Cargando…

Supporting secure programming in web applications through interactive static analysis

Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to appl...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhu, Jun, Xie, Jing, Lipford, Heather Richter, Chu, Bill
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4294755/
https://www.ncbi.nlm.nih.gov/pubmed/25685513
http://dx.doi.org/10.1016/j.jare.2013.11.006
Descripción
Sumario:Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.