Global variable security analysis
    1.
    发明授权
    Global variable security analysis 失效
    全局变量安全性分析

    公开(公告)号:US08656496B2

    公开(公告)日:2014-02-18

    申请号:US12951435

    申请日:2010-11-22

    IPC分类号: G06F11/07 G06F9/455

    摘要: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.

    摘要翻译: 一种方法包括确定在所述程序中选择的全局变量,通过所述程序,所选择的全局变量的流程将被跟踪。 所选的全局变量小于程序中的所有全局变量。 该方法包括使用对程序执行的静态分析,跟踪所选择的全局变量的程序流程。 响应于在流中的安全敏感操作中使用的一个或多个所选择的全局变量,在相应的安全敏感操作中对所选择的全局变量中的每一个进行分析。 为了回应确定,使用可能是潜在的安全违规,报告潜在的安全违规。 还公开了装置和计算机程序产品。

    Global Variable Security Analysis
    2.
    发明申请
    Global Variable Security Analysis 失效
    全局变量安全分析

    公开(公告)号:US20120131670A1

    公开(公告)日:2012-05-24

    申请号:US12951435

    申请日:2010-11-22

    IPC分类号: G06F21/00

    摘要: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.

    摘要翻译: 一种方法包括确定在所述程序中选择的全局变量,通过所述程序,所选择的全局变量的流程将被跟踪。 所选的全局变量小于程序中的所有全局变量。 该方法包括使用对程序执行的静态分析,跟踪所选择的全局变量的程序流程。 响应于在流中的安全敏感操作中使用的一个或多个所选择的全局变量,在相应的安全敏感操作中对所选择的全局变量中的每一个进行分析。 为了回应确定,使用可能是潜在的安全违规,报告潜在的安全违规。 还公开了装置和计算机程序产品。

    Generating specifications of client-server applications for static analysis
    3.
    发明授权
    Generating specifications of client-server applications for static analysis 失效
    生成用于静态分析的客户端 - 服务器应用程序的规范

    公开(公告)号:US08434070B2

    公开(公告)日:2013-04-30

    申请号:US12912345

    申请日:2010-10-26

    IPC分类号: G06F9/44 G06F9/45

    CPC分类号: G06F8/30

    摘要: Systems and methods are provided for creating a data structure associated with a software application that is based on at least one framework. According to the method, source code and at least one configuration file of the software application is analyzed by at least one framework-specific processor so as to determine entry point information indicating entry points in the source code, request attribute access information indicating where attributes attached to a request data structure are read and written, and forward information indicating forwards performed by the software application. A data structure for a static analysis engine is created based on this information. The data structure includes a list of synthetic methods that model framework-related behavior of the software application, and a list of entry points indicating the synthetic methods and/or application methods of the software application that can be invoked by the framework.

    摘要翻译: 系统和方法被提供用于创建与基于至少一个框架的软件应用相关联的数据结构。 根据该方法,由至少一个特定于框架的处理器分析软件应用的源代码和至少一个配置文件,以便确定指示源代码中的入口点的入口点信息,指示附加属性的属性访问信息 读取和写入请求数据结构,以及指示由软件应用执行的转发的转发信息。 基于此信息创建静态分析引擎的数据结构。 数据结构包括对软件应用程序的框架相关行为进行建模的综合方法列表,以及指示框架可以调用的软件应用程序的合成方法和/或应用方法的入口点列表。

    STATIC ANALYSIS OF CLIENT-SERVER APPLICATIONS USING FRAMEWORK INDEPENDENT SPECIFICATIONS
    4.
    发明申请
    STATIC ANALYSIS OF CLIENT-SERVER APPLICATIONS USING FRAMEWORK INDEPENDENT SPECIFICATIONS 审中-公开
    使用框架独立规范的客户端服务器应用的静态分析

