Continuous Flow Analysis to Detect Security Problems
SP Reiss - arXiv preprint arXiv:1909.13683, 2019 - arxiv.org
SP Reiss
arXiv preprint arXiv:1909.13683, 2019•arxiv.orgWe introduce a tool that supports continuous flow analysis in order to detect security
problems as the user edits. The tool uses abstract interpretation over both byte codes and
abstract syntax trees to trace the flow of both type annotations and system states from their
sources to security problems. The flow analysis achieves a balance between performance
and accuracy in order to detect security vulnerabilities within seconds, and uses incremental
update to provide immediate feedback to the programmer. Resource files are used to specify …
problems as the user edits. The tool uses abstract interpretation over both byte codes and
abstract syntax trees to trace the flow of both type annotations and system states from their
sources to security problems. The flow analysis achieves a balance between performance
and accuracy in order to detect security vulnerabilities within seconds, and uses incremental
update to provide immediate feedback to the programmer. Resource files are used to specify …
We introduce a tool that supports continuous flow analysis in order to detect security problems as the user edits. The tool uses abstract interpretation over both byte codes and abstract syntax trees to trace the flow of both type annotations and system states from their sources to security problems. The flow analysis achieves a balance between performance and accuracy in order to detect security vulnerabilities within seconds, and uses incremental update to provide immediate feedback to the programmer. Resource files are used to specify the specific security constraints of an application and to tune the analysis. The system can also provide detailed information to the programmer as to why it flagged a particular problem. The tool is integrated into the Code Bubbles development environment.
arxiv.org
Showing the best result for this search. See all results