Efficient vulnerability detection based on an optimized rule-checking static analysis technique

被引:0
|
作者
Deng Chen
Yan-duo Zhang
Wei Wei
Shi-xun Wang
Ru-bing Huang
Xiao-lin Li
Bin-bin Qu
Sheng Jiang
机构
[1] Wuhan Institute of Technology,Hubei Provincial Key Laboratory of Intelligent Robot
[2] Wuhan Institute of Technology,Industrial Robot Engineering Center
[3] Henan Normal University,School of Computer and Information Engineering
[4] Jiangsu University,School of Computer Science and Telecommunication Engineering
[5] Huazhong University of Science and Technology,School of Computer Science and Technology
关键词
Rule-based static analysis; Software quality; Software validation; Performance improvement; TP311;
D O I
暂无
中图分类号
学科分类号
摘要
Static analysis is an efficient approach for software assurance. It is indicated that its most effective usage is to perform analysis in an interactive way through the software development process, which has a high performance requirement. This paper concentrates on rule-based static analysis tools and proposes an optimized rule-checking algorithm. Our technique improves the performance of static analysis tools by filtering vulnerability rules in terms of characteristic objects before checking source files. Since a source file always contains vulnerabilities of a small part of rules rather than all, our approach may achieve better performance. To investigate our technique’s feasibility and effectiveness, we implemented it in an open source static analysis tool called PMD and used it to conduct experiments. Experimental results show that our approach can obtain an average performance promotion of 28.7% compared with the original PMD. While our approach is effective and precise in detecting vulnerabilities, there is no side effect.
引用
收藏
页码:332 / 345
页数:13
相关论文
共 50 条
  • [1] Efficient vulnerability detection based on an optimized rule-checking static analysis technique
    Chen, Deng
    Zhang, Yan-duo
    Wei, Wei
    Wang, Shi-xun
    Huang, Ru-bing
    Li, Xiao-lin
    Qu, Bin-bin
    Jiang, Sheng
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (03) : 332 - 345
  • [2] Efficient vulnerability detection based on an optimized rule-checking static analysis technique
    Deng CHEN
    Yan-duo ZHANG
    Wei WEI
    Shi-xun WANG
    Ru-bing HUANG
    Xiao-lin LI
    Bin-bin QU
    Sheng JIANG
    [J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18 (03) : 332 - 345
  • [3] Priority-based high-speed intelligent rule-checking
    Sachidananda, S
    Shah, M
    Gopalan, S
    Varadarajan, S
    [J]. 8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1382 - U1387
  • [4] Simplified schema queries for supporting BIM-based rule-checking applications
    Solihin, Wawan
    Dimyadi, Johannes
    Lee, Yong-Cheol
    Eastman, Charles
    Amor, Robert
    [J]. AUTOMATION IN CONSTRUCTION, 2020, 117 (117)
  • [5] BIM-based automated rule-checking in the AECO industry: Learning from semiconductor manufacturing
    Solihin, Wawan
    Liu, Ziwen
    Lu, Yujie
    Wei, Lai
    [J]. AUTOMATION IN CONSTRUCTION, 2024, 162
  • [6] A Vulnerability Static Detection Method Based on Flow Analysis
    Zhang, Yiqiang
    Gui, Hui
    [J]. 2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 592 - 595
  • [7] Static vulnerability detection based on class separation☆
    Zhang, Chunyong
    Xin, Yang
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 206
  • [8] Efficient Feature Selection for Static Analysis Vulnerability Prediction
    Filus, Katarzyna
    Boryszko, Pawel
    Domanska, Joanna
    Siavvas, Miltiadis
    Gelenbe, Erol
    [J]. SENSORS, 2021, 21 (04) : 1 - 25
  • [9] Efficient Intrusion Detection Based on Static Analysis and Stack Walks
    Hua, Jingyu
    Li, Mingchu
    Sakurai, Kouichi
    Ren, Yizhi
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 158 - +
  • [10] Rule-based system for vulnerability detection of software
    Cho, Sung-Hoon
    Jang, Chang-Bok
    Lee, Moo-Hun
    Choi, Eui-In
    [J]. Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1630 - 1633