Standardizing Source Code Security Audits
نویسندگان
چکیده
A source code security audit is a powerful methodology for locating and removing security vulnerabilities. An audit can be used to (1) pass potentially prioritized list of vulnerabilities to developers (2) exploit vulnerabilities or (3) provide proof-of-concepts for potential vulnerabilities. The security audit research currently remains disjoint with minor discussion of methodologies utilized in the field. This paper assembles a broad array of literature to promote standardizing source code security audits techniques. It, then, explores a case study using the aforementioned techniques. The case study analyzes the security for a stable version of the Apache Traffic Server (ATS). The study takes a white to gray hat point of view as it reports vulnerabilities located by two popular proprietary tools, examines and connects potential vulnerabilities with a standard community-driven taxonomy, and describes consequences for exploiting the vulnerabilities. A review of other security-driven case studies concludes this research.
منابع مشابه
BinPro: A Tool for Binary Backdoor Accountability in Code Audits by Dhaval Miyani A thesis submitted in conformity with the requirements
BinPro: A Tool for Binary Backdoor Accountability in Code Audits Dhaval Miyani Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2016 Highly security sensitive organizations often perform source code audits on software they use. However, after the audit is performed, they must still perform a binary code audit to ensure the binary provide...
متن کاملStatic Analysis for Security
source-code security analysis with static analysis tools. Since ITS4's release in early 2000 (www.cigital.com/its4/), the idea of detecting security problems through source code has come of age. ITS4 is extremely simple—the tool basically scans through a file looking for syntactic matches based on several simple " rules " that might indicate possible security vulnera-bilities (for example, use ...
متن کاملOpen-source Security Software Security for Open-source Systems
S ome people have claimed that open-source software is intrinsically more secure than closed source, 1 and others have claimed that it's not. 2 Neither case is absolutely true: they are essentially flip sides of the same coin. Open source gives both attackers and defenders greater analytic power to do something about software vulnerabilities. If the defender does nothing about security, though,...
متن کاملPixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Technical Report)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applications have grown as well. Since manual code reviews are time-consuming, error-prone and costly, the need for automated solutions has become evident. In this paper, we address the problem of vulnerable Web applications ...
متن کاملPixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applications have grown as well. Since manual code reviews are time-consuming, error-prone and costly, the need for automated solutions has become evident. In this paper, we address the problem of vulnerable Web applications ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012