising:
conducting a flow-insensitive analysis on the application to obtain a set of potential witnesses of vulnerabilities in the application;
for each of the potential witnesses, restricting a scope of analysis within program code of the application to a relevant set of control flows; and
for at least one of the relevant sets of control flows, performing, by a hardware processor, a flow-sensitive analysis of a concatenation of the control flows in the corresponding relevant set to assess a validity of the respective witness across multiple executions of the web application.
35. The method of claim 34 , wherein a plurality of the control flows in the concatenation denote the multiple executions of the web application.
36. The method of claim 35 , wherein the multiple executions denote separate interactions with a user.
37. The method of claim 34 , wherein the restricting the scope of analysis further comprises determining a set of control flows that enable source to sink data propagation.
38. The method of claim 34 , further comprising:
for each of the witnesses, determining whether the respective witness is reproduced by the flow-sensitive analysis.
39. The method of claim 38 , further comprising:
outputting a report denoting each of the respective witnesses that are reproduced by the flow-sensitive analysis.
40. A method for security analysis of an application comprising:
conducting a flow-insensitive analysis on the application to obtain a set of potential vulnerabilities in the application;
for at least one of the potential vulnerabilities, determining a relevant sequence of control flows that enable source to sink data propagation; and
for at least one relevant sequence of control flows, performing, by a hardware processor, a flow-sensitive analysis of a concatenation of a plurality of control flows in the corresponding relevant sequence to assess a validity of the respective vulnerability.
41. The method of claim 40 , wherein a plurality of the control flows in the concatenation denote multiple executions of the application.
42. The method of claim 41 , wherein the multiple executions denote separate interactions with a user.
43. The method of claim 42 , wherein the application is a parallel program web application.
44. The method of claim 40 , further comprising:
for each of the vulnerabilities, determining whether the respective vulnerability is reproduced by the flow-sensitive analysis.
45. The method of claim 44 , further comprising:
outputting a report denoting each of the respective vulnerabilities that are reproduced by the flow-sensitive analysis.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/705,799 US20140157419A1 (en) | 2012-12-05 | 2012-12-05 | Discovery of application vulnerabilities involving multiple execution flows |
US13/755,151 US8904543B2 (en) | 2012-12-05 | 2013-01-31 | Discovery of application vulnerabilities involving multiple execution flows |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/705,799 US20140157419A1 (en) | 2012-12-05 | 2012-12-05 | Discovery of application vulnerabilities involving multiple execution flows |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/755,151 Continuation US8904543B2 (en) | 2012-12-05 | 2013-01-31 | Discovery of application vulnerabilities involving multiple execution flows |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140157419A1 true US20140157419A1 (en) | 2014-06-05 |
Family
ID=50826920
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/705,799 Abandoned US20140157419A1 (en) | 2012-12-05 | 2012-12-05 | Discovery of application vulnerabilities involving multiple execution flows |
US13/755,151 Expired - Fee Related US8904543B2 (en) | 2012-12-05 | 2013-01-31 | Discovery of application vulnerabilities involving multiple execution flows |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/755,151 Expired - Fee Related US8904543B2 (en) | 2012-12-05 | 2013-01-31 | Discovery of application vulnerabilities involving multiple execution flows |
Country Status (1)
Country | Link |
---|---|
US (2) | US20140157419A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9250876B2 (en) * | 2013-08-27 | 2016-02-02 | International Business Machines Corporation | Building reusable function summaries for frequently visited methods to optimize data-flow analysis |
EP3130123B1 (en) * | 2014-04-11 | 2021-07-07 | HDIV Security, S.L. | Detection of manipulation of applications |
