Using Static Code Analysis Tools for Detection of Security Vulnerabilities
|
|
|
- Ashlyn Payne
- 10 years ago
- Views:
Transcription
1 Using Static Code Analysis Tools for Detection of Security Vulnerabilities Katerina Goseva-Popstajanova & Andrei Perhinschi Lane Deptartment of Computer Science and Electrical Engineering West Virginia Morgantown, WV
2 Acknowledgements This material is based upon work supported in part by NASA IV&V, Fairmont, WV We thank Keenan Bowens, Travis Dawson, Roger Harris, Joelle Loretta, Jerry Sims and Christopher Williams for their valuable input and feedback.
3 Information assurance and IV&V NASA develops, runs, and maintains many systems for which one or more security attributes (i.e. confidentiality, integrity, availability, authentication, authorization, and non-repudiation) are of vital importance Information assurance and cyber security have to be integrated in the traditional verification and validation process
4 Static code analysis Static analysis of source code provides a scalable method for code review Tools matured rapidly in the last decade from simple lexical analysis to more complex and accurate techniques In general, static analysis problems are undecidable (i.e. it is impossible to construct an algorithm which always leads to a correct answer) False negatives False positives
5 To examine the ability of static code analysis tools to detect security vulnerabilities
6 Approach Surveyed the literature and vendor provided information on the state-of-the-art and practice of static code analysis tools 15 commercial products 8 tools licensed under some kind of open source license Selected three tools for detailed evaluation To fully use the provided functionality all three tools require a build to be created or at least the software under test to be compiled Performance was evaluated using Micro-benchmarking test suites for C/C++ and Java Three open source programs with known vulnerabilities
7 EVALUATION BASED ON THE JULIET TEST SUITE
8 Juliet test suite Micro-benchmarking suite which covers large number of CWEs Each CWE (Common Weakness Enumeration) represents a single vulnerability type Created by NSA and made publicly available at the NIST Web site C/C++ suite (version 1.1) 119 CWEs 57,099 test cases Java suite (version 1.1.1) 113 CWEs 23,957 test cases
9 Juliet test suite This presentation is focused on the CWEs covered by all three tools 22 common C/C++ CWEs among the three tools (~21,000 test cases) 19 common Java CWEs among the three tools (~7,500 test cases) Two of the tools covered significantly more CWEs 90 C/C++ CWEs (~34,000 test cases) 107 Java CWEs (~16,000 test cases) Results were similar to the ones presented here
10 Automatic assessment Run each tool on the Juliet test suite Parse each CWE directory & assemble a list of test cases Transform tool s output in a common format Parse the output & compute the confusion matrix
11 Confusion matrix & metrics Actual vulnerability No vulnerability (good function/method) Reported vulnerability True Positives (TP) False Positives (FP) No warning/error reported False Negatives (FN) True Negatives (TN) % of functions that are classified correctly Accuracy TN TN FN TP FP TP Probability of detecting a vulnerability (recall) PD TP TP FN Probability of misclassifying a good function as a bad function (false alarm) PF FP TN FP How close is the result to the ideal point (pf, pd)=(0,1) Balance 1 (0 PF ) 2 (1 2 PD) 2
12 Accuracy: C/C++ CWEs The three tools have similar performance with Tool C performing slightly better Tool A: Range [0.27,0.77], Average = 0.59, Median = 0.63 Tool B: Range [0.50, 0.87], Average = 0.67, Median = 0.64 Tool C: Range [0.41,1], Average = 0.72, Median = 0.64
13 Recall: C/C++ CWEs Each tool has 0% recall for some CWEs For some CWEs (i.e.,197, 391, 478, 480, 482, 835) all three tools have 0% recall Tool A: Range [0, 1], Average = 0.21, Median = 0.14 Tool B: Range [0, 0.87], Average = 0.26, Median = 0.10 Tool C: Range [0,1], Average = 0.39, Median = 0.42 Accuracy on its own is not a good metric for tools performance
14 Probability of false alarm: C/C++ CWEs Tool C has noticeably lower false positive rate than Tools A and B Tool A: Range [0, 0.94], Average = 0.18, Median = 0.02 Tool B: Range [0, 0.52], Average = 0.09, Median = 0.01 Tool C: Range [0,0.94], Average = 0.07, Median = 0
15 Balance: C/C++ CWEs Balance values for many CWEs were around 30%, which indicates poor overall performance Tool C performed slightly better than the other two tools Tool A: Range [0.28, 0.65], Average = 0.39, Median = 0.29 Tool B: Range [0.29, 0.87], Average = 0.46, Median = 0.36 Tool C: Range [0.29,1], Average = 0.53, Median = 0.46
