US20150220739A1 - Global Variable Security Analysis - Google Patents

Global Variable Security Analysis Download PDF

Info

Publication number
US20150220739A1
US20150220739A1 US14/688,346 US201514688346A US2015220739A1 US 20150220739 A1 US20150220739 A1 US 20150220739A1 US 201514688346 A US201514688346 A US 201514688346A US 2015220739 A1 US2015220739 A1 US 2015220739A1
Authority
US
United States
Prior art keywords
program
selected global
global variables
flow
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/688,346
Inventor
Shay Artzi
Ryan Berg
John Peyton
Marco Pistoia
Manu Sridharan
Takaaki Tateishi
Omer Tripp
Robert Weiner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US14/688,346 priority Critical patent/US20150220739A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PISTOIA, MARCO, SRIDHARAN, MANU, ARTZI, SHAY, TATEISHI, TAKAAKI, WEINER, ROBERT, PEYTON, JOHN, TRIPP, OMER, BERG, RYAN
Publication of US20150220739A1 publication Critical patent/US20150220739A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Definitions

  • This invention relates generally to analysis of code such as source. code, object code, byte code, executable code, and libraries, and, more specifically, relates to static analysis of code for global variable security analysis that can provide selective, scope-sensitive, lifetime-sensitive, and map-key-sensitive global-side-effect analysis.
  • Static analysis of a program constructs a mathematical model of the execution of the program.
  • the program is not actually executed, but is instead analyzed via the mathematical model. That is, the execution of the program is simulated.
  • Static analysis has particular benefits for certain types of programs.
  • Web programs commonly accept untrusted input from users and use the untrusted input in secure transactions, access to SQL (structured query language) databases, or other security-sensitive operations.
  • the untrusted input typically a string
  • the untrusted input should be analyzed and revised if necessary to prevent possible security violations.
  • a Web application might use a user name and password to access an SQL database using a query based on the user name and password. If the user name and password contain certain characters, the query might contain an undesirable, valid SQL instruction that could allow an attacker access to a portion of or the entire database. Removal of the characters prevents this from happening.
  • a runtime analysis of a large Web program may not find every or very many security violations, as during any runtime scenario, all possible untrusted input might not be used. A runtime analysis is therefore unsound. A static analysis will likely find more security violations, as every possible untrusted input can be considered (meaning a static analysis is sound).
  • a method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked.
  • the selected global variables are less than all the global variables in the program.
  • the method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables.
  • use is analyzed of each one of the selected global variables in a corresponding security-Sensitive operation.
  • the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
  • FIG. 1 is an exemplary representation of a software program using a global variable
  • FIG. 2 is a flowchart of an exemplary method for global variable security analysis
  • FIG. 3 is a flowchart of an exemplary method for treating flows through selected global variables as special;
  • FIG. 4 is a flowchart of another exemplary method for treating flows through selected global variables as special;
  • FIG. 5 an exemplary representation of cloning object extractions for a software program using a particular global variable
  • FIG. 6 is a flowchart of a portion of an exemplary method for map-key-sensitive global variable security analysis
  • FIG. 7 is a block diagram of an exemplary system suitable for implementing the instant invention.
  • FIG. 8 is an example of a security report presented in a user interface of a display.
  • Global objects often hold internal data structures, such as maps. Values are stored into such maps depending on some corresponding keys. It is often important for a static analysis to disambiguate flows through such global objects based on the corresponding keys. For example, a taint analysis tracking information flow of data for integrity purposes should be able to distinguish that a tainted flow reached the value corresponding to key “abc” in a session object, and not the value corresponding to key “xyz”. This is important because if a component later reads the value corresponding to key “abc” and uses the value in a security-sensitive computation, then the analysis should flag that as a problem.
  • FIG. 1 is an exemplary representation 110 of a software program 100 using a global variable 120 (“A.g”) of a global object 111 .
  • A.g global variable 120
  • the software program 100 may be, e.g., a complete software program (e.g., a user written portion and a library portion) or parts thereof, and may be in source code, library object code, object code, etc.
  • the “A” represents a global object 111 to which the global variable “A.g” is associated, and the global variable 120 may be any type of field associated with an object, such as a simple instance variable or a complicated data structure. Additionally, the global object 111 may also hold other objects to which the global variable 120 is associated.
  • the global variable 120 in this example, is accessed by the components 130 - 1 through 130 - 4 .
  • the components 130 are servlets in this example, but this is not a limitation on the invention.
  • the servlet 130 - 1 accesses the global variable 120 and sets the value 150 - 1 of the variable to V 1 .
  • the servlet 130 - 4 accesses the global variable 120 and performs a security-sensitive operation 140 with the global variable 120 .
  • the servlet 130 - 3 accesses the global variable 120 and subtracts V 3 from V 1 to create the value 150 - 3 of V 1 -V 3 for the global variable 120 .
  • the servlet 130 - 3 passes this variable to the servlet 130 - 2 , which further modifies the value 150 - 3 by adding V 2 to this value, to create the value 150 - 4 .
