作者: V. Benjamin Livshits , Monica S. Lam
DOI:
关键词:
摘要: This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These stem from unchecked input, which is widely recognized the most common source of security in Web applications. We propose approach based on scalable precise points-to analysis. In our system, user-provided specifications are automatically translated into analyzers. Our finds all matching specification statically analyzed code. Results presented to user assessment an auditing interface integrated within Eclipse, popular Java development environment. Our found 29 nine large, open-source applications, with two residing widely-used libraries. fact, but one benchmark suite had at least vulnerability. Context sensitivity, combined improved object naming, proved instrumental keeping number false positives low. yielded very few experiments: only benchmarks suffered alarms.