16 ROC squares for C/C++ CWEs Ideal result (pf, pd) = (0, 1) Not many points are close to the ideal (0,1) point Tool C has noticeably lower false alarm rate For each tool there are multiple CWEs at the (0,0) point
17 Accuracy: Java CWEs Accuracy values for Java CWEs vary somewhat more than those for C/C++ CWEs All three tools attain a maximum accuracy value for several CWEs Tool A: Range [0.41,1], Average = 0.67, Median = 0.63 Tool B: Range [0,1], Average = 0.60, Median = 0.63 Tool C: Range [0.52,1], Average = 0.73, Median = 0.67 Tool C seems to be performing slightly better than the other two tools
18 Recall: Java CWEs Again, there were CWEs (i.e., 486 and 489) for which none of the tools correctly flagged any flawed constructs However, not as many as in case of C/C++ test suite Tool A: Range [0,1], Average = 0.49, Median = 0.50 Tool B: Range [0,1], Average = 0.35, Median = 0.18 Tool C: Range [0,1], Average = 0.36, Median = 0.17 Tool A performed slightly better than the other two tools
19 Probability of false alarm: Java CWEs Similar trend as in case of the C/C++ false alarm values Tool C performed better than the other two tools; Tool A performed slightly better than Tool B. Tool A: Range [0,0.94], Average = 0.24, Median = 0 Tool B: Range [0,1], Average = 0.25, Median = 0.03 Tool C: Range [0,0.47], Average = 0.05, Median = 0
20 Balance: Java CWEs Similar trend as in case of C/C++ balance values For many CWEs balance values were around 30%, which is an indicator of overall poor performance Tool A: Range [0.29,1], Average = 0.50, Median = 0.34 Tool B: Range [0,1], Average = 0.43, Median = 0.34 Tool C: Range [0.29,1], Average = 0.52, Median = 0.41 Tools A and C appear to perform slightly better than Tool B
21 ROC squares for Java CWEs Ideal result (pf, pd) = (0, 1) Not many points are close to the ideal (0,1) point Tool C has noticeably lower false alarm rate For each tool there are multiple CWEs at the (0,0) point
22 CWE/SANS top 25 most dangerous software errors C/C++ CWE 78 OS Command Injection Tool A had the highest recall (54%), but also very high probability of false alarm (89%) Tools B and C performed poorly, with recall values around 4% and 0% respectively CWE 134 Uncontrolled Format String Tool C was the most successful (with recall close to 79%), but with high probability of false alarm (i.e., 48%) Tools A and B had lower recall values (i.e., around 30% and 38%, respectively)
23 CWE/SANS top 25 most dangerous software errors Java CWE 190 Integer Overflow Tool B had recall of around 27%, with relatively high false alarm rate of almost 22% Neither Tool A nor Tool B detected CWE 190 (i.e. they had 0% recall)
24 EVALUATION BASED ON REAL PROGRAMS
25 Evaluation based on real software Three open-source software applications Gzip Dovecot Apache Tomcat Older version with known vulnerabilities More recent version with the same vulnerabilities being fixed was used as an oracle A total of 44 known vulnerabilities in the three applications, mapped to 8 different CWEs
26 Gzip: Basic facts Popular open source archiving tool Written in C ~8,500 LOC Vulnerable version: with 4 known vulnerabilities Version with fixed vulnerabilities: 1.3.6
27 Gzip: Results Gzip version with known vulnerabilities Tool Warnings Number of detected vulnerabilities Tool A out of 4 Tool B 36 0 out of 4 Tool C out of 4 True positive Gzip version with fixed vulnerabilities Tool Warnings Number of reported vulnerabilities Tool A out of 4 Tool B out of 4 Tool C out of 4 False positive
28 Dovecot: Basic facts IMAP/POP3 server for Unix-like operating systems Written in C ~280,000 LOC Vulnerable version: with 8 known vulnerabilities Version with fixed vulnerabilities:
29 Dovecot: Results Dovecot version with known vulnerabilities Tool Warnings Number of detected vulnerabilities Tool A 8,263 0 out of 8 Tool B out of 8 Tool C 1,356 0 out of 8 Dovecot version with fixed vulnerabilities Tool Warnings Number of reported vulnerabilities Tool A 8,655 0 out of 8 Tool B out of 8 Tool C 1,293 0 out of 8
30 Tomcat: Basic facts Open source Java Servlet and JavaServer Pages implementation Written in Java ~4,800,000 LOC Vulnerable version: with 32 known vulnerabilities Version with fixed vulnerabilities:
31 Tomcat: Basic facts Due to its much greater complexity, the majority of Tomcat s vulnerabilities span several files and/or locations within each file 4 out of 32 vulnerabilities occur at one location within one file 9 out of 32 vulnerabilities occur at multiple locations within one file 19 out of 32 vulnerabilities occur in multiple files We consider a true positive found if at least one of the file(s)/location(s) are matched by a tool
32 Tomcat: Results Tomcat version with known vulnerabilities Tool Warnings Number of detected vulnerabilities Tool A 12,399 7 out of 32 Tool B 12,904 3 out of 32 Tool C 20,608 5 out of 32 True positives Tomcat version with fixed vulnerabilities Tool Warnings Number of reported vulnerabilities Tool A 167,837 2 out of 32 Tool B 13,129 0 out of 32 Tool C 21,128 1 out of 32 False positives