  • the value 150 - 4 is then passed to the servlet 130 - 4 for use in the security-sensitive operation 140 .
  • the servlet 130 - 2 accesses the global variable 120 and overwrites the value with value 150 - 5 (V 2 ), which the servlet 130 - 2 then passes to servlet 130 - 4 for use in the security-sensitive operation 140 .
  • the global variable 120 has multiple flows 190 - 1 through 190 - 3 through the program 100 . Each of these flows 190 has the potential to cause a security violation when the corresponding value 150 is used in the security-sensitive operation 140 . Each use of the global variable 120 through the flows 190 should be checked for a security violation and any potential security violation should be reported. It can easily be seen that scaling this example to a very large Web program (for example) able tc, serve hundreds or thousands of transactions can be problematic. The instant invention allows certain selected global variables 120 of interest to be analyzed for security violations.
  • Method 200 begins in block 2 A, when a static analysis model 210 of a program 100 is built that ignores global variable flows. That is, the static analysis model 210 of the program 100 only tracks local flows of local variables, and ignores global flows of global variables for scalability reasons.
  • Local flows are flows of local variables within components of the program and global flows are flows of global variables between components of the program.
  • a local variable is a variable that is given local scope; such a variable is accessible only from the function or block in which it is declared.
  • a global variable is a variable that is accessible in every scope.
  • a variable is global if it retains its value after the function or program which uses the variable completes executing.
  • a variable is local if it does not retain its value after the function or program which uses the variable completes executing.
  • block 2 F the static analysis of the program 100 is begun, which includes a simulated execution of the program 100 .
  • block 2 G global variable flow 190 is tracked through the program 100 .
  • global variables are passed in method calls, and this passing is used to track the global variable flows 190 . Additional examples of block 2 G are described below.
  • static analysis may be performed by a WALA (T. J. Watson Libraries for Analysis) static analysis tool, although other tools may also be used.
  • a global variable 120 is used in a security-sensitive operation.
  • Security-sensitive operations are known a priori. They are configured up front and they are known as “sinks”.
  • the analysis here scans all the methods in the program until it finds sinks. For every sink, the analysis detects whether a given global variable is used.
  • indicia 220 of the potential security violations are written to a file 215 .
  • the list 230 of indicia 210 would then be sent, e.g., to a display or a network as indicia 220 .
  • the analysis can be made scope-sensitive by cloning object abstractions of objects corresponding to a selected global variable: one object abstraction clone should be created per every scope.
  • the scope is known a priori based on analysis configuration.
  • the scope can be a set of servlets. This means that the variable is global with respect to those servlets only (the variable can be read and written by any of those servlets), whereas that variable is not visible from other programs.
  • Two clones of the same object should be treated in isolation so flows through different clones of the same object are not mixed and cannot contaminate each other.
  • FIG. 4 another exemplary Method for treating flows 190 through selected global variables as special (see block 2 C of FIG. 2 ) is shown.
  • block 4 A object abstractions of an object having a selected global variable is cloned per scope. This is explained in more detail below in reference to FIG. 5 .
  • block 4 B the clones are treated in isolation, so flows 190 through different clones of the same object are not mixed and cannot contaminate each other.
  • cloning such as in block 4 A, is merely one exemplary embodiment.
  • the same representation of the global variable may be reused for different scopes and analysis data for the global variable would be reset between (e.g., prior to) analyzing the different scopes.
  • FIG. 5 shows an exemplary representation of cloning object extractions for a software program using a particular global variable.
  • object 510 e.g., “A”
  • global variable 511 e.g., “A.g”.
  • the global variable 511 has (or is affected by) flows 530 - 1 through 530 - 6 to servlets 515 - 1 to 515 - 6 , respectively.
  • the global variable 511 is associated with a total (e.g., global) scope 580 .
  • the object 510 is abstracted into objects 512 - 1 and 512 - 2 , each of which has a corresponding global variable 513 - 1 and 513 - 2 .
  • the object 510 is abstracted based on the corresponding scope 560 - 1 and 560 - 2 .
  • the global variable 513 - 1 has (or is affected by) flows 535 - 1 through 535 - 3 to servlets 515 - 1 to 515 - 3 , respectively.
  • the global variable 513 - 2 has (or is affected by) flows 540 - 1 through 540 - 3 to servlets 515 - 4 to 515 - 6 , respectively. It is noted that flows 530 - 1 through 530 - 3 should be equivalent to flows 535 - 1 through 535 - 3 , and flows 530 - 4 through 530 - 6 should be equivalent to flows 540 - 1 through 540 - 3 .
  • Block 4 B is applied to FIG. 5 by treating each of the clones 512 in isolation so that flows 535 are not mixed with flows 540 .
  • the flows 535 , 545 are handled per clone 512 - 1 , 512 - 2 , respectively.
  • String analysis is a family of static analysis techniques whose purpose is to over-approximate the grammar of the language of all the values that a string variable can have at run time.
  • string analysis can be applied to the keys of any map object held by a global object whenever that map object participates in information-flow exchanges between different program components.
  • FIG. 6 shows a flowchart of a portion of an exemplary method 600 for map-key-sensitive global variable security analysis.
  • FIG. 6 in this example begins after block 2 F of FIG. 2 .
