Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java']Java

被引:2
|
作者
Li, Kaixuan [1 ]
Chen, Sen [2 ]
Fan, Lingling [3 ]
Feng, Ruitao [4 ]
Liu, Han [1 ]
Liu, Chengwei [5 ]
Liu, Yang [5 ]
Chen, Yixiang [1 ]
机构
[1] East China Normal Univ, Shanghai, Peoples R China
[2] Tianjin Univ, Coll Intelligence & Comp, Tianjin, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin, Peoples R China
[4] Univ New South Wales, Sydney, NSW, Australia
[5] Nanyang Technol Univ, Singapore, Singapore
基金
新加坡国家研究基金会; 国家重点研发计划;
关键词
Static application security testing; Benchmarks; Empirical study; DEFECTS;
D O I
10.1145/3611643.3616262
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Static application security testing (SAST) takes a significant role in the software development life cycle (SDLC). However, it is challenging to comprehensively evaluate the effectiveness of SAST tools to determine which is the better one for detecting vulnerabilities. In this paper, based on well-defined criteria, we first selected seven free or open-source SAST tools from 161 existing tools for further evaluation. Owing to the synthetic and newly-constructed realworld benchmarks, we evaluated and compared these SAST tools from different and comprehensive perspectives such as effectiveness, consistency, and performance. While SAST tools perform well on synthetic benchmarks, our results indicate that only 12.7% of real-world vulnerabilities can be detected by the selected tools. Even combining the detection capability of all tools, most vulnerabilities (70.9%) remain undetected, especially those beyond resource control and insufficiently neutralized input/output vulnerabilities. The fact is that although they have already built the corresponding detecting rules and integrated them into their capabilities, the detection result still did not meet the expectations. All useful findings unveiled in our comprehensive study indeed help to provide guidance on tool development, improvement, evaluation, and selection for developers, researchers, and potential users.
引用
收藏
页码:921 / 933
页数:13
相关论文
共 50 条
  • [1] Semgrep*: Improving the Limited Performance of Static Application Security Testing (SAST) Tools
    Bennett, Gareth
    Hall, Tracy
    Winter, Emily
    Counsell, Steve
    [J]. PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 614 - 623
  • [2] Experimental Comparison of Automated Mutation Testing Tools for Java']Java
    Rani, Shweta
    Suri, Bharti
    Khatri, Sunil Kumar
    [J]. 2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [3] An Extensive Comparison of Static Application Security Testing Tools
    Esposito, Matteo
    Falaschi, Valentina
    Falessi, Davide
    [J]. PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 69 - 78
  • [4] An Extensive Comparison of Static Application Security Testing Tools
    Esposito, Matteo
    Falaschi, Valentina
    Falessi, Davide
    [J]. arXiv, 2024,
  • [5] Comparison of Static Analysis Tools for Java']Java Using the Juliet Test Suite
    Charest, Thomas
    Rodgers, Nick
    Wu, Yan
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 431 - 438
  • [6] An evaluation of Java']Java application containers according to security requirements
    Herzog, A
    Shahmehri, N
    [J]. Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings, 2005, : 178 - 183
  • [7] Evaluation of Static Vulnerability Detection Tools With Java']Java Cryptographic API Benchmarks
    Afrose, Sharmin
    Xiao, Ya
    Rahaman, Sazzadur
    Miller, Barton P. P.
    Yao, Danfeng
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (02) : 485 - 497
  • [8] Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java']Java Code
    Alqaradaghi, Midya
    Kozsik, Tamas
    [J]. IEEE ACCESS, 2024, 12 : 55824 - 55842
  • [9] Application of Java']Java Security Architecture in Information Security
    Shen Guicheng
    Zheng Xuefeng
    [J]. PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE OF MODELLING AND SIMULATION, VOL III: MODELLING AND SIMULATION IN ELECTRONICS, COMPUTING, AND BIO-MEDICINE, 2008, : 66 - 69
  • [10] A Comparison of Mutation Analysis Tools for Java']Java
    Delahaye, Mickael
    du Bousquet, Lydie
    [J]. 2013 13TH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE (QSIC), 2013, : 187 - 195