Home // SOFTENG 2017, The Third International Conference on Advances and Trends in Software Engineering // View article


Integrating Static Taint Analysis in an Iterative Software Development Life Cycle

Authors:
Thomas Lie
Pål Ellingsen

Keywords: Taint Analysis; iterative development; software security; injection attacks

Abstract:
Web applications expose their host systems to the end-user. The nature of this exposure makes all Web applications susceptible to security vulnerabilities in various ways. Two of the top problems are information flow based, namely injection and cross-site scripting. A way to detect information flow based security flaws is by performing static taint analysis. The idea is that variables that can directly or indirectly be modified by the user are identified as tainted. If a tainted variable is used to execute a critical command, a potential security flaw is detected. In this paper, we study how to integrate static taint analysis in an iterative and incremental development process to detect information flow based security vulnerabilities.

Pages: 25 to 30

Copyright: Copyright (c) IARIA, 2017

Publication date: April 23, 2017

Published in: conference

ISSN: 2519-8394

ISBN: 978-1-61208-553-1

Location: Venice, Italy

Dates: from April 23, 2017 to April 27, 2017