33 CONCLUDING REMARKS
34 Conclusions None of the three tools produced very good results (i.e., high probability of detection (i.e., recall) and low probability of false alarm) Tool C had the smallest false alarm rate among the three tools (mean value of 7% for the common C/C++ CWEs and 5% for the common Java CWEs) Some CWEs were detected by all three tools, others by a combination of two tools or a single tool, while some CWEs were missed by all three tools
35 Conclusions The results of the evaluation with real open source programs were consistent with the evaluation based on the Juliet test suite All three tools had high false negative rates (i.e. were not able to identify majority of the known vulnerabilities) Tool A outperformed the other two tools on the application implemented in Java Static code analysis cannot be used as an assurance that the software is secure. Rather, it should be one of the techniques used, in addition to other complementary techniques
Gold Standard Method for Benchmarking C Source Code Static Analysis Tools
Gold Standard Method for Benchmarking C Source Code Static Analysis Tools Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Henny Sipma Sr. Computer Scientist Kestrel Technology,
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
Security Vulnerabilities in Open Source Java Libraries. Patrycja Wegrzynowicz CTO, Yonita, Inc.
Security Vulnerabilities in Open Source Java Libraries Patrycja Wegrzynowicz CTO, Yonita, Inc. About Me Programmer at heart Researcher in mind Speaker with passion Entrepreneur by need @yonlabs Agenda
CSC574 - Computer and Network Security Module: Intrusion Detection
CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Idea: Measuring the Effect of Code Complexity on Static Analysis Results
Idea: Measuring the Effect of Code Complexity on Static Analysis Results James Walden, Adam Messer, and Alex Kuhl Department of Computer Science Northern Kentucky University Highland Heights, KY 41099
Using the Juliet Test Suite to compare Static Security Scanners
Using the Juliet Test Suite to compare Static Security Scanners Andreas Wagner 1, Johannes Sametinger 2 1 GAM Project, IT Solutions, Schwertberg, Austria 2 Dept. of Information Systems Software Engineering,
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Detecting Critical Defects on the Developer s Desktop
Detecting Critical Defects on the Developer s Desktop Seth Hallem CEO Coverity, Inc. Copyright Coverity, Inc. 2006. All Rights Reserved. This publication, in whole or in part, may not be reproduced, stored
A framework for creating custom rules for static analysis tools
A framework for creating custom rules for static analysis tools Eric Dalci John Steven Cigital Inc. 21351 Ridgetop Circle, Suite 400 Dulles VA 20166 (703) 404-9293 edalci,[email protected] Abstract Code
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Gold Standard Benchmark for Static Source Code Analyzers
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Gold Standard Benchmark for Static Source Code Analyzers Kestrel Technology, LLC Dr. Henny B. Sipma Sep 16, 2013 Kestrel Technology Founded: 2000 Location:
Source Code Security Analysis Tool Functional Specification Version 1.0
Special Publication 500-268 Source Code Security Analysis Tool Functional Specification Version 1.0 Paul E. Black Michael Kass Michael Koo Software Diagnostics and Conformance Testing Division Information
More Repeatable Vulnerability Assessment An introduction
Försvarets Materielverk/CSEC 2008 Document ID CB-039 Issue 0.4 More Repeatable Vulnerability Assessment An introduction Helén Svensson 1 Section Agenda Background Introduction to the following aspects
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,
Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs
Performance Measures for Machine Learning
Performance Measures for Machine Learning 1 Performance Measures Accuracy Weighted (Cost-Sensitive) Accuracy Lift Precision/Recall F Break Even Point ROC ROC Area 2 Accuracy Target: 0/1, -1/+1, True/False,
A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification
, pp. 131-142 http://dx.doi.org/10.14257/ijseia.2015.9.10.13 A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification Min-gyu Lee 1, Hyo-jung Sohn 2, Baek-min Seong
Testing for Security
Testing for Security Kenneth Ingham September 29, 2009 1 Course overview The threat that security breaches present to your products and ultimately your customer base can be significant. This course is
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
Put a Firewall in Your JVM Securing Java Applications!
Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
Overview. Evaluation Connectionist and Statistical Language Processing. Test and Validation Set. Training and Test Set
Overview Evaluation Connectionist and Statistical Language Processing Frank Keller [email protected] Computerlinguistik Universität des Saarlandes training set, validation set, test set holdout, stratification
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Performance Metrics. number of mistakes total number of observations. err = p.1/1
p.1/1 Performance Metrics The simplest performance metric is the model error defined as the number of mistakes the model makes on a data set divided by the number of observations in the data set, err =
Evaluation & Validation: Credibility: Evaluating what has been learned
Evaluation & Validation: Credibility: Evaluating what has been learned How predictive is a learned model? How can we evaluate a model Test the model Statistical tests Considerations in evaluating a Model
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
High Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
Measuring the Effect of Code Complexity on Static Analysis Results
Measuring the Effect of Code Complexity on Static Analysis Results James Walden, Adam Messer, and Alex Kuhl Department of Computer Science Northern Kentucky University Highland Heights, KY 41099 Abstract.
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
STATIC CODE ANALYSIS Alexandru G. Bardas 1
Abstract STATIC CODE ANALYSIS Alexandru G. Bardas 1 A lot of the defects that are present in a program are not visible to the compiler. Static code analysis is a way to find bugs and reduce the defects
CS 5410 - Computer and Network Security: Intrusion Detection
CS 5410 - Computer and Network Security: Intrusion Detection Professor Kevin Butler Fall 2015 Locked Down You re using all the techniques we will talk about over the course of the semester: Strong access
Developers and the Software Supply Chain. Andy Chou, PhD Chief Technology Officer Coverity, Inc.
Developers and the Software Supply Chain Andy Chou, PhD Chief Technology Officer Coverity, Inc. About Andy CTO at Coverity since 2010 Co-founder at Coverity, 2003 From five guys in a garage to 280 employees
Comparison of Secure Development Frameworks for Korean e- Government Systems
, pp.355-362 http://dx.doi.org/10.14257/ijsia.2014.8.1.33 Comparison of Secure Development Frameworks for Korean e- Government Systems Dongsu Seo School of Information Technology Sungshin University [email protected]
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation
Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation Witt Yi Win, and Hnin Hnin Htun Abstract SQL injection attack is a particularly dangerous threat that exploits application
Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015
For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6
Mining the Software Change Repository of a Legacy Telephony System
Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Real World Software Assurance Test Suite: STONESOUP
Real World Software Assurance Test Suite: STONESOUP Charles Oliveira/SAMATE Guest Researcher at Software and Systems Division, IT Laboratory NIST Outline - Introduction STONESOUP
Levels of Software Testing. Functional Testing
Levels of Software Testing There are different levels during the process of Testing. In this chapter a brief description is provided about these levels. Levels of testing include the different methodologies
KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) [email protected] www.technologytransfer.it
Database Assessment. Vulnerability Assessment Course
Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
X05. An Overview of Source Code Scanning Tools. Loulwa Salem. Las Vegas, NV. IBM Corporation 2006. IBM System p, AIX 5L & Linux Technical University
X05 An Overview of Source Code Scanning Tools Loulwa Salem Las Vegas, NV Objectives This session will introduce better coding practices and tools available to aid developers in producing more secure code.
Delphi-Windows Digital Signature Library Interface
Delphi-Windows Digital Signature Library Interface Joseph Snyder SW Process Engineer [email protected] Purpose The purpose of these three files is to provide the interface between Delphi executables and
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
How I hacked PacketStorm (1988-2000)
Outline Recap Secure Programming Lecture 8++: SQL Injection David Aspinall, Informatics @ Edinburgh 13th February 2014 Overview Some past attacks Reminder: basics Classification Injection route and motive
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
1. Building Testing Environment
The Practice of Web Application Penetration Testing 1. Building Testing Environment Intrusion of websites is illegal in many countries, so you cannot take other s web sites as your testing target. First,
2,000 Websites Later Which Web Programming Languages are Most Secure?