  • string analysis is applied to keys 610 of a map object 640 held by a global object 630 to make the global variable security analysis map-key sensitive.
  • FIG. 6 shows a simple example, where keys 610 - 1 and 610 - 2 have corresponding values V 1 620 - 1 and V 2 620 - 2 and are representations of data fields 605 of the map object 640 .
  • Block 6 A is performed in an exemplary embodiment by blocks 6 B to 6 G.
  • each grammar 650 corresponding to a key 610 .
  • the flow of the map object 640 is tracked throughout the simulated execution of the program 100 that occurs during the static analysis of the program 100 .
  • it is determined if one or more keys 610 of the map object 640 are used in a string manipulation (such as concatenation). If so (block 6 D YES), then in block 6 F, the grammar(s) 650 is updated for the one or more keys 610 .
  • the grammar 650 for a particular key 620 might be computed as E (the alphabet of all characters for a string), but the specified grammar 660 might be ( ⁇ ;,′ ⁇ )*, which should prevent SQL (structured query language) injections..
  • the comparison indicates a security violation, a potential security violation is reported.
  • the comparison should indicate a potential security violation, as the current grammar 650 of the key 610 includes additional characters not allowed by the specified grammar 660 .
  • Block 6 I would then proceed to block 2 L of FIG. 2 , and if the end of the program is not reached, the method 200 / 600 would continue in block 6 C.
  • FIG. 6 therefore provides for, e.g., a taint analysis tracking information flow of data for integrity purposes that should be able to distinguish that a tainted flow reached the value 620 - 1 corresponding to key “abc” (key 610 - 1 ) in a session object, and not the value 620 - 2 corresponding to key “xyz” (key 610 - 2 ).
  • This is important because if a software component later reads the value 620 - 1 corresponding to key “abc” (key 610 - 1 ) and uses the value 620 - 1 in a security-sensitive computation, then the analysis should flag (block 6 G) that as a problem.
  • FIG. 6 further provides that grammar 650 associated with the tainted key 610 - 1 can be used to determine if this grammar 650 meets specified grammar 660 .
  • flagging performed in block 6 G and the grammar analysis performed in blocks 6 B, 6 F, 6 H, and 61 are separable and need not both be performed. For instance, if specified grammars 660 are not known, then only block 6 G could be performed and blocks 6 B, 6 F, 6 H, and 61 would not be performed. As another example, block 6 G might not be performed if blocks 6 B, 6 F, 6 H, and 61 are believed to correct any potential errors, e.g., with a tainted string.
  • FIG. 7 is a block diagram of an exemplary system 700 suitable for implementing the instant invention.
  • the system 700 in this example includes a computer system 705 coupled to a display 730 .
  • the display 730 has a user interface 735 displaying a security report 740 .
  • the computer system includes one or more memories 710 , one or more processors 715 , one or more display interfaces (I/Fs) 720 , and one or more network interfaces 725 , all interconnected through one or more buses 726 .
  • I/Fs display interfaces
  • the one or more memories 710 include the program 100 to be analyzed, the selected global variables 745 (e.g., as a list 747 of global′ variables), a representation 746 of the program 100 , a security report 750 (e.g., a list 755 of potential security violations or flags 756 of use of possibly insecure keys 610 in security-sensitive operations), and a mapping of security-sensitive operations 760 - 1 through 760 -N to corresponding grammars 765 - 1 to 765 -N (e.g., grammars 660 as described above with respect to FIG. 6 ).
  • a security-sensitive operation 760 could be an access to a SQL database, and the grammar 765 would therefore be ( ⁇ ;,′ ⁇ ).
  • the representation 746 could include the static analysis model 210 , but may also include other models of the program 110 , such as a points-to graph (not shown) or call graph (not shown).
  • the one or more memories 710 also include instructions 770 , which when executed by the one or More processors 715 cause the computer system 705 to perform one or more of the actions described herein.
  • the instructions 770 define a static analysis engine 775 and a global variable analyzer 780 .
  • the static analysis engine 775 performs the static analysis on the program 100 and creates the representation 746 .
  • the global variable analyzer 780 performs the methods and actions described herein (e.g., in FIGS. 2-6 and 8 ).
  • the security report 750 is sent to a client (e.g., whose program 100 is being analyzed) via the one or more network interfaces 725 .
  • the security report 750 is presented on the user interface 735 as security report 740 , which is typically a modified version of the security report 750 .
  • the security report 740 indicates that “Global Variable A.g is used in Servlet 4 without sanitization” and that “All other uses of A.g appear secure”. This is the result, e.g., of an analysis in block 2 I of FIG. 2 indicating that no sanitization occurs for the global variable A.g when used in a security-sensitive operation that requires sanitization, or that other uses of A.g do not cause potential security violations.
  • the security report 740 indicates that “Map Key BCD of Key Object Q is tainted and is used in Servlet 5 ”, and this is a flag 756 created in block 6 G of FIG. 6 .
  • the security report 740 indicates that “Map Key ABC of Key Object Y is used in Servlet 6 and grammar does not match specified grammar” and “All other keys of Key Object Y appear secure”. This example indicates a potential security violation generated by block 6 I of FIG. 6 .
  • aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
  • a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof.
  • a computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • Computer program code for implementing operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • LAN local area network
  • WAN wide area network
  • Internet Service Provider for example, AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be perforined on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

