Assisted Discovery of Vulnerabilities in Source Code by Analyzing Program Slices

نویسندگان

  • Alwin Maier
  • Ansgar Kellner
  • Konrad Rieck
چکیده

Since our daily life is strongly oriented towards the use of computer systems, everyone is affected by security incidents. Consequently, securing computer systems is of everyone’s interest. Many vulnerabilities in source code can be put down to insufficient validation of input data. Not long ago, a method was introduced to support the auditor in finding and fixing such vulnerabilities. In this thesis, we contribute to this method by proposing alternative approaches for improvement. The idea is based on a combination of unsupervised machine learning and static code analysis. More precisely, missing checks are expressed as anomalous patterns found in conditions. To separate relevant from irrelevant conditions, the scope of data sources or data sinks is determined. Analyzing these scopes, with respect to checks, makes it possible to expose sources/sinks that deviate from normality. Our method differs from the original method by the definition of the scopes and the similarity assessment of sources/sinks which is required to define normality. Interprocedural program slices are used as scopes for sources/sinks instead of intraprocedural lightweight taint analysis. Furthermore, the notion of similar sources/sinks is based on cluster analysis which is used instead of the identification of nearest neighbors. We illustrate the theoretical advantages of our contributions. Moreover, we are able to demonstrate the new capabilities of our prototype in the evaluation of multiple controlled experiments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning

Rigorous identification of vulnerabilities in program code is a key to implementing and operating secure systems. Unfortunately, only some types of vulnerabilities can be detected automatically. While techniques from software testing can accelerate the search for security flaws, in the general case discovery of vulnerabilities is a tedious process that requires significant expertise and time. I...

متن کامل

Cross-boundary Security Analysis

The goal of the project was to develop new methods to discover security vulnerabilities and security exploits. The research involved static analysis, dynamic analysis, and symbolic execution of software at both the source-code and machine-code levels. An aspect that distinguished the approach taken in the project from previous work was the attempt to uncover security problems due to differences...

متن کامل

CLORIFI: software vulnerability discovery using code clone verification

Software vulnerability has long been considered an important threat to the system safety. A vulnerability is often reproduced because of the frequent code reuse by programmers. Security patches are usually not propagated to all code clones; however, they could be leveraged to discover unknown vulnerabilities. Static code auditing approaches are frequently proposed to scan source codes for secur...

متن کامل

A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities

This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) model to depict and reason about security vulnerabilities. An in-depth analysis of the vulnerability reports and the corresponding source code of the applications leads to three observations: (i) exploits must pass thro...

متن کامل

An Efficient Source Code Auditing using Fuzzy Decision Tree

Here in this paper the discovery of Vulnerabilities in the Source Codes is proposed. The Proposed Methodology applied is based on the Concept of Fuzzy Based Decision Tree. The Methodology adopted here for the Checking of Codes Vulnerabilities provides efficient discovery of Vulnerabilities and hence provides improved performance and high precision and Recall. The Proposed Methodology Audits the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015