首页> 外文会议>Third International Conference on Software Testing, Verification, and Validation—Workshops >Taint Dependency Sequences: A Characterization of Insecure Execution Paths Based on Input-Sensitive Cause Sequences
【24h】

Taint Dependency Sequences: A Characterization of Insecure Execution Paths Based on Input-Sensitive Cause Sequences

机译:污染依赖序列:基于输入敏感原因序列的不安全执行路径的刻画

获取原文
获取原文并翻译 | 示例

摘要

Numerous software vulnerabilities can be activated only with dedicated user inputs. Taint analysis is a security check which consists in looking for possible dependency chains between user inputs and vulnerable statements (like array accesses). Most of the existing static taint analysis tools produce some warnings on potentially vulnerable program locations. It is then up to the developer to analyze these results by scanning the possible execution paths that may lead to these locations with unsecured user inputs. We present a Taint Dependency Sequences Calculus, based on a fine-grain data and control taint analysis, that aims to help the developer in this task by providing some information on the set of paths that need to be analyzed. Following some ideas introduced in [1], [2], we also propose some metrics to characterize these paths in term of "dangerousness". This approach is illustrated with the help of the Verisec Suite [3] and by describing a prototype, called STAC.
机译:只有使用专用的用户输入,才能激活许多软件漏洞。污染分析是一项安全检查,其中包括寻找用户输入与易受攻击的语句(例如数组访问)之间可能的依赖关系链。大多数现有的静态污点分析工具都会在潜在易受攻击的程序位置发出一些警告。然后由开发人员通过扫描可能的执行路径来分析这些结果,这些执行路径可能导致使用不安全的用户输入进入这些位置。我们基于细粒度的数据和控制异味分析,提出了一种Taint依赖序列演算,旨在通过提供一些有关需要分析的路径信息来帮助开发人员完成此任务。遵循[1],[2]中介绍的一些思想,我们还提出了一些度量标准,以“危险性”来表征这些路径。在Verisec Suite [3]的帮助下并通过描述一个称为STAC的原型来说明这种方法。

著录项

  • 来源
  • 会议地点 Paris(FR);Paris(FR)
  • 作者单位

    Issue Date: 6-10 April 2010rnrntOn page(s): rnt371rnttrn- 380rnrnrnLocation: Paris, FrancernrnPrint ISBN: 978-1-4244-6773-0rnrnrnrnttrnDigital Object Identifier: href='http://dx.doi.org/10.1109/ICSTW.2010.28' target='_blank'>10.1109/ICSTW.2010.28 rnrnDate of Current Version: trnrnt2010-05-13 13:19:49.0rnrnt rntt class="body-text">rntname="Abstract">>Abstractrn>Numerous software vulnerabilities can be activated only with dedicated user inputs. Taint analysis is a security check which consists in looking for possible dependency chains between user inputs and vulnerable statements (like array accesses). Most of the existing static taint analysis tools produce some warnings on potentially vulnerable program locations. It is then up;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 TP311.52;
  • 关键词

    taint analysis; test objectives; vulnerability detection;

    机译:污染分析;测试目标;漏洞检测;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号