Automatic mapping of configuration options in software using static analysis

被引:1
作者
Wang, Junyong [1 ]
Baker, Thar [2 ]
Zhou, Yingnan [1 ]
Awad, Ali Ismail [3 ,4 ,5 ]
Wang, Bin [6 ]
Zhu, Yongsheng [7 ,8 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp Informat & Technol, 3 Shangyuan Village, Beijing NO3, Peoples R China
[2] Univ Sharjah, Coll Comp & Informat, Dept Comp Sci, Sharjah, U Arab Emirates
[3] United Arab Emirates Univ, Coll Informat Technol, POB 17551, Al Ain, U Arab Emirates
[4] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
[5] Univ Plymouth, Ctr Secur Communicat & Network Res, Plymouth PL4 8AA, Devon, England
[6] Zhejiang Key Lab Multidimens Percept Technol Appl, Hangzhou, Peoples R China
[7] Beijing Jiaotong Univ, Sch Elect Informat Engn, Beijing, Peoples R China
[8] China Acad Railway Sci Corp Ltd, Inst Comp Technol, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Software security; Configuration error; Configuration option; Option read point; Program analysis; Static analysis; MALAPPS; APPS;
D O I
10.1016/j.jksuci.2022.10.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Configuration errors are some of the main reasons for software failures. Some configuration options may even negatively impact the software's security, so that if a user sets the options inappropriately, there may be a huge security risk for the software. Recent studies have proposed mapping option read points to configuration options as the first step in alleviating the occurrence of configuration errors. Sadly, most available techniques use humans, and the rest require additional input, like an operation manual. Unfortunately, not all software is standardized and friendly. We propose a technique based on program and static analysis that can automatically map all the configuration options of a program just by reading the source code. Our evaluation shows that this technique achieves 88.6%, 97.7%, 94.6%, 94.8%, and 92.6% success rates with the Hadoop modules Common, Hadoop distributed file system, MapReduce, and YARN, and also PX4, when extracting configuration options. We found 53 configuration options in PX4 that were not documented and submitted these to the developers. Compared with published work, our technique is more effective in mapping options, and it may lay the foundation for subsequent research on software configuration security.
引用
收藏
页码:10044 / 10055
页数:12
相关论文
共 39 条
[1]  
Andrzejak A, 2018, IEEE INT SYMP SOFTW, P224, DOI [10.1109/ISSREW.2018.00010, 10.1109/1SSREW.2018.00010]
[2]  
[Anonymous], 2003, 4 USENIX S INT TECHN
[3]  
[Anonymous], ?About us"
[4]  
Apache Software Foundation, Hadoop
[5]   Users Beware: Preference Inconsistencies Ahead [J].
Behrang, Farnaz ;
Cohen, Myra B. ;
Orso, Alessandro .
2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, :295-306
[6]  
businessinsider, Business Insider
[7]  
Chen Wei, 2015, Journal of Software, V26, P1285, DOI 10.13328/j.cnki.jos.004823
[8]   ORPLocator: Identifying Read Points of Configuration Options via Static Analysis [J].
Dong, Zhen ;
Andrzejak, Artur ;
Lo, David ;
Costa, Diego .
2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, :185-195
[9]   DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis [J].
Fan, Ming ;
Liu, Jun ;
Wang, Wei ;
Li, Haifei ;
Tian, Zhenzhou ;
Liu, Ting .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) :1772-1785
[10]   ConfProf: White-Box Performance Profiling of Configuration Options [J].
Han, Xue ;
Yu, Tingting ;
Pradel, Michael .
PROCEEDINGS OF THE ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE '21), 2021, :1-8