Detecting security vulnerabilities with vulnerability nets

被引:2
|
作者
Wang, Pingyan [1 ]
Liu, Shaoying [1 ]
Liu, Ai [1 ]
Jiang, Wen [1 ]
机构
[1] Hiroshima Univ, Higashihiroshima, Japan
关键词
Vulnerability; Security; Static analysis; Manual audits; Petri nets; WEB APPLICATION VULNERABILITIES; SAFETY VERIFICATION; STATIC ANALYSIS;
D O I
10.1016/j.jss.2023.111902
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Detecting security vulnerabilities is a crucial part in secure software development. Many static analysis tools have proved to be effective in finding vulnerabilities, but generally there are some complex and subtle vulnerabilities that can escape from detection. Manual audits are a complementary approach to using tools. Unfortunately, most manual analyses are tedious and error prone. To benefit from both the tools and manual audits, some approaches incorporate the auditor's expertise into a static analysis tool during vulnerability discovery. Following this strategy, this paper presents a representation of source code called a vulnerability net, which is a special Petri net that integrates with data dependence graphs and control flow graphs. The combined repre-sentation can facilitate the detection of taint-style vulnerabilities such as buffer overflows and injection vul-nerabilities. We test the proposed approach on Securibench Micro and demonstrate that it has the capability to identify a variety of vulnerabilities while keeping the rates of false negatives and positives low.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Detecting Security Vulnerabilities with Vulnerability Nets
    Wang, Pingyan
    Liu, Shaoying
    Liu, Ai
    Jiang, Wen
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C, 2022, : 375 - 383
  • [2] Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis
    Wang, Wentao
    Dumont, Faryn
    Niu, Nan
    Horton, Glen
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (05) : 1665 - 1675
  • [3] Detection of security vulnerabilities in C language applications
    Boudjema, El Habib
    Faure, Christele
    Sassolas, Mathieu
    Mokdad, Lynda
    SECURITY AND PRIVACY, 2018, 1 (01)
  • [4] AN APPROACH FOR DETECTING SECURITY VULNERABILITIES IN WEB BROWSERS FOR MOBILE OPERATING SYSTEMS
    Mechev, Stoyan
    MATHEMATICS AND INFORMATICS, 2024, 67 (05): : 475 - 488
  • [5] Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages
    Medeiros, Iberia
    Neves, Nuno
    Correia, Miguel
    IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (02) : 1033 - 1056
  • [6] A Framework for Modeling and Detecting Security Vulnerabilities in Human-Machine Pair Programming
    Wang, Pingyan
    Liu, Shaoying
    Liu, Ai
    Zaidi, Fatiha
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (05): : 1129 - 1138
  • [7] KALD: Detecting Direct Pointer Disclosure Vulnerabilities
    Belleville, Brian
    Shen, Wenbo
    Volckaert, Stijn
    Azab, Ahmed M.
    Franz, Michael
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1369 - 1377
  • [8] Mitigating Program Security Vulnerabilities: Approaches and Challenges
    Shahriar, Hossain
    Zulkernine, Mohammad
    ACM COMPUTING SURVEYS, 2012, 44 (03)
  • [9] Security slicing for auditing common injection vulnerabilities
    Thome, Julian
    Shar, Lwin Khin
    Bianculli, Domenico
    Briand, Lionel
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 766 - 783
  • [10] SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS
    Medeiros, Iberia
    Beatriz, Miguel
    Neves, Nuno
    Correia, Miguel
    IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (03) : 1168 - 1188