Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java']Java

被引:2
|
作者
Li, Kaixuan [1 ]
Chen, Sen [2 ]
Fan, Lingling [3 ]
Feng, Ruitao [4 ]
Liu, Han [1 ]
Liu, Chengwei [5 ]
Liu, Yang [5 ]
Chen, Yixiang [1 ]
机构
[1] East China Normal Univ, Shanghai, Peoples R China
[2] Tianjin Univ, Coll Intelligence & Comp, Tianjin, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin, Peoples R China
[4] Univ New South Wales, Sydney, NSW, Australia
[5] Nanyang Technol Univ, Singapore, Singapore
基金
新加坡国家研究基金会; 国家重点研发计划;
关键词
Static application security testing; Benchmarks; Empirical study; DEFECTS;
D O I
10.1145/3611643.3616262
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Static application security testing (SAST) takes a significant role in the software development life cycle (SDLC). However, it is challenging to comprehensively evaluate the effectiveness of SAST tools to determine which is the better one for detecting vulnerabilities. In this paper, based on well-defined criteria, we first selected seven free or open-source SAST tools from 161 existing tools for further evaluation. Owing to the synthetic and newly-constructed realworld benchmarks, we evaluated and compared these SAST tools from different and comprehensive perspectives such as effectiveness, consistency, and performance. While SAST tools perform well on synthetic benchmarks, our results indicate that only 12.7% of real-world vulnerabilities can be detected by the selected tools. Even combining the detection capability of all tools, most vulnerabilities (70.9%) remain undetected, especially those beyond resource control and insufficiently neutralized input/output vulnerabilities. The fact is that although they have already built the corresponding detecting rules and integrated them into their capabilities, the detection result still did not meet the expectations. All useful findings unveiled in our comprehensive study indeed help to provide guidance on tool development, improvement, evaluation, and selection for developers, researchers, and potential users.
引用
收藏
页码:921 / 933
页数:13
相关论文
共 50 条
  • [41] Java']Java and JDBC: Tools supporting data-centric business application development
    Hamilton, J
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL SYMPOSIUM ON ASSESSMENT OF SOFTWARE TOOLS, 1996, : 121 - 138
  • [42] Based on a JAVA']JAVA language embryology remote testing system for the development and application
    Chen Zhi Wei
    Wang Li Hong
    Xu Hui Yu
    [J]. COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1470 - 1472
  • [43] Using CHARTER tools to develop a Safety-Critical Avionics Application in Java']Java
    Wedzinga, G.
    Wiegmink, K.
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL WORKSHOP ON JAVA TECHNOLOGIES FOR REAL-TIME AND EMBEDDED SYSTEMS, 2012, : 125 - 134
  • [44] Model-based Static Source Code Analysis of Java']Java Programs with Applications to Android Security
    Lu, Zheng
    Mukhopadhyay, Supratik
    [J]. 2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 322 - 327
  • [45] Trials and tribulations of testing a Java']Java/C plus plus hybrid application
    Whitchurch, S
    [J]. EIGHTEENTH ANNUAL PACIFIC NORTHWEST SOFTWARE QUALITY CONFERENCE, PROCEEDINGS, 2000, : 393 - 402
  • [46] Evaluation of Application Level Communications Protocols for Networked Java']Java Applications
    Pendergast, Mark O.
    [J]. IMCIC 2010: INTERNATIONAL MULTI-CONFERENCE ON COMPLEXITY, INFORMATICS AND CYBERNETICS, VOL II, 2010, : 264 - 269
  • [47] Survey on test data generation tools An evaluation of white- and gray-box testing tools for C#, C++, Eiffel, and Java']Java
    Galler, Stefan J.
    Aichernig, Bernhard K.
    [J]. INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2014, 16 (06) : 727 - 751
  • [48] Security Evaluation of J2ME CLDC Embedded Java']Java Platform
    Debbabi, Mourad
    Saleh, Mohamed
    Talhi, Chamseddine
    Zhioua, Sami
    [J]. JOURNAL OF OBJECT TECHNOLOGY, 2006, 5 (02): : 125 - 154
  • [49] Systematic Comparison of Six Open-source Java']Java Call Graph Construction Tools
    Jasz, Judit
    Siket, Istvan
    Pengo, Edit
    Sagodi, Zoltan
    Ferenc, Rudolf
    [J]. ICSOFT: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2019, : 117 - 128
  • [50] Dataset of Functionally Equivalent Java']Java Methods and Its Application to Evaluating Clone Detection Tools
    Higo, Yoshiki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2024, E107 (06) : 751 - 760