作者: Omer Tripp , Marco Pistoia , Stephen J. Fink , Manu Sridharan , Omri Weisman
关键词:
摘要: Taint analysis, a form of information-flow establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. analysis can detect many common vulnerabilities in Web applications, so has attracted much attention both the research community industry. However, most static taint-analysis tools do not address critical requirements for an industrial-strength tool. Specifically, tool must scale to large industrial model essential Web-application code artifacts, generate consumable reports wide range attack vectors.We have designed implemented Analysis Java (TAJ) that meets industry-level applications. TAJ analyze applications virtually any size, as it employs set techniques produce useful answers given limited time space. addresses variety vectors, with handle reflective calls, through containers, nested taint, issues generating reports. This paper provides description algorithms comprising TAJ, evaluates against production-level benchmarks, compares alternative solutions.