2,000 Websites Later Which Web Programming Languages are Most Secure? Jeremiah Grossman Founder & Chief Technology Officer 2010 WhiteHat Security, Inc. WhiteHat Security Founder & Chief Technology Officer
OTM Security in an Evolving Threat Landscape. Anoop Jangamakote Ryan Haney
OTM Security in an Evolving Threat Landscape Anoop Jangamakote Ryan Haney Introduction Table of Contents 1. What is Information Security? Why is it important? 2. Introduction to OTM Security 3. OTM Threat
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer www.ipswitchft.com FIPS 140-2 is a standard first published in 2001 by the U.S. National
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
How To Ensure That Your Computer System Is Safe
Establishing a Continuous Process for PCI DSS Compliance Visa, MasterCard, American Express, and other payment card companies currently require all U.S. merchants accepting credit card payments to comply
How To Write A Vulnerability Signature Specification For A Program
Supporting Automated Vulnerability Analysis using Formalized Vulnerability Signatures Mohemed Almorsy, John Grundy and Amani S. Ibrahim Computer Science & Software Engineering, Faculty of Information &
Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications
Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications Streamline your web application Security testing with IBM Security AppScan Source 9.0.1 Leyla Aravopoulos
EMC Documentum Content Management Interoperability Services
EMC Documentum Content Management Interoperability Services Version 6.7 Deployment Guide EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com EMC believes the information
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0
Special Publication 500-269 Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0 Paul E. Black Elizabeth Fong Vadim Okun Romain Gaucher Software Diagnostics and
Web application vulnerability statistics for 2010-2011
Web application vulnerability statistics for 2010-2011 SERGEY GORDEYCHIK DMITRY EVTEEV ALEXANDER ZAITSEV DENIS BARANOV SERGEY SCHERBEL ANNA BELIMOVA GLEB GRITSAI YURI GOLTSEV TIMUR YUNUSOV ILYA KRUPENKO
SINCE its appearance in the early 1990s, the World Wide
IEEE TRANSITIONS ON REALIBILITY 1 Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining Ibéria Medeiros, Nuno Neves, Member, IEEE, and Miguel Correia, Senior Member,
IBM Security AppScan Source for Analysis Version 9.0.3.3. User Guide IBM
IBM Security AppScan Source for Analysis Version 9.0.3.3 User Guide IBM IBM Security AppScan Source for Analysis Version 9.0.3.3 User Guide IBM (C) Copyright IBM Corp. and its licensors 2003, 2016. All
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
<Insert Picture Here> What's New in NetBeans IDE 7.2
Slide 1 What's New in NetBeans IDE 7.2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security
Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which
Performance Measures in Data Mining
Performance Measures in Data Mining Common Performance Measures used in Data Mining and Machine Learning Approaches L. Richter J.M. Cejuela Department of Computer Science Technische Universität München
Programming Flaws and How to Fix Them
19 ö Programming Flaws and How to Fix Them MICHAEL HOWARD DAVID LEBLANC JOHN VIEGA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City- Milan New Delhi San Juan Seoul Singapore
The Security Gap. Philip Young aka Soldier of Fortran @mainframed767
The Security Gap Philip Young aka Soldier of Fortran @mainframed767 DISCLAIMER All research was done under personal time. I am not here in the name of, or on behalf of, my employer. Any views expressed
How to Instrument for Advanced Web Application Penetration Testing
How to Instrument for Advanced Web Application Penetration Testing Table of Contents 1 Foreword... 3 2 Problem... 4 3 Background... 4 3.1 Dynamic Application Security Testing (DAST)... 4 3.2 Static Application
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.035, Fall 2005 Handout 7 Scanner Parser Project Wednesday, September 7 DUE: Wednesday, September 21 This
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat
Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat Acknowledgments : This tutorial is based on a series of articles written by James Goodwill about Tomcat && Servlets. 1 Tomcat
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
15-415 Database Applications Recitation 10. Project 3: CMUQFlix CMUQ s Movies Recommendation System
15-415 Database Applications Recitation 10 Project 3: CMUQFlix CMUQ s Movies Recommendation System Project Objective 1. Set up a front-end website with PostgreSQL back-end 2. Allow users to login, like