Abstract

A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This patent application is a continuation of U.S. patent application Ser. No. 14/153,128, titled “Global Variable Security Analysis” and filed on Jan. 13, 2014, which itself was a continuation of U.S. patent application Ser. No. 12/951,435, titled “Global Variable Security Analysis” and filed on Nov. 22, 2010, both of which applications are incorporated herein by reference in their entirety to provide continuity of disclosure.
  • BACKGROUND
  • This invention relates generally to analysis of code such as source. code, object code, byte code, executable code, and libraries, and, more specifically, relates to static analysis of code for global variable security analysis that can provide selective, scope-sensitive, lifetime-sensitive, and map-key-sensitive global-side-effect analysis.
  • Static analysis of a program constructs a mathematical model of the execution of the program. The program is not actually executed, but is instead analyzed via the mathematical model. That is, the execution of the program is simulated.
  • Static analysis has particular benefits for certain types of programs. For instance, Web programs commonly accept untrusted input from users and use the untrusted input in secure transactions, access to SQL (structured query language) databases, or other security-sensitive operations. Prior to use in these security-sensitive operations, the untrusted input (typically a string) should be analyzed and revised if necessary to prevent possible security violations. As an example, a Web application might use a user name and password to access an SQL database using a query based on the user name and password. If the user name and password contain certain characters, the query might contain an undesirable, valid SQL instruction that could allow an attacker access to a portion of or the entire database. Removal of the characters prevents this from happening.
  • A runtime analysis of a large Web program may not find every or very many security violations, as during any runtime scenario, all possible untrusted input might not be used. A runtime analysis is therefore unsound. A static analysis will likely find more security violations, as every possible untrusted input can be considered (meaning a static analysis is sound).
  • Nonetheless, static analysis of programs such as Web programs could be improved.
  • SUMMARY
  • In an exemplary embodiment, a method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-Sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • FIG. 1 is an exemplary representation of a software program using a global variable;
  • FIG. 2 is a flowchart of an exemplary method for global variable security analysis;
  • FIG. 3 is a flowchart of an exemplary method for treating flows through selected global variables as special;
  • FIG. 4 is a flowchart of another exemplary method for treating flows through selected global variables as special;
  • FIG. 5 an exemplary representation of cloning object extractions for a software program using a particular global variable;
  • FIG. 6 is a flowchart of a portion of an exemplary method for map-key-sensitive global variable security analysis;
  • FIG. 7 is a block diagram of an exemplary system suitable for implementing the instant invention; and
  • FIG. 8 is an example of a security report presented in a user interface of a display.
  • DETAILED DESCRIPTION
  • As previously described, static analysis of a program constructs a mathematical model of the execution of a program. To be useful, the mathematical Model has to be sound (meaning that the model must describe all the dynamic behaviors that the program can have at run time). The main problem with this approach is that to scale to large programs, the analysis cannot be too precise, and so the model often models numerous spurious behaviors, which lead to false positives. A programming feature that is very expensive to model is the flow through global variables. Such variables can typically be accessed and modified by more than one program component because their scope goes beyond one single component. Therefore, modeling the flow of information through global variables require an expensive amount of modeling artifacts, since the states of all those components have to be tracked simultaneously. Many static analyzers opt to be unsound with respect to global variables because the analysis would not otherwise be able to scale to large programs. For several analyses, however, this compromise is unacceptable. For example, an analysis that tracks the flow of information throughout the execution of a program to detect integrity and confidentiality violations needs to take into account global variables and the flow through them.
  • Without taking global variables into account, numerous integrity and confidentiality violations would simply go undetected. This problem. is particularly serious in today's Web applications, which use global data structures such as “request” and “session” objects to store information pertaining to interactions with end users. Those objects have a scope that spans several different components. It is therefore possible for untrusted data to be stored in a global session object by Component A and then retrieved by Component B and used by Component B in a security-sensitive computation. If the flow through the session object is disregarded, the integrity violation caused by use by Component B of the untrusted data in a security-sensitive computation would go unnoticed. Things are complicated at least by the following three considerations.
  • 1. While the scope and lifetime of a local variable is limited to that programming construct of that variable's declaration (for example, a while loop, a method or a class), the scope and lifetime of a global variable does not necessarily encompass all the components in the program. In the Web application of today, the scope of a global variable may encompass a certain subset of the program's components. Therefore, a static analysis for any such program should be able to model the scope of a global variable including those situations in which that the scope of the global variable is not necessarily the same as the scope of the entire program.
  • 2. Global objects often hold internal data structures, such as maps. Values are stored into such maps depending on some corresponding keys. It is often important for a static analysis to disambiguate flows through such global objects based on the corresponding keys. For example, a taint analysis tracking information flow of data for integrity purposes should be able to distinguish that a tainted flow reached the value corresponding to key “abc” in a session object, and not the value corresponding to key “xyz”. This is important because if a component later reads the value corresponding to key “abc” and uses the value in a security-sensitive computation, then the analysis should flag that as a problem. However, if the component accesses the value corresponding to key “xyz” (which is not tainted) and uses this value in the security-sensitive computation, then no problem should be reported. Tracking such flows is complicated by the fact that keys are often not expressed as string constants. For example, key “abc” could be the result of the concatenation “a”+“be” and so, to become key-sensitive, an analysis should be able to model string-manipulating operations in a program.
  • 3. Given the prohibitive size of the Web applications of today, it is unlikely that a precise analysis that also keeps track of all the possible flows through the execution of a program (including flows through global variables) can scale to large programs. Therefore, tracking global flows selectively (for example, only for important objects that are known to participate in relevant information flows, such as session and request objects) is almost becoming a requirement to guarantee scalability.
  • So far, the solutions adopted by static analyzers for the problems described in Consideration 1 above are not satisfactory. Often, analyzers are made to be too conservative, so they can scale to large programs, but this also means that they do not offer useful results because they also produce too many false positives. For example, they ignore scopes and they are not map-key sensitive, causing any flow through a global variable to be contaminated by any other flow. Alternatively, analyzers are made to be unsound, by forcing them to ignore global flows. By contrast, the instant invention can solve the problem of security analysis of global flows, in, e.g., a scope-sensitive, map-key sensitive and selective manner in order to maintain scalability, precision, soundness and usefulness.
