首页 > 最新文献

ACM Workshop on Programming Languages and Analysis for Security最新文献

英文 中文
Restricted delegation and revocation in language-based security: (position paper) 基于语言的安全方面的限制授权和撤销:(立场文件)
Pub Date : 2010-06-10 DOI: 10.1145/1814217.1814222
Doaa Hassan, M. Mousavi, M. Reniers
In this paper, we introduce a notion of restricted revocable delegation and study its consequences in language-based security. In particular, we add this notion by means of delegate and revoke commands to a simple imperative programming language. We then define an operational semantics for our programming language, in the Natural Semantics style of Gilles Kahn. We briefly discuss our initial ideas about the security properties of the semantics, which are extensions of existing variations of the renowned non-interference property, e.g., in the context of delimited information release.
本文引入了受限可撤销委托的概念,并研究了其在基于语言的安全中的影响。特别是,我们通过委托和撤销命令将这个概念添加到一个简单的命令式编程语言中。然后,我们用Gilles Kahn的自然语义风格为我们的编程语言定义了一个操作语义。我们简要地讨论了我们关于语义安全属性的初步想法,它是著名的不干扰属性的现有变体的扩展,例如,在分隔信息发布的背景下。
{"title":"Restricted delegation and revocation in language-based security: (position paper)","authors":"Doaa Hassan, M. Mousavi, M. Reniers","doi":"10.1145/1814217.1814222","DOIUrl":"https://doi.org/10.1145/1814217.1814222","url":null,"abstract":"In this paper, we introduce a notion of restricted revocable delegation and study its consequences in language-based security. In particular, we add this notion by means of delegate and revoke commands to a simple imperative programming language. We then define an operational semantics for our programming language, in the Natural Semantics style of Gilles Kahn. We briefly discuss our initial ideas about the security properties of the semantics, which are extensions of existing variations of the renowned non-interference property, e.g., in the context of delimited information release.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134570528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The case for JavaScript transactions: position paper JavaScript事务的案例:立场文件
Pub Date : 2010-06-10 DOI: 10.1145/1814217.1814223
Mohan Dhawan, Chung-chieh Shan, V. Ganapathy
Modern Web applications combine and use JavaScript-based content from multiple untrusted sources. Without proper isolation, such content can compromise the security and privacy of these Web applications. Prior techniques for isolating untrusted JavaScript code do so by restricting dangerous constructs and inlining security checks into third-party code. This paper presents a new approach that extends the JavaScript language to make isolation a language-level primitive. We propose to extend the language using a new transaction construct that allows a Web application to speculatively execute untrusted code and isolate its changes. The Web application can then inspect these speculative actions and commit them only if they comply with the application's security policies. We discuss use-cases that can benefit from JavaScript support for transactions, present a formalization of JavaScript transactions and conclude with implementation considerations.
现代Web应用程序组合并使用来自多个不受信任来源的基于javascript的内容。如果没有适当的隔离,这些内容可能会危及这些Web应用程序的安全性和隐私性。以前隔离不受信任JavaScript代码的技术是通过限制危险构造和将安全检查内联到第三方代码中来实现的。本文提出了一种扩展JavaScript语言的新方法,使隔离成为一种语言级原语。我们建议使用一种新的事务构造来扩展该语言,该构造允许Web应用程序推测地执行不受信任的代码并隔离其更改。然后,Web应用程序可以检查这些推测性操作,并仅在它们符合应用程序的安全策略时才提交它们。我们讨论了可以从JavaScript对事务的支持中受益的用例,呈现了JavaScript事务的形式化,并以实现考虑事项结束。
{"title":"The case for JavaScript transactions: position paper","authors":"Mohan Dhawan, Chung-chieh Shan, V. Ganapathy","doi":"10.1145/1814217.1814223","DOIUrl":"https://doi.org/10.1145/1814217.1814223","url":null,"abstract":"Modern Web applications combine and use JavaScript-based content from multiple untrusted sources. Without proper isolation, such content can compromise the security and privacy of these Web applications. Prior techniques for isolating untrusted JavaScript code do so by restricting dangerous constructs and inlining security checks into third-party code.\u0000 This paper presents a new approach that extends the JavaScript language to make isolation a language-level primitive. We propose to extend the language using a new transaction construct that allows a Web application to speculatively execute untrusted code and isolate its changes. The Web application can then inspect these speculative actions and commit them only if they comply with the application's security policies. We discuss use-cases that can benefit from JavaScript support for transactions, present a formalization of JavaScript transactions and conclude with implementation considerations.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127932711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Class properties for security review in an object-capability subset of Java: (short paper) 在Java的对象能力子集中用于安全审查的类属性:(短文)
Pub Date : 2010-06-10 DOI: 10.1145/1814217.1814224
A. Mettler, D. Wagner
Joe-E is a subset of the Java language, with additional restrictions enforced by a static source-code verifier. We explore several semantic properties of classes relating to immutability and object identity that can be declared by the programmer and are checked by the Joe-E verifier. We present the simple, modular analyses we use to verify these properties and describe how they are useful in performing security reviews of applications.
