On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study

被引:15
|
作者
Nunes, Paulo [1 ]
Medeiros, Iberia [2 ]
Fonseca, Jose [1 ]
Neves, Nuno [2 ]
Correia, Miguel [3 ]
Vieira, Marco [4 ]
机构
[1] Univ Coimbra, CISUC, UDI, Polytech Inst Guarda, Coimbra, Portugal
[2] Univ Lisbon, Fac Ciencias, LaSIGE, Lisbon, Portugal
[3] Univ Lisbon, Inst Super Tecn, INESC ID, Lisbon, Portugal
[4] Univ Coimbra, CISUC, Coimbra, Portugal
关键词
static analysis; vulnerability detection; XSS; SQLi;
D O I
10.1109/EDCC.2017.16
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Developers frequently rely on free static analysis tools to automatically detect vulnerabilities in the source code of their applications, but it is well-known that the performance of such tools is limited and varies from one software development scenario to another, both in terms of coverage and false positives. Diversity is an obvious direction to take to improve coverage, as different tools usually report distinct vulnerabilities, but this may come with an increase in the number of false alarms. In this paper, we study the problem of combining diverse static analysis tools to detect web vulnerabilities, considering four software development scenarios with different goals and constraints, ranging from low budget to high-end (e.g., business critical) applications. We conducted an experimental campaign with five free static analysis tools to detect vulnerabilities in a workload composed by 134 WordPress plugins. Results clearly show that the best solution depends on the development scenario. Furthermore, in some cases, a single tool performs better than the best combination of tools.
引用
收藏
页码:121 / 128
页数:8
相关论文
共 50 条
  • [31] An empirical assessment of machine learning approaches for triaging reports of static analysis tools
    Sai Yerramreddy
    Austin Mordahl
    Ugur Koc
    Shiyi Wei
    Jeffrey S. Foster
    Marine Carpuat
    Adam A. Porter
    [J]. Empirical Software Engineering, 2023, 28
  • [32] Static analysis of source code security: Assessment of tools against SAMATE tests
    Diaz, Gabriel
    Ramon Bermejo, Juan
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (08) : 1462 - 1476
  • [33] ,uSE: Mutation -based Evaluation of Security -focused Static Analysis Tools for Android
    Ami, Amit Seal
    Kafle, Kaushal
    Nadkarni, Adwait
    Poshyvanyk, Denys
    Moran, Kevin
    [J]. 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), 2021, : 53 - 56
  • [34] Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools
    Pashchenko, Ivan
    Dashevskyi, Stanislav
    Massacci, Fabio
    [J]. 11TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2017), 2017, : 163 - 168
  • [35] An Empirical Study of the Framework Impact on the Security of Java']JavaScript Web Applications
    Peguero, Ksenia
    Zhang, Nan
    Cheng, Xiuzhen
    [J]. COMPANION PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2018 (WWW 2018), 2018, : 753 - 758
  • [36] Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools
    Algaith, Areej
    Nunes, Paulo
    Fonseca, Jose
    Gashi, Ilir
    Vieira, Marco
    [J]. 2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 57 - 64
  • [37] Combining World Wide Web and wireless security
    Claessens, J
    Preneel, B
    Vandewalle, J
    [J]. ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 153 - 171
  • [38] Virtual Static Security Analyzer for Web Applications
    Brinza, Mihail
    Correia, Miguel
    Pereira, Joao
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 840 - 848
  • [39] Static Security Evaluation of an Industrial Web Application
    Welearegai, Gebrehiwet B.
    Schlueter, Max
    Hammer, Christian
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1952 - 1961
  • [40] Static analysis for security
    Chess, B
    McGraw, G
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (06) : 76 - 79