Static Analysis

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 56580 Experts worldwide ranked by ideXlab platform

Flemming Nielson - One of the best experts on this subject based on the ideXlab platform.

  • Static Analysis for proactive security
    Computing and Software Science, 2019
    Co-Authors: Michael Huth, Flemming Nielson
    Abstract:

    We reflect on current problems and practices in system security, distinguishing between reactive security – which deals with vulnerabilities as they are being exploited – and proactive security – which means to make vulnerabilities un-exploitable by removing them from a system entirely. Then we argue that Static Analysis is well poised to support approaches to proactive security, since it is sufficiently expressive to represent many vulnerabilities yet sufficiently efficient to detect vulnerabilities prior to system deployment. We further show that Static Analysis interacts well with both confidentiality and integrity aspects and discuss what security assurances it can attain. Next we argue that security models such as those for access control can also be Statically analyzed to support proactive security of such models. Finally, we identify research problems in Static Analysis whose solutions would stand to improve the effectiveness and adoption of Static Analysis for proactive security in the practice of designing, implementing, and assuring future ICT systems.

  • Computing and Software Science - Static Analysis for Proactive Security
    Lecture Notes in Computer Science, 2019
    Co-Authors: Michael Huth, Flemming Nielson
    Abstract:

    We reflect on current problems and practices in system security, distinguishing between reactive security – which deals with vulnerabilities as they are being exploited – and proactive security – which means to make vulnerabilities un-exploitable by removing them from a system entirely. Then we argue that Static Analysis is well poised to support approaches to proactive security, since it is sufficiently expressive to represent many vulnerabilities yet sufficiently efficient to detect vulnerabilities prior to system deployment. We further show that Static Analysis interacts well with both confidentiality and integrity aspects and discuss what security assurances it can attain. Next we argue that security models such as those for access control can also be Statically analyzed to support proactive security of such models. Finally, we identify research problems in Static Analysis whose solutions would stand to improve the effectiveness and adoption of Static Analysis for proactive security in the practice of designing, implementing, and assuring future ICT systems.

  • IFM - Model checking as Static Analysis: revisited
    Lecture Notes in Computer Science, 2012
    Co-Authors: Fuyuan Zhang, Flemming Nielson, Hanne Riis Nielson
    Abstract:

    We show that the model checking problem of the μ-calculus can be viewed as an instance of Static Analysis. We propose Succinct Fixed Point Logic (SFP) within our logical approach to Static Analysis as an extension of Alternation-free Least Fixed Logic (ALFP). We generalize the notion of stratification to weak stratification and establish a Moore Family result for the new logic as well. The semantics of the μ-calculus is encoded as the intended model of weakly stratified clause sequences in SFP.

  • Static Analysis for systems biology
    2004
    Co-Authors: Flemming Nielson, Hanne Riis Nielson, Corrado Priami, Debora Schuch Da Rosa
    Abstract:

    This paper shows how Static Analysis techniques can help understanding biological systems. Based on a simple example will illustrate the outcome of performing three different analyses extracting information of increasing precision. We conclude by reporting on the potential impact and exploitation of these techniques in systems biology.

Satoshi Hada - One of the best experts on this subject based on the ideXlab platform.

  • xml access control using Static Analysis
    ACM Transactions on Information and System Security, 2006
    Co-Authors: Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada
    Abstract:

    Access control policies for XML typically use regular path expressions such as XPath for specifying the objects for access-control policies. However such access-control policies are burdens to the query engines for XML documents. To relieve this burden, we introduce Static Analysis for XML access-control. Given an access-control policy, query expression, and an optional schema, Static Analysis determines if this query expression is guaranteed not to access elements or attributes that are hidden by the access-control policy but permitted by the schema. Static Analysis can be performed without evaluating any query expression against actual XML documents. Run-time checking is required only when Static Analysis is unable to determine whether to grant or deny access requests. A side effect of Static Analysis is query optimization: access-denied expressions in queries can be evaluated to empty lists at compile time. We further extend Static Analysis for handling value-based access-control policies and introduce view schemas.

  • xml access control using Static Analysis
    Computer and Communications Security, 2003
    Co-Authors: Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada
    Abstract:

    Access control policies for XML typically use regular path expressions such as XPath for specifying the objects for access control policies. However such access control policies are burdens to the engines for XML query languages. To relieve this burden, we introduce Static Analysis for XML access control. Given an access control policy, query expression, and an optional schema, Static Analysis determines if this query expression is guaranteed not to access elements or attributes that are permitted by the schema but hidden by the access control policy. Static Analysis can be performed without evaluating any query expression against an actual database. Run-time checking is required only when Static Analysis is unable to determine whether to grant or deny access requests. A nice side-effect of Static Analysis is query optimization: access-denied expressions in queries can be evaluated to empty lists at compile time. We have built a prototype of Static Analysis for XQuery, and shown the effectiveness and scalability through experiments.

Elizabeth N. Fong - One of the best experts on this subject based on the ideXlab platform.

  • SERE (Companion) - Of Massive Static Analysis Data
    2013 IEEE Seventh International Conference on Software Security and Reliability Companion, 2013
    Co-Authors: Aurelien Delaitre, Vadim Okun, Elizabeth N. Fong
    Abstract:

    The Software Assurance Metrics and Tool Evaluation (SAMATE) project at the National Institute of Standards and Technology (NIST) has organized four Static Analysis Tool Expositions (SATE). SATE is designed to advance research in Static Analysis tools that find security-relevant defects in source code. Briefly, participating tool makers run their tools on a set of programs. Researchers led by NIST analyze the tool outputs. The results and experiences are reported at a workshop. These expositions have accumulated large amounts of data. This collection allowed for the development and validation of practical metrics in regard to Static Analysis tool effectiveness and independence. In this paper, we discuss the role of the data in determining which metrics can be derived. Specifically, we detail the three characteristics test data should exhibit and explain why the data we use express each combination of two out of these three properties.