  • Before turning to a more detailed explanation of the exemplary embodiments, it is helpful to examine a simple example of a use of a global variable by a program. FIG. 1 is an exemplary representation 110 of a software program 100 using a global variable 120 (“A.g”) of a global object 111. It should be noted that this representation 110 is merely for expositional purposes and should not be construed as limiting the instant invention in any way. The software program 100 may be, e.g., a complete software program (e.g., a user written portion and a library portion) or parts thereof, and may be in source code, library object code, object code, etc. In this simple example, the “A” represents a global object 111 to which the global variable “A.g” is associated, and the global variable 120 may be any type of field associated with an object, such as a simple instance variable or a complicated data structure. Additionally, the global object 111 may also hold other objects to which the global variable 120 is associated. The global variable 120, in this example, is accessed by the components 130-1 through 130-4. The components 130 are servlets in this example, but this is not a limitation on the invention.
  • In a flow 190-1, the servlet 130-1 accesses the global variable 120 and sets the value 150-1 of the variable to V1. Sometime later, the servlet 130-4 accesses the global variable 120 and performs a security-sensitive operation 140 with the global variable 120. At a later time, in a flow 190-2, the servlet 130-3 accesses the global variable 120 and subtracts V3 from V1 to create the value 150-3 of V1-V3 for the global variable 120. The servlet 130-3 passes this variable to the servlet 130-2, which further modifies the value 150-3 by adding V2 to this value, to create the value 150-4. The value 150-4 is then passed to the servlet 130-4 for use in the security-sensitive operation 140. As another example, sometime later in a flow 190-3, the servlet 130-2 accesses the global variable 120 and overwrites the value with value 150-5 (V2), which the servlet 130-2 then passes to servlet 130-4 for use in the security-sensitive operation 140.
  • As this simple example shows, the global variable 120 has multiple flows 190-1 through 190-3 through the program 100. Each of these flows 190 has the potential to cause a security violation when the corresponding value 150 is used in the security-sensitive operation 140. Each use of the global variable 120 through the flows 190 should be checked for a security violation and any potential security violation should be reported. It can easily be seen that scaling this example to a very large Web program (for example) able tc, serve hundreds or thousands of transactions can be problematic. The instant invention allows certain selected global variables 120 of interest to be analyzed for security violations.
  • For instance, turning to FIG. 2, a flowchart is shown of an exemplary method 200 for global variable security analysis. Method 200 begins in block 2A, when a static analysis model 210 of a program 100 is built that ignores global variable flows. That is, the static analysis model 210 of the program 100 only tracks local flows of local variables, and ignores global flows of global variables for scalability reasons. Local flows are flows of local variables within components of the program and global flows are flows of global variables between components of the program. A local variable is a variable that is given local scope; such a variable is accessible only from the function or block in which it is declared. A global variable is a variable that is accessible in every scope. As another example, a variable is global if it retains its value after the function or program which uses the variable completes executing. Similarly, a variable is local if it does not retain its value after the function or program which uses the variable completes executing.
  • Then, global variables of interest are selected (block 2B), e.g., based on their names (block 2D) or even on their types (block 2E). For example, one could indicate that any variable of type A is of interest for special treatment. Then all the flows through these global variables are treated as special (block 2C). An exemplary embodiment does this by equating global variables to local variables. A possible solution consists of passing global variables along with other regular parameters in method calls (turn briefly to FIG. 3), thereby effectively making the global state of the program into a parameter that is passed from method to method during the entire simulated execution of the program. The choice of making this refinement selective (e.g., based on variable names or types) limits the impact that this refinement can have on the analysis scalability while allowing the analysis to concentrate the refinement on objects that are likely to participate in flows that are significant with respect to the analysis.
  • Returning to FIG. 2, in block 2F, the static analysis of the program 100 is begun, which includes a simulated execution of the program 100. In block 2G, global variable flow 190 is tracked through the program 100. In the example of FIG. 3, global variables are passed in method calls, and this passing is used to track the global variable flows 190. Additional examples of block 2G are described below. It is also noted that, in an exemplary embodiment, static analysis may be performed by a WALA (T. J. Watson Libraries for Analysis) static analysis tool, although other tools may also be used.
  • In block 2H, it is determined if a global variable 120 is used in a security-sensitive operation. Security-sensitive operations are known a priori. They are configured up front and they are known as “sinks”. The analysis here scans all the methods in the program until it finds sinks. For every sink, the analysis detects whether a given global variable is used.
  • If a global variable 120 is not used in a security-sensitive operation (block 2H=NO), the method 200 continues in block 2G. If a global variable 120 is used in a security-sensitive operation (block 2H=YES), in block 2I, the use of the global variable 120 in the security-sensitive analysis is analyzed. Analyzing the use of the global variable consists of determining the instructions in which the value of that variable is read or written. For example, given a global variable A.g, an instruction of the form A.g=x constitutes a write, while instructions of the form x=A.g or f(A.g), where f is a function in the program, constitute a read.
  • In block 2J, it is determined if there is a potential security violation. If not (block 2J=NO), the method 200 continues in block 2G. If so (block 2J=YES), a potential security violation is reported (block 2K), such as by writing an indicia 220 of the potential security violation to a file 215 or to a display. The method 200 then continues in block 2G.
  • In block 2L, it is determined if the end of the program has been reached. If not (block 2L=NO), the method 200 continues in block 2G. If so (block 2L=YES), then typically a list 230 of the potential security violations are reported (block 2M), e.g., using indicia 220 of the potential security violations to a display or to a network. In block 2N, the method 200 ends.
  • Typically, in block 2K, indicia 220 of the potential security violations are written to a file 215. In block 2M, the list 230 of indicia 210 would then be sent, e.g., to a display or a network as indicia 220. However, it is also possible to display the indicia 220 in block 2K, with or without saving the indicia 220 to a file 215.
  • In another exemplary embodiment, the analysis can be made scope-sensitive by cloning object abstractions of objects corresponding to a selected global variable: one object abstraction clone should be created per every scope. The scope is known a priori based on analysis configuration. For example, the scope can be a set of servlets. This means that the variable is global with respect to those servlets only (the variable can be read and written by any of those servlets), whereas that variable is not visible from other programs. Two clones of the same object should be treated in isolation so flows through different clones of the same object are not mixed and cannot contaminate each other. For instance, turning to FIG. 4, another exemplary Method for treating flows 190 through selected global variables as special (see block 2C of FIG. 2) is shown. In block 4A, object abstractions of an object having a selected global variable is cloned per scope. This is explained in more detail below in reference to FIG. 5. In block 4B, the clones are treated in isolation, so flows 190 through different clones of the same object are not mixed and cannot contaminate each other.
  • It should be noted that cloning, such as in block 4A, is merely one exemplary embodiment. In another exemplary embodiment, the same representation of the global variable may be reused for different scopes and analysis data for the global variable would be reset between (e.g., prior to) analyzing the different scopes.
  • FIG. 5 shows an exemplary representation of cloning object extractions for a software program using a particular global variable. In this example, there is an object 510 (e.g., “A”) having a particular global variable 511 (e.g., “A.g”). In a program 110 without the techniques of FIG. 4 being applied, the global variable 511 has (or is affected by) flows 530-1 through 530-6 to servlets 515-1 to 515-6, respectively. The global variable 511 is associated with a total (e.g., global) scope 580.
  • After block 4A has been applied, the object 510 is abstracted into objects 512-1 and 512-2, each of which has a corresponding global variable 513-1 and 513-2. The object 510 is abstracted based on the corresponding scope 560-1 and 560-2. In scope 560-1, the global variable 513-1 has (or is affected by) flows 535-1 through 535-3 to servlets 515-1 to 515-3, respectively. Similarly, in scope 560-2, the global variable 513-2 has (or is affected by) flows 540-1 through 540-3 to servlets 515-4 to 515-6, respectively. It is noted that flows 530-1 through 530-3 should be equivalent to flows 535-1 through 535-3, and flows 530-4 through 530-6 should be equivalent to flows 540-1 through 540-3.
  • Block 4B is applied to FIG. 5 by treating each of the clones 512 in isolation so that flows 535 are not mixed with flows 540. In block 2G and subsequent blocks of FIG. 2, the flows 535, 545 are handled per clone 512-1, 512-2, respectively.
  • It is noted that the security analysis of global variables can be made map-key sensitive by using string analysis. String analysis is a family of static analysis techniques whose purpose is to over-approximate the grammar of the language of all the values that a string variable can have at run time. In particular, string analysis can be applied to the keys of any map object held by a global object whenever that map object participates in information-flow exchanges between different program components.
  • An example is shown in FIG. 6, which shows a flowchart of a portion of an exemplary method 600 for map-key-sensitive global variable security analysis. FIG. 6 in this example begins after block 2F of FIG. 2. In block 6A of FIG. 6, string analysis is applied to keys 610 of a map object 640 held by a global object 630 to make the global variable security analysis map-key sensitive. FIG. 6 shows a simple example, where keys 610-1 and 610-2 have corresponding values V1 620-1 and V2 620-2 and are representations of data fields 605 of the map object 640. Block 6A is performed in an exemplary embodiment by blocks 6B to 6G.
  • In block 6B, for each key 610, all possible string values are determined to determine initial grammars 650, each grammar 650 corresponding to a key 610. In block 6C, the flow of the map object 640 is tracked throughout the simulated execution of the program 100 that occurs during the static analysis of the program 100. In block 6D, it is determined if one or more keys 610 of the map object 640 are used in a string manipulation (such as concatenation). If so (block 6D=YES), then in block 6F, the grammar(s) 650 is updated for the one or more keys 610. Note that the string manipulation may change the values 620 of one or more keys 610. It is also noted that an embodiment could track situations in which a key is deleted. Another embodiment could conservatively keep all the keys, without ever considering their deletion, even if that occurs. If not (block 6D=NO), the method 600 continues in block 6E.
  • In block 6E, it is determined if one or more key(s) 610 of the map object are used in a security-sensitive operation. If not (block 6E=NO), the method 600 continues in block 6C. If so (block 6E=YES), in block 6G, the use of the key(s) 610 in a security-sensitive operation is flagged (e.g., reported as indicia in a file 215 or onto a display). Further, in block 6H, the grammar(s) 650 for the key(s) 610 are compared with specified grammar(s) 660 corresponding to the operation. For instance, the grammar 650 for a particular key 620 might be computed as E (the alphabet of all characters for a string), but the specified grammar 660 might be (Σ−{;,′})*, which should prevent SQL (structured query language) injections.. In block 6I, if the comparison indicates a security violation, a potential security violation is reported. In the example of the computed grammar E and the specified grammar (Σ−{;,′}), the comparison should indicate a potential security violation, as the current grammar 650 of the key 610 includes additional characters not allowed by the specified grammar 660. Block 6I would then proceed to block 2L of FIG. 2, and if the end of the program is not reached, the method 200/600 would continue in block 6C.
  • FIG. 6 therefore provides for, e.g., a taint analysis tracking information flow of data for integrity purposes that should be able to distinguish that a tainted flow reached the value 620-1 corresponding to key “abc” (key 610-1) in a session object, and not the value 620-2 corresponding to key “xyz” (key 610-2). This is important because if a software component later reads the value 620-1 corresponding to key “abc” (key 610-1) and uses the value 620-1 in a security-sensitive computation, then the analysis should flag (block 6G) that as a problem. FIG. 6 further provides that grammar 650 associated with the tainted key 610-1 can be used to determine if this grammar 650 meets specified grammar 660.
  • It is noted that the flagging performed in block 6G and the grammar analysis performed in blocks 6B, 6F, 6H, and 61 are separable and need not both be performed. For instance, if specified grammars 660 are not known, then only block 6G could be performed and blocks 6B, 6F, 6H, and 61 would not be performed. As another example, block 6G might not be performed if blocks 6B, 6F, 6H, and 61 are believed to correct any potential errors, e.g., with a tainted string.
  • FIG. 7 is a block diagram of an exemplary system 700 suitable for implementing the instant invention. The system 700 in this example includes a computer system 705 coupled to a display 730. The display 730 has a user interface 735 displaying a security report 740. The computer system includes one or more memories 710, one or more processors 715, one or more display interfaces (I/Fs) 720, and one or more network interfaces 725, all interconnected through one or more buses 726.
  • The one or more memories 710 include the program 100 to be analyzed, the selected global variables 745 (e.g., as a list 747 of global′ variables), a representation 746 of the program 100, a security report 750 (e.g., a list 755 of potential security violations or flags 756 of use of possibly insecure keys 610 in security-sensitive operations), and a mapping of security-sensitive operations 760-1 through 760-N to corresponding grammars 765-1 to 765-N (e.g., grammars 660 as described above with respect to FIG. 6). For instance, a security-sensitive operation 760 could be an access to a SQL database, and the grammar 765 would therefore be (Σ−{;,′}). For XSS (cross-site scripting), it would be necessary to remove any JavaScript tag. This could be achieved by, e.g., replacing brackets <and > with their encodings, &lt; and &gt; respectively. The representation 746 could include the static analysis model 210, but may also include other models of the program 110, such as a points-to graph (not shown) or call graph (not shown).
  • The one or more memories 710 also include instructions 770, which when executed by the one or More processors 715 cause the computer system 705 to perform one or more of the actions described herein. The instructions 770 define a static analysis engine 775 and a global variable analyzer 780. The static analysis engine 775 performs the static analysis on the program 100 and creates the representation 746. The global variable analyzer 780 performs the methods and actions described herein (e.g., in FIGS. 2-6 and 8).
  • In one example, the security report 750 is sent to a client (e.g., whose program 100 is being analyzed) via the one or more network interfaces 725. As another example, the security report 750 is presented on the user interface 735 as security report 740, which is typically a modified version of the security report 750.
  • Referring now to FIG. 8, an example is shown of a security report 740 presented in a user interface 735 of a display 730. A number of examples are shown. In example 810, the security report 740 indicates that “Global Variable A.g is used in Servlet 4 without sanitization” and that “All other uses of A.g appear secure”. This is the result, e.g., of an analysis in block 2I of FIG. 2 indicating that no sanitization occurs for the global variable A.g when used in a security-sensitive operation that requires sanitization, or that other uses of A.g do not cause potential security violations.
  • In example 820, the security report 740 indicates that “Map Key BCD of Key Object Q is tainted and is used in Servlet 5”, and this is a flag 756 created in block 6G of FIG. 6. In example 830, the security report 740 indicates that “Map Key ABC of Key Object Y is used in Servlet 6 and grammar does not match specified grammar” and “All other keys of Key Object Y appear secure”. This example indicates a potential security violation generated by block 6I of FIG. 6.
  • As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
  • Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM); an optical storage device, a Magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • Computer program code for implementing operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be perforined on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (19)