US9473523B1 (en) | 2016-02-04 | 2016-10-18 | International Business Machines Corporation | Execution of test inputs with applications in computer security assessment |
US10701099B2 (en) * | 2016-09-28 | 2020-06-30 | International Business Machines Corporation | Providing efficient information tracking with dynamically selected precision |
US10587647B1 (en) * | 2016-11-22 | 2020-03-10 | Fireeye, Inc. | Technique for malware detection capability comparison of network security devices |
US10169604B2 (en) * | 2016-12-13 | 2019-01-01 | International Business Machines Corporation | Method and system to prevent ultrasound data leaks in mobile devices |
CN112989363B (en) * | 2021-05-19 | 2021-09-28 | 北京邮电大学 | Vulnerability positioning method and device, electronic equipment and storage medium |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5671419A (en) | 1995-06-15 | 1997-09-23 | International Business Machines Corporation | Interprocedural data-flow analysis that supports recursion while only performing one flow-sensitive analysis of each procedure |
AU2001237696A1 (en) | 2000-03-03 | 2001-09-12 | Sanctum Ltd. | System for determining web application vulnerabilities |
US7493607B2 (en) | 2002-07-09 | 2009-02-17 | Bluerisc Inc. | Statically speculative compilation and execution |
WO2004095176A2 (en) | 2003-04-18 | 2004-11-04 | Ounce Labs, Inc. | Detecting vulnerabilities in source code |
US7669193B1 (en) | 2003-09-25 | 2010-02-23 | Lantronix, Inc. | Program transformation using flow-sensitive type constraint analysis |
US20070245329A1 (en) | 2006-03-28 | 2007-10-18 | Nec Laboratories America | Static analysis in disjunctive numerical domains |
US7617489B2 (en) | 2006-09-15 | 2009-11-10 | Ounce Labs, Inc. | Method and system for detecting interprocedural vulnerability by analysis of source code |
US8316345B2 (en) | 2007-06-01 | 2012-11-20 | Microsoft Corporation | Program abstraction based on program control |
US8032939B2 (en) * | 2007-11-06 | 2011-10-04 | Airtight Networks, Inc. | Method and system for providing wireless vulnerability management for local area computer networks |
US20110302559A1 (en) | 2010-06-04 | 2011-12-08 | Mayur Naik | Method and apparatus for leveraging path-program analysis for effective static whole-program analysis |
JP5656602B2 (en) | 2010-12-14 | 2015-01-21 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Method for analyzing pointer, computer and computer program thereof |
-
2012
- 2012-12-05 US US13/705,799 patent/US20140157419A1/en not_active Abandoned
-
2013
- 2013-01-31 US US13/755,151 patent/US8904543B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US20140157420A1 (en) | 2014-06-05 |
US8904543B2 (en) | 2014-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8904543B2 (en) | Discovery of application vulnerabilities involving multiple execution flows | |
US8984642B2 (en) | Detecting security vulnerabilities in web applications | |
US20180121657A1 (en) | Security risk evaluation | |
US10019581B2 (en) | Identifying stored security vulnerabilities in computer software applications | |
JP5852676B2 (en) | Method, computer program, and system for determining vulnerability of a computer software application to an elevation of privilege attack | |
US9201769B2 (en) | Progressive black-box testing of computer software applications | |
US10061682B2 (en) | Detecting race condition vulnerabilities in computer software applications | |
US20120254839A1 (en) | Simulating black box test results using information from white box testing | |
US9678859B2 (en) | Detecting error states when interacting with web applications | |
US9027131B2 (en) | Refinement-based security analysis | |
US9519788B2 (en) | Identifying security vulnerabilities related to inter-process communications | |
US9158923B2 (en) | Mitigating security risks via code movement | |
CN114328208A (en) | Code detection method and device, electronic equipment and storage medium | |
US10002253B2 (en) | Execution of test inputs with applications in computer security assessment | |
US9239926B2 (en) | Static analysis for discovery of timing attack vulnerabilities in a computer software application | |
Algarni et al. | An open tool architecture for security testing of NoSQL-based applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GUARNIERI, SALVATORE A.;PISTOIA, MARCO;TRIPP, OMER;SIGNING DATES FROM 20121202 TO 20121203;REEL/FRAME:029411/0551 |
|
STCB | Information on status: application discontinuation |
Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION |