메뉴 건너뛰기




Volumn 46, Issue 2, 2007, Pages 265-288

A survey of static analysis methods for identifying security vulnerabilities in software systems

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; INTERFACES (COMPUTER); SECURITY OF DATA; STATIC ANALYSIS;

EID: 34250305947     PISSN: 00188670     EISSN: None     Source Type: Journal    
DOI: 10.1147/sj.462.0265     Document Type: Article
Times cited : (69)

References (87)
  • 1
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • September
    • J. H. Saltzer and M. D. Schroeder, "The Protection of Information in Computer Systems," Proceedings of the IEEE 63, No. 9, 1278-1308 (September 1975).
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 2
    • 84871806446 scopus 로고    scopus 로고
    • Common Criteria, http://www.commoncriteriaportal.org.
    • Common Criteria
  • 4
    • 34250338671 scopus 로고    scopus 로고
    • Open Web Application Security Project
    • Open Web Application Security Project, http://www.owasp.org.
  • 5
    • 34250352125 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security
    • U.S. Department of Homeland Security, http://www.dhs.gov.
  • 6
    • 34250307402 scopus 로고    scopus 로고
    • National Vulnerability Database, U.S. Commerce Department
    • National Vulnerability Database, National Institute of Standards and Technology, U.S. Commerce Department, http://nvd.nist.gov.
  • 12
    • 21644484975 scopus 로고    scopus 로고
    • Sebastopol, CA, USA, O'Reilly & Associates, Inc, June
    • A. Freeman and A. Jones, Programming .NET Security, Sebastopol, CA, USA, O'Reilly & Associates, Inc. (June 2003).
    • (2003) Programming .NET Security
    • Freeman, A.1    Jones, A.2
  • 13
    • 26444597311 scopus 로고    scopus 로고
    • Static Analysis of Role-Based Access Control in J2EE Applications
    • September
    • G. Naumovich and P. Centonze, "Static Analysis of Role-Based Access Control in J2EE Applications," SIGSOFT Software Engineering Notes 29, No. 5, 1-10 (September 2004).
    • (2004) SIGSOFT Software Engineering Notes , vol.29 , Issue.5 , pp. 1-10
    • Naumovich, G.1    Centonze, P.2
  • 24
    • 35248819232 scopus 로고    scopus 로고
    • Dimensions of Precision in Reference Analysis of Object-Oriented Languages
    • Warsaw, Poland April, invited paper
    • B. G. Ryder, "Dimensions of Precision in Reference Analysis of Object-Oriented Languages," Proceedings of the 12th International Conference on Compiler Construction, Warsaw, Poland (April 2003), pp. 126-137, invited paper.
    • (2003) Proceedings of the 12th International Conference on Compiler Construction , pp. 126-137
    • Ryder, B.G.1
  • 26
    • 34250331396 scopus 로고    scopus 로고
    • A Unified Mathematical Model for Stack- and Role-Based Authorization Systems,
    • Ph.D. dissertation, Polytechnic University, Brooklyn, NY, USA May
    • M. Pistoia, "A Unified Mathematical Model for Stack- and Role-Based Authorization Systems," Ph.D. dissertation, Polytechnic University, Brooklyn, NY, USA (May 2005).
    • (2005)
    • Pistoia, M.1
  • 30
    • 0030086382 scopus 로고    scopus 로고
    • Role-Based Access Control Models
    • February
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," IEEE Computer 29, No. 2, 38-47 (February 1996).
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 31
  • 40
    • 0017517624 scopus 로고
    • Certification of Programs for Secure Information Flow
    • July
    • D. E. Denning and P. J. Denning, "Certification of Programs for Secure Information Flow," Communications of the ACM 20, No. 7, 504-513 (July 1977).
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 41
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • D. E. Denning, "A Lattice Model of Secure Information Flow," Communications of the ACM 19, No. 5, 236-243 (May 1976).
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 42
    • 0004277741 scopus 로고    scopus 로고
    • 2nd ed, Boston, MA, USA, Birkhäuser January
    • G. Grätzer, General Lattice Theory, 2nd ed., Boston, MA, USA, Birkhäuser (January 2003).
    • (2003) General Lattice Theory
    • Grätzer, G.1
  • 44
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • San Diego, CA, USA, IEEE Computer Society February
    • J. Newsome and D. Song, "Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software," Proceedings of the 12th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, IEEE Computer Society (February 2005), http://jimnewsome.net/papers/taintcheck.pdf.
    • (2005) Proceedings of the 12th Annual Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 45
    • 0036086884 scopus 로고    scopus 로고
    • Using Programmer-Written Compiler Extensions to Catch Security Holes
    • Oakland, CA, USA, IEEE Computer Society May
    • K. Ashcraft and D. Engler, "Using Programmer-Written Compiler Extensions to Catch Security Holes," Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society (May 2002), pp. 143-159.
    • (2002) Proceedings of the 2002 IEEE Symposium on Security and Privacy , pp. 143-159
    • Ashcraft, K.1    Engler, D.2
  • 47
    • 0030370740 scopus 로고    scopus 로고
    • A Sound Type System for Secure Flow Analysis
    • January
    • D. Volpano, C. Irvine, and G. Smith, "A Sound Type System for Secure Flow Analysis," Journal of Computer Security 4, Nos. 2-3, 167-187 (January 1996).
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 50
    • 0004207406 scopus 로고    scopus 로고
    • 3rd ed, Sebastopol, CA, USA, O'Reilly and Associates, Inc, July
    • L. Wall, T. Christiansen, and J. Orwant, Programming Perl, 3rd ed., Sebastopol, CA, USA, O'Reilly and Associates, Inc. (July 2000).
    • (2000) Programming Perl
    • Wall, L.1    Christiansen, T.2    Orwant, J.3
  • 56
    • 84923564816 scopus 로고    scopus 로고
    • Finding Security Vulnerabilities in Java Applications with Static Analysis
    • V. B. Livshits and M. S. Lam, "Finding Security Vulnerabilities in Java Applications with Static Analysis," Usenix Security Symposium (2005).
    • (2005) Usenix Security Symposium
    • Livshits, V.B.1    Lam, M.S.2
  • 59
    • 34250373121 scopus 로고    scopus 로고
    • PMD
    • PMD, http://sourceforge.net/projects/pmd/.
  • 61
    • 0022605097 scopus 로고
    • Typestate: A Programming Language Concept for Enhancing Software Reliability
    • R. E. Strom and S. Yemini, "Typestate: A Programming Language Concept for Enhancing Software Reliability," IEEE Transactions on Software Engineering 12, No. 1, pp. 157-171 (1986).
    • (1986) IEEE Transactions on Software Engineering , vol.12 , Issue.1 , pp. 157-171
    • Strom, R.E.1    Yemini, S.2
  • 63
    • 17044362578 scopus 로고    scopus 로고
    • Synthesis of Interface Specifications for Java Classes
    • R. Alur, P. Cerny, P. Madhusudan, and W. Nam, "Synthesis of Interface Specifications for Java Classes," SIGPLAN Notices 40, No. 1, pp. 98-109 (2005).
    • (2005) SIGPLAN Notices , vol.40 , Issue.1 , pp. 98-109
    • Alur, R.1    Cerny, P.2    Madhusudan, P.3    Nam, W.4
  • 64
    • 0027592833 scopus 로고
    • Extending Typestate Checking Using Conditional Liveness Analysis
    • May
    • R. E. Strom and D. M. Yellin, "Extending Typestate Checking Using Conditional Liveness Analysis," IEEE Transactions on Software Engineering 19, No. 5, 478-485 (May 1993).
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.5 , pp. 478-485
    • Strom, R.E.1    Yellin, D.M.2
  • 70
    • 1442288804 scopus 로고    scopus 로고