Joe-E是Java语言的一个子集,具有由静态源代码验证器强制执行的附加限制。我们探讨了与类的不变性和对象标识相关的几个语义属性,这些属性可以由程序员声明并由Joe-E验证器检查。我们介绍了用于验证这些属性的简单模块化分析,并描述了它们在执行应用程序安全性审查时的用处。
{"title":"Class properties for security review in an object-capability subset of Java: (short paper)","authors":"A. Mettler, D. Wagner","doi":"10.1145/1814217.1814224","DOIUrl":"https://doi.org/10.1145/1814217.1814224","url":null,"abstract":"Joe-E is a subset of the Java language, with additional restrictions enforced by a static source-code verifier. We explore several semantic properties of classes relating to immutability and object identity that can be declared by the programmer and are checked by the Joe-E verifier. We present the simple, modular analyses we use to verify these properties and describe how they are useful in performing security reviews of applications.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127980571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Attack model for verification of interval security properties for smart card C codes 验证智能卡C码间隔安全属性的攻击模型
Pub Date : 2010-06-10 DOI: 10.1145/1814217.1814219
P. Berthomé, K. Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande
Smart card programs are subject to physical attacks that disturb the execution of the embedded code. These attacks enable attackers to steal valuable information or to force a malicious behavior upon the attacked code. This paper proposes a methodology to check interval security properties on smart card source codes. The goal is to identify critical attacks that violate these security properties. The verification takes place at source-level and considers all possible attacks thanks to a proposed source-level model of physical attacks. The paper defines an equivalence relation between attacks and shows that a code can be divided into areas where attacks are equivalent. Thus, verifying an interval security property considering all the possible attacks requires to verify as many codes as the number of equivalence classes. This paper provides a reduction algorithm to define the classes i.e. the minimal number of attacked codes that covers all possible attacks. The paper also proposes a solution to make the property verification possible for large codes or codes having unknown source parts.
智能卡程序会受到干扰嵌入式代码执行的物理攻击。这些攻击使攻击者能够窃取有价值的信息或对被攻击的代码强制执行恶意行为。本文提出了一种检测智能卡源代码间隔安全特性的方法。目标是识别违反这些安全属性的关键攻击。验证在源级进行,并考虑所有可能的攻击,这要归功于提议的源级物理攻击模型。本文定义了攻击之间的等价关系,并证明了代码可以划分为攻击等价的区域。因此,考虑到所有可能的攻击,验证间隔安全属性需要验证与等价类数量一样多的代码。本文提供了一种约简算法来定义类,即覆盖所有可能攻击的最小受攻击代码数量。本文还提出了一种解决方案,使大型代码或具有未知源部分的代码的属性验证成为可能。
{"title":"Attack model for verification of interval security properties for smart card C codes","authors":"P. Berthomé, K. Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande","doi":"10.1145/1814217.1814219","DOIUrl":"https://doi.org/10.1145/1814217.1814219","url":null,"abstract":"Smart card programs are subject to physical attacks that disturb the execution of the embedded code. These attacks enable attackers to steal valuable information or to force a malicious behavior upon the attacked code. This paper proposes a methodology to check interval security properties on smart card source codes. The goal is to identify critical attacks that violate these security properties. The verification takes place at source-level and considers all possible attacks thanks to a proposed source-level model of physical attacks. The paper defines an equivalence relation between attacks and shows that a code can be divided into areas where attacks are equivalent. Thus, verifying an interval security property considering all the possible attacks requires to verify as many codes as the number of equivalence classes. This paper provides a reduction algorithm to define the classes i.e. the minimal number of attacked codes that covers all possible attacks. The paper also proposes a solution to make the property verification possible for large codes or codes having unknown source parts.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A weakest precondition approach to active attacks analysis 主动攻击分析的最弱前提方法
Pub Date : 2009-06-15 DOI: 10.1145/1554339.1554348
Musard Balliu, Isabella Mastroeni
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in language-based security. The notion of robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is not able to disclose more private information than a passive attacker, who merely observes public data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of the weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from the public output towards the private input. The choice of the semantics lets us distinguish between different attacks models. In this paper, we also introduce relative robustness that is a relaxed notion of robustness for restricted classes of attacks.
