An empirical study of security warnings from static application security testing tools

被引:20
|
作者
Aloraini, Bushra [1 ,2 ]
Nagappan, Meiyappan [1 ]
German, Daniel M. [3 ]
Hayashi, Shinpei [4 ]
Higo, Yoshiki [5 ]
机构
[1] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON, Canada
[2] Princess Nora Bint Abdul Rahman Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[3] Univ Victoria, Sch Engn, Victoria, BC, Canada
[4] Tokyo Inst Technol, Sch Comp, Tokyo, Japan
[5] Osaka Univ, Grad Sch Informat Sci & Technol, Suita, Osaka, Japan
关键词
False positives; Security warnings; Software vulnerability; Static application security testing tools;
D O I
10.1016/j.jss.2019.110427
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Open Web Application Security Project (OWASP) defines Static Application Security Testing (SAST) tools as those that can help find security vulnerabilities in the source code or compiled code of software. Such tools detect and classify the vulnerability warnings into one of many types (e.g., input validation and representation). It is well known that these tools produce high numbers of false positive warnings. However, what is not known is if specific types of warnings have a higher predisposition to be false positives or not. Therefore, our goal is to investigate the different types of SAST-produced warnings and their evolution over time to determine if one type of warning is more likely to have false positives than others. To achieve our goal, we carry out a large empirical study where we examine 116 large and popular C++ projects using six different state-of-the-art open source and commercial SAST tools that detect security vulnerabilities. In order to track a piece of code that has been tagged with a warning, we use a new state of the art framework called cregit(+) that traces source code lines across different commits. The results demonstrate the potential of using SAST tools as an assessment tool to measure the quality of a product and the possible risks without manually reviewing the warnings. In addition, this work shows that pattern-matching static analysis technique is a very powerful method when combined with other advanced analysis methods. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] An Extensive Comparison of Static Application Security Testing Tools
    Esposito, Matteo
    Falaschi, Valentina
    Falessi, Davide
    [J]. arXiv, 2024,
  • [2] An Extensive Comparison of Static Application Security Testing Tools
    Esposito, Matteo
    Falaschi, Valentina
    Falessi, Davide
    [J]. PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 69 - 78
  • [3] On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study
    Nunes, Paulo
    Medeiros, Iberia
    Fonseca, Jose
    Neves, Nuno
    Correia, Miguel
    Vieira, Marco
    [J]. 2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017), 2017, : 121 - 128
  • [4] Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java']Java
    Li, Kaixuan
    Chen, Sen
    Fan, Lingling
    Feng, Ruitao
    Liu, Han
    Liu, Chengwei
    Liu, Yang
    Chen, Yixiang
    [J]. PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 921 - 933
  • [5] Constructing Benchmarks for Supporting Explainable Evaluations of Static Application Security Testing Tools
    Hao, Gaojian
    Li, Feng
    Huo, Wei
    Sun, Qing
    Wang, Wei
    Li, Xinhua
    Zou, Wei
    [J]. 2019 13TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2019), 2019, : 65 - 72
  • [6] Semgrep*: Improving the Limited Performance of Static Application Security Testing (SAST) Tools
    Bennett, Gareth
    Hall, Tracy
    Winter, Emily
    Counsell, Steve
    [J]. PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 614 - 623
  • [7] A Case Study on Web Application Security Testing with Tools and Manual Testing
    Dukes, LaShanda
    Yuan, Xiaohong
    Akowuah, Francis
    [J]. 2013 PROCEEDINGS OF IEEE SOUTHEASTCON, 2013,
  • [8] Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting
    Baca, Dejan
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 386 - 390
  • [9] Myths and Facts About Static Application Security Testing Tools: An Action Research at Telenor Digital
    Oyetoyan, Tosin Daniel
    Milosheska, Bisera
    Grini, Mari
    Cruzes, Daniela Soares
    [J]. AGILE PROCESSES IN SOFTWARE ENGINEERING AND EXTREME PROGRAMMING, XP 2018, 2018, 314 : 86 - 103
  • [10] Why Is Static Application Security Testing Hard to Learn?
    Krishnan, Padmanabhan
    Cifuentes, Cristina
    Li, Li
    Bissyande, Tegawende F.
    Klein, Jacques
    [J]. IEEE SECURITY & PRIVACY, 2023, 21 (05) : 68 - 72