Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering 2014
DOI: 10.1145/2635868.2635878
|View full text |Cite
|
Sign up to set email alerts
|

FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases

Abstract: Over the past years, widely used platforms such as the Java Class Library have been under constant attack through vulnerabilities that involve a combination of two taint-analysis problems: an integrity problem allowing attackers to trigger sensitive operations within the platform, and a confidentiality problem allowing the attacker to retrieve sensitive information or pointers from the results of those operations. While existing static taint analyses are good at solving either of those problems, we show that t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(22 citation statements)
references
References 14 publications
0
22
0
Order By: Relevance
“…We found this to be the case while developing FlowTwist [6], a taint-flow analysis for the detection of so-called Confused Deputies in Java. In this paper we therefore contribute a design approach that effectively separates different analysis aspects and implementations that are otherwise often interwoven.…”
Section: Introductionmentioning
confidence: 91%
“…We found this to be the case while developing FlowTwist [6], a taint-flow analysis for the detection of so-called Confused Deputies in Java. In this paper we therefore contribute a design approach that effectively separates different analysis aspects and implementations that are otherwise often interwoven.…”
Section: Introductionmentioning
confidence: 91%
“…The approach is promising, but obviously requires programmers to adopt the tools; also no papers are yet available validating their effectiveness. Others, such as Near and Jackson, and Lerch et al, [31,36] have code analysis tools to detect security defects; these work but provide only limited feedback to developers.…”
Section: Techniques To Help Teams Improvementioning
confidence: 99%
“…The main static analysis tools and frameworks which can be used for security analysis of Java Web applications are FindBugs [3,13], SFlow [14], FlowTwist [21], LAPSE+ [30], TAJ [42], Andromeda [41], Indus [17], Soot [43], Joana [11], Wala [15]; for a more comprehensive list see [28].…”
Section: Related Workmentioning
confidence: 99%
“…Challenges 1 and 2 are addressed by approaches based on taint analysis [14,18,21,23,30,41,42]. However, reports generated by these approaches typically contain data-flow analysis traces and lack control-dependency information (challenge 3), which is essential for security auditing.…”
Section: Introductionmentioning
confidence: 99%