  • Proceedings of the Static Analysis Summit
    2006
    Co-Authors: Paul E. Black, Helen Gill, W Bradley Martin, Elizabeth N. Fong
    Abstract:

    These are the proceedings of a summit held in June 2006 at the National Institute of Standards and Technology (NIST). This Static Analysis Summit is one of a series of meetings in the NIST Software Assurance Measurement and Tool Evaluation (SAMATE) project. This summit convened researchers, developers, and government and industrial users to explore the state of the art in software Static Analysis tools and techniques with an emphasis on software security. It is also served as a prelude to an international summit in Spring 2007. This proceeding includes the ten papers presented, the keynote presentation, and discussion of a next summit.

Rusty Wagner - One of the best experts on this subject based on the ideXlab platform.

  • modern Static Analysis of obfuscated code
    Proceedings of the 3rd ACM Workshop on Software Protection, 2019
    Co-Authors: Rusty Wagner
    Abstract:

    Static Analysis tools have improved significantly in recent years with advances in intermediate representations, symbolic execution, constraint solving, control flow recovery, and Static data flow Analysis. Scripting of Static Analysis has improved at an even faster pace, with new APIs allowing easy access to extend or modify the building blocks that Static Analysis tools are built upon. One of code obfuscation's common goals is to make it more difficult for a reverse engineer to analyze or understand the code. With today's more powerful Static Analysis tools, what code obfuscation techniques are still effective against Static reverse engineering, and which are now easy to remove? This talk first explores how modern Static Analysis tools analyze binary code. An overview of how these tools recover a program's control flow from a binary is presented, as well as a look at the Analysis features that are available to scripts built upon them. Various obfuscation techniques are then discussed to explore the impact of modern Static Analysis tools on them. Such impacts include, obfuscation techniques that have been defeated by modern tools; scripting features that have made some obfuscation techniques easier to remove; obfuscation techniques that are still difficult for Static Analysis to resolve; code patterns that remain difficult to analyze, even with an expert reverse engineer interacting with the tool.

  • SPRO@CCS - Modern Static Analysis of Obfuscated Code
    Proceedings of the 3rd ACM Workshop on Software Protection - SPRO'19, 2019
    Co-Authors: Rusty Wagner
    Abstract:

    Static Analysis tools have improved significantly in recent years with advances in intermediate representations, symbolic execution, constraint solving, control flow recovery, and Static data flow Analysis. Scripting of Static Analysis has improved at an even faster pace, with new APIs allowing easy access to extend or modify the building blocks that Static Analysis tools are built upon. One of code obfuscation's common goals is to make it more difficult for a reverse engineer to analyze or understand the code. With today's more powerful Static Analysis tools, what code obfuscation techniques are still effective against Static reverse engineering, and which are now easy to remove? This talk first explores how modern Static Analysis tools analyze binary code. An overview of how these tools recover a program's control flow from a binary is presented, as well as a look at the Analysis features that are available to scripts built upon them. Various obfuscation techniques are then discussed to explore the impact of modern Static Analysis tools on them. Such impacts include, obfuscation techniques that have been defeated by modern tools; scripting features that have made some obfuscation techniques easier to remove; obfuscation techniques that are still difficult for Static Analysis to resolve; code patterns that remain difficult to analyze, even with an expert reverse engineer interacting with the tool.

Jungyeol Oh - One of the best experts on this subject based on the ideXlab platform.

  • lightweight Static Analysis to detect polymorphic exploit code with Static Analysis resistant technique
    International Conference on Communications, 2009
    Co-Authors: Jungyeol Oh
    Abstract:

    The general method in which attackers obtain the control authority of the remote host is through the exploit code. As network security systems have mounted the desired signatures about exploits, they have reduced damage due to the spreading and reoccurrence of the exploits. However, to avoid signature-based detection techniques, exploits employing techniques such as polymorphism and metamorphism have become more prevalent. Especially in the case of polymorphism, because there are many automation engines even if there is no special knowledge in order to make various exploits easily, the polymorphism researches need to be more actively studied. We present a new Static Analysis method for detecting the decryption routine of polymorphic exploit code. Most of decryption routines store the program counter value of remote host on a stack and use the value as the address for accessing the memory that the encrypted original code is positioned. The proposed method traces the processing steps of decryption routine as using the Static Analysis method. In the results of experiment, the proposed method can detect polymorphic exploit codes that the Static Analysis resistant techniques are used, and shows more efficient than the emulation-based method in the processing performance.

  • ICC - Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique
    2009 IEEE International Conference on Communications, 2009
    Co-Authors: Jungyeol Oh
    Abstract:

    The general method in which attackers obtain the control authority of the remote host is through the exploit code. As network security systems have mounted the desired signatures about exploits, they have reduced damage due to the spreading and reoccurrence of the exploits. However, to avoid signature-based detection techniques, exploits employing techniques such as polymorphism and metamorphism have become more prevalent. Especially in the case of polymorphism, because there are many automation engines even if there is no special knowledge in order to make various exploits easily, the polymorphism researches need to be more actively studied. We present a new Static Analysis method for detecting the decryption routine of polymorphic exploit code. Most of decryption routines store the program counter value of remote host on a stack and use the value as the address for accessing the memory that the encrypted original code is positioned. The proposed method traces the processing steps of decryption routine as using the Static Analysis method. In the results of experiment, the proposed method can detect polymorphic exploit codes that the Static Analysis resistant techniques are used, and shows more efficient than the emulation-based method in the processing performance.