What is claimed is:
1. A method, comprising:
determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked, the selected global variables being less than all the global variables in the program; and
using a static analysis performed on the program, tracking flow through the program for the selected global variables; in response to one or more of the selected global variables being used in security-sensitive operations in the flow, analyzing use of each one of the selected global variables in a corresponding security-sensitive operation; and in response to a determination the use may be a potential security violation, reporting the potential security violation.
2. The method of claim 1, wherein reporting comprises placing indicia of the potential security violation into a file.
3. The method of claim 1, wherein reporting further comprises displaying indicia of the potential security violation using a user interface displayed on a display.
4. The method of claim 1, wherein determining the selected global variables in the program for which flow of the selected global variables through the program is to be tracked further comprises using at least one of a name of the selected global variable or a type of the selected global variable to determine that the flow of the selected global variable through the program is to be tracked.
5. The method of claim 1, wherein tracking further comprises tracking flow through the program for the selected global variables by passing the selected global variables in method calls between methods of the program.
6. The method of claim 1, wherein tracking further comprises tracking flow through the program for a given one of the selected global variables by reusing a smile representation of the one global variable for different scopes of the one global variable and resetting analysis data for the global variable prior to analyzing the different scopes.
7. The method of claim 1, wherein a given one of the selected global variables comprises at least one key of a map object and wherein using a static analysis performed on the program further comprises tracking flow through the program for each of the at least one keys; in response to one of the at least one keys being used in a security-sensitive operation in the flow, analyzing use of the one key in the security-sensitive operation; and in response to a determination the use of the one key may be a potential security violation, reporting the potential security violation.
8. A computer program product, comprising:
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising:
code for determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked, the selected global variables being less than all the global variables in the program; and
code for, using a static analysis performed on the program, tracking flow through the program for the selected global variables; in response to one or more of the selected global variables being used in security-sensitive operations in the flow, analyzing use of each one of the selected global variables in a corresponding security-sensitive operation; and in response to a determination the use may be a potential security violation, reporting the potential security violation.
9. The computer program product of claim 8, wherein reporting comprises placing indicia of the potential security violation into a file.
10. The computer program product of claim 8, wherein reporting further comprises displaying indicia of the potential security violation using a user interface displayed on a display.
11. The computer program product of claim 8, wherein determining the selected global variables in the program for which flow of the selected global variables through the program is to be tracked further comprises using at least one of a name of the selected global variable or a type of the selected global variable to determine that the flow of the selected global variable through the program is to be tracked.
12. The computer program product of claim 8, wherein tracking further comprises tracking flow through the program for the selected global variables by passing the selected global variables in computer program product calls between methods of the program.
13. The computer program product Of claim 8, wherein a given one of the selected global variables comprises at least one key of a map object and wherein using a static analysis performed on the program further comprises tracking flow through the program for each of the at least one keys; in response to one of the at least one keys being used in a security-sensitive operation in the flow, analyzing use of the one key in the security-sensitive operation; and in response to a determination the use of the one key may be a potential security violation, reporting the potential security violation.
14. An apparatus, comprising:
at least one memory comprising computer code; and
at least one processor,
the computer code controlling the at least one processor to perform at least the following:
determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked, the selected global variables being less than all the global variables in the program; and
using a static analysis performed on the program, tracking flow through the program for the selected global variables; in response to one or more of the selected global variables being used in security-sensitive operations in the flow, analyzing use of each one of the selected global variables in a corresponding security-sensitive operation; and in response to a determination the use may be a potential security violation, reporting the potential security violation.
15. The apparatus of claim 14, wherein reporting comprises placing indicia of the potential security violation into a file.
16. The apparatus of claim 14, wherein the apparatus further comprises a display interface coupled to the at least one processor and a display, and wherein reporting further comprises displaying indicia of the potential security violation using a user interface displayed on the display.
17. The apparatus of claim 14, wherein determining the selected global variables in the program for which flow of the selected global variables through the program is to be tracked further comprises using at least one of a name of the selected global variable or a type of the selected global variable to determine that the flow of the selected global variable through the program is to be tracked.
18. The apparatus of claim 14, wherein tracking further comprises tracking flow through the program for the selected global variables by passing the selected global variables in apparatus calls between methods of the program.
19. The apparatus of claim 14, wherein a given one of the selected global variables comprises at least one key of a map object and wherein using a static analysis performed on the program further comprises tracking flow through the program for each of the at least one keys; in response to one of the at least one keys being used in a security-sensitive operation in the flow, analyzing use of the one key in the security-sensitive operation; and in response to a determination the use of the one key may be a potential security violation, reporting the potential security violation.
US14/688,346 2010-11-22 2015-04-16 Global Variable Security Analysis Abandoned US20150220739A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/688,346 US20150220739A1 (en) 2010-11-22 2015-04-16 Global Variable Security Analysis