信息流控制可用于保护数据机密性和数据完整性。在不受信任的环境中运行的程序的安全程度的认证仍然是基于语言的安全性中的一个开放问题。健壮性的概念断言,可以修改某些固定点(漏洞)中的程序代码的主动攻击者不能比仅仅观察公共数据的被动攻击者泄露更多的私有信息。在本文中,我们扩展了最近提出的一种仅在被动攻击者存在时检查解密不干扰的方法,以便通过最弱前提语义来检查鲁棒性。特别是,该语义模拟了攻击者可以执行的分析类型,即从公共输出到私有输入。语义的选择使我们能够区分不同的攻击模型。在本文中,我们还引入了相对鲁棒性,这是对受限攻击类鲁棒性的一种宽松概念。
{"title":"A weakest precondition approach to active attacks analysis","authors":"Musard Balliu, Isabella Mastroeni","doi":"10.1145/1554339.1554348","DOIUrl":"https://doi.org/10.1145/1554339.1554348","url":null,"abstract":"Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in language-based security. The notion of robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is not able to disclose more private information than a passive attacker, who merely observes public data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of the weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from the public output towards the private input. The choice of the semantics lets us distinguish between different attacks models. In this paper, we also introduce relative robustness that is a relaxed notion of robustness for restricted classes of attacks.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"40 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131500480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Securing nonintrusive web encryption through information flow 通过信息流保护非侵入式web加密
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375712
Lantian Zheng, A. Myers
This paper proposes a nonintrusive encryption mechanism for protecting data confidentiality on the Web. The core idea is to encrypt confidential data before sending it to untrusted sites and use keystores on the Web to manage encryption keys without intervention from users. A formal language-based information flow model is used to prove the soundness of the mechanism.
本文提出了一种非侵入式加密机制来保护Web上的数据机密性。其核心思想是在将机密数据发送到不受信任的站点之前对其进行加密,并使用Web上的密钥存储库来管理加密密钥,而无需用户的干预。采用形式化的基于语言的信息流模型验证了该机制的有效性。
{"title":"Securing nonintrusive web encryption through information flow","authors":"Lantian Zheng, A. Myers","doi":"10.1145/1375696.1375712","DOIUrl":"https://doi.org/10.1145/1375696.1375712","url":null,"abstract":"This paper proposes a nonintrusive encryption mechanism for protecting data confidentiality on the Web. The core idea is to encrypt confidential data before sending it to untrusted sites and use keystores on the Web to manage encryption keys without intervention from users. A formal language-based information flow model is used to prove the soundness of the mechanism.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127377337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Lagrange multipliers and maximum information leakage in different observational models 不同观测模型的拉格朗日乘数与最大信息泄漏
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375713
P. Malacaria, Han Chen
This paper explores two fundamental issues in Language based security. The first is to provide a quantitative definition of information leakage valid in several attacker's models. We consider attackers with different capabilities; the strongest one is able to observe the value of the low variables at each step during the execution of a program; the weakest one can only observe a single low value at some stage of the execution. We will provide a uniform definition of leakage, based on Information Theory, that will allow us to formalize and prove some intuitive relationships between the amount leaked by the same program in different models. The second issue is Channel Capacity, which in security terms amounts to answering the questions: given a program and an observational model, what is the maximum amount that the program can leak? And which input distribution causes the maximum leakage? To answer those questions we will introduce techniques from constrained non-linear optimization, mainly Lagrange multipliers and we will show how they provide a workable solution in all observational models considered. In the simplest setting, i.e. under minimal constraints, we will show that channel capacity is achieved by any input distribution which induces a uniform distribution on the observables.
本文探讨了基于语言的安全中的两个基本问题。首先,给出了在几种攻击者模型中有效的信息泄漏的定量定义。我们考虑具有不同能力的攻击者;最强的是能够在程序执行的每一步观察低变量的值;最弱的人只能在执行的某个阶段观察到一个低值。我们将根据信息论提供泄漏的统一定义,这将使我们能够形式化并证明同一程序在不同模型中的泄漏量之间的一些直观关系。第二个问题是通道容量(Channel Capacity),从安全的角度来看,它相当于回答以下问题:给定一个程序和一个观察模型,该程序可以泄漏的最大数量是多少?哪种输入分布导致最大的泄漏?为了回答这些问题,我们将介绍约束非线性优化技术,主要是拉格朗日乘数,我们将展示它们如何在所有考虑的观测模型中提供可行的解决方案。在最简单的设置中,即在最小的约束下,我们将证明信道容量是通过任何输入分布来实现的,该输入分布在可观测值上引起均匀分布。
{"title":"Lagrange multipliers and maximum information leakage in different observational models","authors":"P. Malacaria, Han Chen","doi":"10.1145/1375696.1375713","DOIUrl":"https://doi.org/10.1145/1375696.1375713","url":null,"abstract":"This paper explores two fundamental issues in Language based security. The first is to provide a quantitative definition of information leakage valid in several attacker's models. We consider attackers with different capabilities; the strongest one is able to observe the value of the low variables at each step during the execution of a program; the weakest one can only observe a single low value at some stage of the execution.\u0000 We will provide a uniform definition of leakage, based on Information Theory, that will allow us to formalize and prove some intuitive relationships between the amount leaked by the same program in different models.\u0000 The second issue is Channel Capacity, which in security terms amounts to answering the questions: given a program and an observational model, what is the maximum amount that the program can leak? And which input distribution causes the maximum leakage?\u0000 To answer those questions we will introduce techniques from constrained non-linear optimization, mainly Lagrange multipliers and we will show how they provide a workable solution in all observational models considered. In the simplest setting, i.e. under minimal constraints, we will show that channel capacity is achieved by any input distribution which induces a uniform distribution on the observables.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131778570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
A security domain model to assess software for exploitable covert channels 一个安全领域模型,用于评估可利用隐蔽通道的软件
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375703
Alan B. Shaffer, M. Auguston, C. Irvine, T. Levin
Covert channels can result in unauthorized information flows when exploited by malicious software. To address this problem, we present a precise, formal definition for covert channels, which relies on control flow dependency tracing through program execution, and extends Dennings' and subsequent classic work in secure information flow [9][40][30]. A formal security Domain Model (DM) for conducting static analysis of programs to identify covert channel vulnerabilities is described. The DM is comprised of an Invariant Model, which defines the generic concepts of program state, information flow, and covert channel rules; and an Implementation Model, which specifies the behavior of a target program. The DM is compiled from a representation of the program, written in a domain-specific Implementation Modeling Language (IML), and a specification of the security policy written in Alloy. The Alloy Analyzer tool is used to perform static analysis of the DM to automatically detect potential covert channel vulnerabilities and security policy violations in the target program.
当被恶意软件利用时,隐蔽通道可能导致未经授权的信息流。为了解决这个问题,我们提出了隐蔽通道的一个精确、正式的定义,它依赖于通过程序执行的控制流依赖跟踪,并扩展了Dennings和随后在安全信息流[9][40][30]方面的经典工作。描述了一个正式的安全域模型(DM),用于对程序进行静态分析以识别隐蔽通道漏洞。DM由一个不变模型组成,该模型定义了程序状态、信息流和隐蔽通道规则的一般概念;以及实现模型,它指定目标程序的行为。DM由程序的表示(用特定于领域的实现建模语言(IML)编写)和用Alloy编写的安全策略规范编译而成。Alloy Analyzer工具用于执行DM的静态分析,以自动检测目标程序中潜在的隐蔽通道漏洞和安全策略违规。
{"title":"A security domain model to assess software for exploitable covert channels","authors":"Alan B. Shaffer, M. Auguston, C. Irvine, T. Levin","doi":"10.1145/1375696.1375703","DOIUrl":"https://doi.org/10.1145/1375696.1375703","url":null,"abstract":"Covert channels can result in unauthorized information flows when exploited by malicious software. To address this problem, we present a precise, formal definition for covert channels, which relies on control flow dependency tracing through program execution, and extends Dennings' and subsequent classic work in secure information flow [9][40][30]. A formal security Domain Model (DM) for conducting static analysis of programs to identify covert channel vulnerabilities is described. The DM is comprised of an Invariant Model, which defines the generic concepts of program state, information flow, and covert channel rules; and an Implementation Model, which specifies the behavior of a target program. The DM is compiled from a representation of the program, written in a domain-specific Implementation Modeling Language (IML), and a specification of the security policy written in Alloy. The Alloy Analyzer tool is used to perform static analysis of the DM to automatically detect potential covert channel vulnerabilities and security policy violations in the target program.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129131284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Evaluating the cost reduction of static code analysis for software security 评估静态代码分析对软件安全的成本降低
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375707
D. Baca, B. Carlsson, L. Lundberg
Automated static code analysis is an efficient technique to increase the quality of software during early development. This paper presents a case study in which mature software with known vulnerabilities is subjected to a static analysis tool. The value of the tool is estimated based on reported failures from customers. An average of 17% cost savings would have been possible if the static analysis tool was used. The tool also had a 30% success rate in detecting known vulnerabilities and at the same time found 59 new vulnerabilities in the three examined products.