    • ACM SIGPLAN Notices 38, No. 5, 129-140 (May 2003), in Conference on Programming Language Design and Implementation (PLDI)
    • A. Aiken, J. S. Foster, J. Kodumal, and T. Terauchi, "Checking and Inferring Local Non-aliasing," ACM SIGPLAN Notices 38, No. 5, 129-140 (May 2003), in Conference on Programming Language Design and Implementation (PLDI).
    • Aiken, A.1    Foster, J.S.2    Kodumal, J.3    Terauchi, T.4
  • 72
    • 84894630000 scopus 로고    scopus 로고
    • Proceedings of 8th International SPIN Workshop of Model Checking of Software (SPIN 2001), in Lecture Notes in Computer Science
    • T. Ball and S. K. Rajamani, "Automatically Validating Temporal Safety Properties of Interfaces," Proceedings of 8th International SPIN Workshop of Model Checking of Software (SPIN 2001), in Lecture Notes in Computer Science 2057, 103-122 (2001).
    • (2001) , vol.2057 , pp. 103-122
    • Ball, T.1    Rajamani, S.K.2
  • 74
    • 0036040604 scopus 로고    scopus 로고
    • ACM SIG PLAN Notices 37, No. 5, 57-68 (May 2002), in Conference on Programming Language Design and Implementation (PLDI)
    • M. Das, S. Lerner, and M. Seigle, "ESP: Path-Sensitive Program Verification in Polynomial Time," ACM SIG PLAN Notices 37, No. 5, 57-68 (May 2002), in Conference on Programming Language Design and Implementation (PLDI).
    • Das, M.1    Lerner, S.2    Seigle, M.3
  • 77
    • 35248866218 scopus 로고    scopus 로고
    • J. Field, D. Goyal, G. Ramalingam, and E. Yahav, Typestate Verification: Abstraction Techniques and Complexity Results, Proceedings of Static Analysis Symposium (SAS'03), in Lecture Notes in Computer Science 2694, 439-462 (June 2003).
    • J. Field, D. Goyal, G. Ramalingam, and E. Yahav, "Typestate Verification: Abstraction Techniques and Complexity Results," Proceedings of Static Analysis Symposium (SAS'03), in Lecture Notes in Computer Science 2694, 439-462 (June 2003).
  • 79
    • 21144449292 scopus 로고    scopus 로고
    • Establishing Local Temporal Heap Safety Properties with Applications to Compile-Time Memory Management
    • R. Shaham, E. Yahav, E. Kolodner, and M. Sagiv, "Establishing Local Temporal Heap Safety Properties with Applications to Compile-Time Memory Management," Proceedings of Static Analysis Symposium (2003), pp. 483-503, http://link.springer.de/link/service/series/0558 /bibs/2694/26940483.htm.
    • (2003) Proceedings of Static Analysis Symposium , pp. 483-503
    • Shaham, R.1    Yahav, E.2    Kolodner, E.3    Sagiv, M.4
  • 83
    • 0036039066 scopus 로고    scopus 로고
    • The SLAM Project: Debugging System Software via Static Analysis
    • Jan
    • T. Ball and S. K. Rajamani, "The SLAM Project: Debugging System Software via Static Analysis," ACM SIGPLAN Notices 37, No. 1, pp. 1-3 (Jan. 2002).
    • (2002) ACM SIGPLAN Notices , vol.37 , Issue.1 , pp. 1-3
    • Ball, T.1    Rajamani, S.K.2
  • 85
    • 34250326521 scopus 로고    scopus 로고
    • 18th European Conference on Object-Oriented Programming (ECOOP), in Lecture Notes in Computer Science
    • June
    • R. DeLine and M. Fähndrich, "Typestates for Objects," 18th European Conference on Object-Oriented Programming (ECOOP), in Lecture Notes in Computer Science 3086, (June 2004), 465-490.
    • (2004) , vol.3086 , pp. 465-490
    • DeLine, R.1    Fähndrich, M.2
  • 86
    • 0036039550 scopus 로고    scopus 로고
    • ACM SIGPLAN Notices 37, No. 5, 13-24 (May 2002), in Conference on Programming Language Design and Implementation (PLDI)
    • M. Fähndrich and R. DeLine, "Adoption and Focus: Practical Linear Types for Imperative Programming," ACM SIGPLAN Notices 37, No. 5, 13-24 (May 2002), in Conference on Programming Language Design and Implementation (PLDI).
    • Fähndrich, M.1    DeLine, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.