    公开(公告)号:US20120102474A1

    公开(公告)日:2012-04-26

    申请号:US12912382

    申请日:2010-10-26

    IPC分类号: G06F9/45

    CPC分类号: G06F8/75

    摘要: Systems and methods are provided for statically analyzing a software application that is based on at least one framework. According to the method, source code of the software application and a specification associated with the software application are analyzed. The specification includes a list of synthetic methods that model framework-related behavior of the software application, and a list of entry points indicating the synthetic methods and/or application methods of the software application that can be invoked by the framework. Based on the source code and the specification, intermediate representations for the source code and the synthetic methods are generated. Based on the intermediate representations and the specification, call graphs are generated to model which application methods of the software application invoke synthetic methods or other application methods of the software application. The software application is statically analyzed based on the call graphs and the intermediate representations so as to generate analysis results for the software application.

    摘要翻译: 提供了系统和方法,用于静态分析基于至少一个框架的软件应用程序。 根据该方法,分析软件应用的源代码和与软件应用相关的规范。 该规范包括对软件应用程序的框架相关行为进行建模的综合方法列表,以及指示框架可以调用的软件应用程序的合成方法和/或应用方法的入口点列表。 基于源代码和规范,生成源代码和合成方法的中间表示。 基于中间表示和规范,生成调用图来模拟软件应用程序的哪些应用程序调用软件应用程序的合成方法或其他应用程序。 基于调用图和中间表示静态分析软件应用程序,以生成软件应用程序的分析结果。

    Determining whether method of computer program is a validator
    5.
    发明授权
    Determining whether method of computer program is a validator 失效
    确定计算机程序的方法是否为验证程序

    公开(公告)号:US08365281B2

    公开(公告)日:2013-01-29

    申请号:US12950432

    申请日:2010-11-19

    CPC分类号: G06F21/50 G06F21/563

    摘要: An illegal pattern and a computer program having a method are received. The method has one or more return statements, and a number of basic blocks. The method is normalized so that each return statement of the target method relating to the illegal pattern returns a constant Boolean value. A first path condition and a second path condition for one or more corresponding paths is determined such that one or more corresponding basic blocks return a constant Boolean value of true for the first path condition and a constant Boolean value of false for the second path condition. An unsatisfiability of each path condition is determined using a monadic second-order logic (M2L) technique. Where the unsatisfiability of either path condition is false, the method is reported as not being a validator. Where the unsatisfiability of either path condition is true, the method is reported as being a validator.

    摘要翻译: 接收到具有方法的非法模式和计算机程序。 该方法具有一个或多个返回语句和一些基本块。 该方法被归一化,使得与非法模式相关的目标方法的每个返回语句返回一个常量布尔值。 确定用于一个或多个对应路径的第一路径条件和第二路径条件,使得一个或多个对应的基本块返回针对第一路径条件的常数布尔值为true,对于第二路径条件返回常量布尔值为假。 使用一元二阶逻辑(M2L)技术确定每个路径条件的不满足性。 如果任一路径条件的不满足性为假,则将该方法报告为不是验证器。 如果任一路径条件的不满足性为真,则将该方法报告为验证器。

    Determining whether method of computer program is a validator
    6.
    发明申请
    Determining whether method of computer program is a validator 失效
    确定计算机程序的方法是否为验证程序

    公开(公告)号:US20120131669A1

    公开(公告)日:2012-05-24

    申请号:US12950432

    申请日:2010-11-19

    IPC分类号: G06F21/00

    CPC分类号: G06F21/50 G06F21/563

    摘要: An illegal pattern and a computer program having a method are received. The method has one or more return statements, and a number of basic blocks. The method is normalized so that each return statement of the target method relating to the illegal pattern returns a constant Boolean value. A first path condition and a second path condition for one or more corresponding paths is determined such that one or more corresponding basic blocks return a constant Boolean value of true for the first path condition and a constant Boolean value of false for the second path condition. An unsatisfiability of each path condition is determined using a monadic second-order logic (M2L) technique. Where the unsatisfiability of either path condition is false, the method is reported as not being a validator. Where the unsatisfiability of either path condition is true, the method is reported as being a validator.

    摘要翻译: 接收到具有方法的非法模式和计算机程序。 该方法具有一个或多个返回语句和一些基本块。 该方法被归一化,使得与非法模式相关的目标方法的每个返回语句返回一个常量布尔值。 确定用于一个或多个对应路径的第一路径条件和第二路径条件,使得一个或多个对应的基本块返回针对第一路径条件的常数布尔值为true,对于第二路径条件返回常量布尔值为假。 使用一元二阶逻辑(M2L)技术确定每个路径条件的不满足性。 如果任一路径条件的不满足性为假,则将该方法报告为不是验证器。 如果任一路径条件的不满足性为真,则将该方法报告为验证器。

    Static Analysis Of Validator Routines
    8.
    发明申请
    Static Analysis Of Validator Routines 失效
    验证程序的静态分析

    公开(公告)号:US20120297372A1

    公开(公告)日:2012-11-22

    申请号:US13109170

    申请日:2011-05-17

    IPC分类号: G06F9/44

    摘要: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.

    摘要翻译: 一种方法包括访问具有输入字符串和一个或多个返回点的验证器程序,每个返回点返回具有两个可能值的返回值; 找到验证程序的返回点; 对于每个返回点,通过代码部分从返回点执行向后遍历,并且基于返回点的两个可能返回值中的至少一个或两个来确定对输入字符串的约束; 使用确定的输入字符串的约束,确定从一个或多个返回点返回的所有返回值是否满足验证约束; 并且输出一个或多个指示是否从返回点返回的所有返回值是否满足两个可能返回值中的一个或两个的验证约束。 还公开了装置和计算机程序产品。

    Static analysis of validator routines
    9.
    发明授权
    Static analysis of validator routines 失效
    验证程序的静态分析

    公开(公告)号:US08726246B2

    公开(公告)日:2014-05-13

    申请号:US13109170

    申请日:2011-05-17

    IPC分类号: G06F9/44

    摘要: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.

    摘要翻译: 一种方法包括访问具有输入字符串和一个或多个返回点的验证器程序,每个返回点返回具有两个可能值的返回值; 找到验证程序的返回点; 对于每个返回点,通过代码部分从返回点执行向后遍历,并且基于返回点的两个可能返回值中的至少一个或两个来确定对输入字符串的约束; 使用确定的输入字符串的约束,确定从一个或多个返回点返回的所有返回值是否满足验证约束; 并且输出一个或多个指示是否从返回点返回的所有返回值是否满足两个可能返回值中的一个或两个的验证约束。 还公开了装置和计算机程序产品。

    Policy-driven detection and verification of methods such as sanitizers and validators
    10.
    发明授权
    Policy-driven detection and verification of methods such as sanitizers and validators 失效
    政策驱动的检测和验证方法,如消毒剂和验证器

    公开(公告)号:US08572747B2

    公开(公告)日:2013-10-29

    申请号:US12950049

    申请日:2010-11-19

    IPC分类号: G06F9/455

    CPC分类号: G06F8/75 G06F21/577

    摘要: A method includes performing a static analysis on a program having sources and sinks to track string flow from the sources to the sinks. The static analysis includes, for string variables in the program that begin at sources, computing grammar of all possible string values for each of the string variables and, for methods in the program operating on any of the string variables, computing grammar of string variables returned by the methods. The static analysis also includes, in response to one of the string variables reaching a sink that performs a security-sensitive operation, comparing current grammar of the one string variable with a policy corresponding to the security-sensitive operation, and performing a reporting operation based on the comparing. Apparatus and computer program products are also disclosed.

    摘要翻译: 一种方法包括对具有源和汇的程序执行静态分析以跟踪从源到汇的字符串流。 静态分析包括对于从源头开始的程序中的字符串变量,计算每个字符串变量的所有可能的字符串值的语法,对于在任何字符串变量上运行的程序中的方法,返回的字符串变量的计算语法 通过方法。 静态分析还响应于到达执行安全敏感操作的汇点之一的字符串变量之一,将一个字符串变量的当前语法与对应于安全敏感操作的策略进行比较,并且基于 在比较上。 还公开了装置和计算机程序产品。