Evaluating the ability of static code analysis tools to detect injection vulnerabilities
Identifying and eliminating security vulnerabilities in programs can be very time consuming. A way to automate and speed up the process is to integrate static code analysis tools in the development process. Choosing a static code analysis tool for a project is not an easy task since different tools...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Umeå universitet, Institutionen för datavetenskap
2016
|
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128302 |
id |
ndltd-UPSALLA1-oai-DiVA.org-umu-128302 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-umu-1283022016-12-02T05:11:13ZEvaluating the ability of static code analysis tools to detect injection vulnerabilitiesengRamos, AlexanderUmeå universitet, Institutionen för datavetenskap2016Identifying and eliminating security vulnerabilities in programs can be very time consuming. A way to automate and speed up the process is to integrate static code analysis tools in the development process. Choosing a static code analysis tool for a project is not an easy task since different tools have their own strengths and performance characteristics. One way of testing the qualifications of a tool for finding flaws is to test them against a test suite, constructed for the specific purpose of static code analysis tool testing. In this paper the tools Visual Code Grepper, FindBugs and SonarQube are tested for their ability to detect SQL, OS command and LDAP injection vulnerabilities against the Juliet test suite v1.2 for Java and the performance of the tools are evaluated. Since the tools have their own techniques for finding errors and vulnerabilities, diverse results are obtained where the tools show their strengths and weaknesses which are presented in tables and graphs. In general, the FindBugs tool seems to be the most suitable tool for detecting potential injections, however further studies including more test cases should be conducted to cover more of what the tools are capable of detecting. To cover most of the vulnerabilities in a program, it would be ideal to use as many tools as possible to locate the maximum amount of flaws Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128302UMNAD ; 1065application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
description |
Identifying and eliminating security vulnerabilities in programs can be very time consuming. A way to automate and speed up the process is to integrate static code analysis tools in the development process. Choosing a static code analysis tool for a project is not an easy task since different tools have their own strengths and performance characteristics. One way of testing the qualifications of a tool for finding flaws is to test them against a test suite, constructed for the specific purpose of static code analysis tool testing. In this paper the tools Visual Code Grepper, FindBugs and SonarQube are tested for their ability to detect SQL, OS command and LDAP injection vulnerabilities against the Juliet test suite v1.2 for Java and the performance of the tools are evaluated. Since the tools have their own techniques for finding errors and vulnerabilities, diverse results are obtained where the tools show their strengths and weaknesses which are presented in tables and graphs. In general, the FindBugs tool seems to be the most suitable tool for detecting potential injections, however further studies including more test cases should be conducted to cover more of what the tools are capable of detecting. To cover most of the vulnerabilities in a program, it would be ideal to use as many tools as possible to locate the maximum amount of flaws |
author |
Ramos, Alexander |
spellingShingle |
Ramos, Alexander Evaluating the ability of static code analysis tools to detect injection vulnerabilities |
author_facet |
Ramos, Alexander |
author_sort |
Ramos, Alexander |
title |
Evaluating the ability of static code analysis tools to detect injection vulnerabilities |
title_short |
Evaluating the ability of static code analysis tools to detect injection vulnerabilities |
title_full |
Evaluating the ability of static code analysis tools to detect injection vulnerabilities |
title_fullStr |
Evaluating the ability of static code analysis tools to detect injection vulnerabilities |
title_full_unstemmed |
Evaluating the ability of static code analysis tools to detect injection vulnerabilities |
title_sort |
evaluating the ability of static code analysis tools to detect injection vulnerabilities |
publisher |
Umeå universitet, Institutionen för datavetenskap |
publishDate |
2016 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128302 |
work_keys_str_mv |
AT ramosalexander evaluatingtheabilityofstaticcodeanalysistoolstodetectinjectionvulnerabilities |
_version_ |
1718399167875776512 |