自动化静态代码分析是一种在早期开发阶段提高软件质量的有效技术。本文介绍了一个用静态分析工具分析具有已知漏洞的成熟软件的案例研究。工具的价值是根据客户报告的故障来估计的。如果使用静态分析工具,平均可以节省17%的成本。该工具在检测已知漏洞方面也有30%的成功率,同时在三个被检查的产品中发现了59个新漏洞。
{"title":"Evaluating the cost reduction of static code analysis for software security","authors":"D. Baca, B. Carlsson, L. Lundberg","doi":"10.1145/1375696.1375707","DOIUrl":"https://doi.org/10.1145/1375696.1375707","url":null,"abstract":"Automated static code analysis is an efficient technique to increase the quality of software during early development. This paper presents a case study in which mature software with known vulnerabilities is subjected to a static analysis tool. The value of the tool is estimated based on reported failures from customers. An average of 17% cost savings would have been possible if the static analysis tool was used. The tool also had a 30% success rate in detecting known vulnerabilities and at the same time found 59 new vulnerabilities in the three examined products.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
A compiler-based infrastructure for software-protection 用于软件保护的基于编译器的基础结构
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375702
C. Liem, Y. Gu, H. Johnson
Not long after the introduction of stored-program computing machines, the first high-level language compilers appeared. The need for automatically and efficiently mapping abstract concepts from high-level languages onto low-level assembly languages has been recognized ever since. A compiler has a unique ability to gather and analyze large amounts of data in a manner that would be an unwieldy manual endeavor. It is this property that makes known compiler techniques and technology ideally suited for the purposes of software protection against reverse engineering and tampering attacks. In this paper, we present a code transformation infrastructure combined with build-time security techniques that are used to integrate protection into otherwise vulnerable machine programs. We show the applicability of known compiler techniques such as aliasanalysis, whole program analysis, data-flow analysis, and control-flow analysis and how these capabilities provide the basis for program transformations that provide comprehensive software protection. These methods are incorporated in an extensible framework allowing efficient development of new code transformations, as part of a larger suite of security tools for the creation of robust applications. We describe a number of successful applications of these tools.
存储程序计算机问世后不久,第一个高级语言编译器出现了。从那时起,人们就认识到需要自动有效地将抽象概念从高级语言映射到低级汇编语言。编译器有一种独特的能力,可以收集和分析大量的数据,这是一种笨拙的手工工作。正是这种特性使得已知的编译器技术和技术非常适合于防止逆向工程和篡改攻击的软件保护目的。在本文中,我们提出了一个代码转换基础结构,结合了构建时安全技术,用于将保护集成到其他易受攻击的机器程序中。我们展示了已知编译器技术的适用性,例如别名分析、整个程序分析、数据流分析和控制流分析,以及这些能力如何为提供全面软件保护的程序转换提供基础。这些方法被合并到一个可扩展的框架中,允许有效地开发新的代码转换,作为创建健壮应用程序的更大的安全工具套件的一部分。我们描述了这些工具的一些成功应用。
{"title":"A compiler-based infrastructure for software-protection","authors":"C. Liem, Y. Gu, H. Johnson","doi":"10.1145/1375696.1375702","DOIUrl":"https://doi.org/10.1145/1375696.1375702","url":null,"abstract":"Not long after the introduction of stored-program computing machines, the first high-level language compilers appeared. The need for automatically and efficiently mapping abstract concepts from high-level languages onto low-level assembly languages has been recognized ever since. A compiler has a unique ability to gather and analyze large amounts of data in a manner that would be an unwieldy manual endeavor. It is this property that makes known compiler techniques and technology ideally suited for the purposes of software protection against reverse engineering and tampering attacks. In this paper, we present a code transformation infrastructure combined with build-time security techniques that are used to integrate protection into otherwise vulnerable machine programs. We show the applicability of known compiler techniques such as aliasanalysis, whole program analysis, data-flow analysis, and control-flow analysis and how these capabilities provide the basis for program transformations that provide comprehensive software protection. These methods are incorporated in an extensible framework allowing efficient development of new code transformations, as part of a larger suite of security tools for the creation of robust applications. We describe a number of successful applications of these tools.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
ACM Workshop on Programming Languages and Analysis for Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1