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/951,435 US8656496B2 (en) 2010-11-22 2010-11-22 Global variable security analysis
US14/153,128 US9075997B2 (en) 2010-11-22 2014-01-13 Global variable security analysis
US14/688,346 US20150220739A1 (en) 2010-11-22 2015-04-16 Global Variable Security Analysis

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/153,128 Continuation US9075997B2 (en) 2010-11-22 2014-01-13 Global variable security analysis

Publications (1)

Publication Number Publication Date
US20150220739A1 true US20150220739A1 (en) 2015-08-06

Family

ID=46065696

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/951,435 Expired - Fee Related US8656496B2 (en) 2010-11-22 2010-11-22 Global variable security analysis
US14/153,128 Expired - Fee Related US9075997B2 (en) 2010-11-22 2014-01-13 Global variable security analysis
US14/688,346 Abandoned US20150220739A1 (en) 2010-11-22 2015-04-16 Global Variable Security Analysis

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US12/951,435 Expired - Fee Related US8656496B2 (en) 2010-11-22 2010-11-22 Global variable security analysis
US14/153,128 Expired - Fee Related US9075997B2 (en) 2010-11-22 2014-01-13 Global variable security analysis

Country Status (1)

Country Link
US (3) US8656496B2 (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8656496B2 (en) * 2010-11-22 2014-02-18 International Business Machines Corporations Global variable security analysis
US8850581B2 (en) * 2012-11-07 2014-09-30 Microsoft Corporation Identification of malware detection signature candidate code
US9317682B1 (en) * 2012-12-07 2016-04-19 Hrl Laboratories, Llc Library-based method for information flow integrity enforcement and robust information flow policy development
US11057416B2 (en) * 2013-12-19 2021-07-06 Micro Focus Llc Analyze code that uses web framework using local parameter model
ES2892849T3 (en) * 2014-04-11 2022-02-07 Hdiv Security S L Application tampering detection
US10044581B1 (en) 2015-09-29 2018-08-07 Amazon Technologies, Inc. Network traffic tracking using encapsulation protocol
US10546132B2 (en) 2014-09-30 2020-01-28 Micro Focus Llc String property labels for static analysis
US10353679B2 (en) 2014-10-31 2019-07-16 Microsoft Technology Licensing, Llc. Collecting profile data for modified global variables
US10108802B2 (en) * 2015-01-30 2018-10-23 Oracle International Corporation Static program analysis method for detecting security bugs in programs that rely on code access control
US9536082B2 (en) 2015-03-17 2017-01-03 International Business Machines Corporation Isolated program execution environment
US10248532B1 (en) 2015-09-15 2019-04-02 Amazon Technologies, Inc. Sensitive data usage detection using static analysis
US10033602B1 (en) 2015-09-29 2018-07-24 Amazon Technologies, Inc. Network health management using metrics from encapsulation protocol endpoints
US9823913B2 (en) 2015-12-03 2017-11-21 International Business Machines Corporation Method of adding local variables in place of global in JavaScript
US10324820B2 (en) * 2016-09-21 2019-06-18 International Business Machines Corporation Providing specialization for static program analysis using coding hints
US10243820B2 (en) 2016-09-28 2019-03-26 Amazon Technologies, Inc. Filtering network health information based on customer impact
US10862777B2 (en) 2016-09-28 2020-12-08 Amazon Technologies, Inc. Visualization of network health information
US10911263B2 (en) 2016-09-28 2021-02-02 Amazon Technologies, Inc. Programmatic interfaces for network health information
US10917324B2 (en) 2016-09-28 2021-02-09 Amazon Technologies, Inc. Network health data aggregation service
US10614224B2 (en) 2017-05-15 2020-04-07 International Business Machines Corporation Identifying computer program security access control violations using static analysis
US10657252B2 (en) * 2017-06-22 2020-05-19 Oracle International Corporation Detecting malicious code embedded in documents
KR101921052B1 (en) * 2017-11-15 2018-11-22 한국인터넷진흥원 Method and apparatus for identifying security vulnerability and cause point thereof of executable binaries

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050044344A1 (en) * 2003-08-21 2005-02-24 Quicksilver Technology, Inc. System, method and software for static and dynamic programming and configuration of an adaptive computing architecture
US20050273860A1 (en) * 2004-06-04 2005-12-08 Brian Chess Apparatus and method for developing, testing and monitoring secure software
US20070266435A1 (en) * 2005-12-28 2007-11-15 Williams Paul D System and method for intrusion detection in a computer system
US20080215768A1 (en) * 2006-10-24 2008-09-04 Alastair David Reid Variable coherency support when mapping a computer program to a data processing apparatus
US20090259989A1 (en) * 2008-04-14 2009-10-15 Sun Microsystems, Inc. Layered static program analysis framework for software testing
US8656496B2 (en) * 2010-11-22 2014-02-18 International Business Machines Corporations Global variable security analysis

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7530107B1 (en) * 2007-12-19 2009-05-05 International Business Machines Corporation Systems, methods and computer program products for string analysis with security labels for vulnerability detection
US8341614B2 (en) * 2008-06-06 2012-12-25 Apple Inc. Memory management for closures
WO2010060923A1 (en) * 2008-11-26 2010-06-03 Danmarks Tekniske Universitet Biologically inspired hardware cell architecture

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050044344A1 (en) * 2003-08-21 2005-02-24 Quicksilver Technology, Inc. System, method and software for static and dynamic programming and configuration of an adaptive computing architecture
US20050273860A1 (en) * 2004-06-04 2005-12-08 Brian Chess Apparatus and method for developing, testing and monitoring secure software
US20070266435A1 (en) * 2005-12-28 2007-11-15 Williams Paul D System and method for intrusion detection in a computer system
US20080215768A1 (en) * 2006-10-24 2008-09-04 Alastair David Reid Variable coherency support when mapping a computer program to a data processing apparatus
US20090259989A1 (en) * 2008-04-14 2009-10-15 Sun Microsystems, Inc. Layered static program analysis framework for software testing
US8656496B2 (en) * 2010-11-22 2014-02-18 International Business Machines Corporations Global variable security analysis

Also Published As

Publication number Publication date
US20120131670A1 (en) 2012-05-24
US9075997B2 (en) 2015-07-07
US20140143880A1 (en) 2014-05-22
US8656496B2 (en) 2014-02-18

Similar Documents

Publication Publication Date Title
US9075997B2 (en) Global variable security analysis
US9715593B2 (en) Software vulnerabilities detection system and methods
US8819637B2 (en) Fixing security vulnerability in a source code
Ligh et al. The art of memory forensics: detecting malware and threats in windows, linux, and Mac memory
US8539593B2 (en) Extraction of code level security specification
US9336381B1 (en) Entropy-based detection of sensitive information in code
US9690945B2 (en) Security analysis using relational abstraction of data structures
US20110191855A1 (en) In-development vulnerability response management
US20170017789A1 (en) High Performance Software Vulnerabilities Detection System and Methods
US7506313B2 (en) Debug of code with selective display of data
US8572747B2 (en) Policy-driven detection and verification of methods such as sanitizers and validators
US9158923B2 (en) Mitigating security risks via code movement
US11176248B2 (en) Remediation of security vulnerabilities in computer software
US20240121261A1 (en) Automated Security Analysis of Software Libraries
Leino et al. Fine-grained caching of verification results
US20190361788A1 (en) Interactive analysis of a security specification
CN110727476A (en) Method, device, equipment and storage medium for generating authorization configuration file
Zhang et al. Blockaid: Data access policy enforcement for web applications
Radhakrishna et al. DroidStar: callback typestates for Android classes
US9473523B1 (en) Execution of test inputs with applications in computer security assessment
CN111027073B (en) Vulnerability detection method, device, equipment and storage medium
US20170185504A1 (en) Scalable points-to analysis via multiple slicing
US20170039064A1 (en) Annotations in software development
CN117807595A (en) Rebound shell detection method and device, electronic equipment and storage medium
CN112926058A (en) Code processing method, taint analysis method and device

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ARTZI, SHAY;BERG, RYAN;PEYTON, JOHN;AND OTHERS;SIGNING DATES FROM 20131025 TO 20140106;REEL/FRAME:035426/0929

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION