DEVELOPMENT OF INJECTION VULNERABILITY DETECTION IN STATIC ANALYSIS TOOL FOR MULTI- PROGRAMMING LANGUAGE

In the software development process, vulnerabilities often emerge predominantly during the implementation phase. However, these vulnerabilities are frequently only identified when testing takes place. The longer it takes to detect vulnerabilities, the greater their potential impact becomes, both...

Full description

Saved in:
Bibliographic Details
Main Author: Nail Wibowo, Fakhri
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/76889
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:76889
spelling id-itb.:768892023-08-21T07:43:29ZDEVELOPMENT OF INJECTION VULNERABILITY DETECTION IN STATIC ANALYSIS TOOL FOR MULTI- PROGRAMMING LANGUAGE Nail Wibowo, Fakhri Indonesia Final Project static analysis, abstract syntax tree, data flow graph, taint analysis INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/76889 In the software development process, vulnerabilities often emerge predominantly during the implementation phase. However, these vulnerabilities are frequently only identified when testing takes place. The longer it takes to detect vulnerabilities, the greater their potential impact becomes, both from a business and technological perspective. Hence, code reviews are commonly employed as a form of static analysis to swiftly capture vulnerabilities and errors. Nevertheless, in some cases, code review alone falls short, necessitating the assistance of automated static analysis methods using specialized tools. With such tools, developers can perform static analysis more rapidly and comprehensively, thereby significantly increasing the likelihood of promptly identifying vulnerabilities. This research aims to develop a static analysis tool focusing on the detection of injection vulnerabilities across four programming languages: Python, PHP, Java, and Javascript. The chosen approach involves employing abstract syntax trees (AST) and data flow graphs (DFG) generated from source code as intermediate representations and performing taint analysis to uncover vulnerabilities within these representations. Upon evaluating the tool's performance, it is revealed that the tool built upon the AST and DFG intermediate representations effectively detects injection vulnerabilities. The evaluation also uncovers the causes behind false positives and false negatives, accompanied by recommendations for mitigating these occurrences. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description In the software development process, vulnerabilities often emerge predominantly during the implementation phase. However, these vulnerabilities are frequently only identified when testing takes place. The longer it takes to detect vulnerabilities, the greater their potential impact becomes, both from a business and technological perspective. Hence, code reviews are commonly employed as a form of static analysis to swiftly capture vulnerabilities and errors. Nevertheless, in some cases, code review alone falls short, necessitating the assistance of automated static analysis methods using specialized tools. With such tools, developers can perform static analysis more rapidly and comprehensively, thereby significantly increasing the likelihood of promptly identifying vulnerabilities. This research aims to develop a static analysis tool focusing on the detection of injection vulnerabilities across four programming languages: Python, PHP, Java, and Javascript. The chosen approach involves employing abstract syntax trees (AST) and data flow graphs (DFG) generated from source code as intermediate representations and performing taint analysis to uncover vulnerabilities within these representations. Upon evaluating the tool's performance, it is revealed that the tool built upon the AST and DFG intermediate representations effectively detects injection vulnerabilities. The evaluation also uncovers the causes behind false positives and false negatives, accompanied by recommendations for mitigating these occurrences.
format Final Project
author Nail Wibowo, Fakhri
spellingShingle Nail Wibowo, Fakhri
DEVELOPMENT OF INJECTION VULNERABILITY DETECTION IN STATIC ANALYSIS TOOL FOR MULTI- PROGRAMMING LANGUAGE
author_facet Nail Wibowo, Fakhri
author_sort Nail Wibowo, Fakhri
title DEVELOPMENT OF INJECTION VULNERABILITY DETECTION IN STATIC ANALYSIS TOOL FOR MULTI- PROGRAMMING LANGUAGE
title_short DEVELOPMENT OF INJECTION VULNERABILITY DETECTION IN STATIC ANALYSIS TOOL FOR MULTI- PROGRAMMING LANGUAGE
title_full DEVELOPMENT OF INJECTION VULNERABILITY DETECTION IN STATIC ANALYSIS TOOL FOR MULTI- PROGRAMMING LANGUAGE
title_fullStr DEVELOPMENT OF INJECTION VULNERABILITY DETECTION IN STATIC ANALYSIS TOOL FOR MULTI- PROGRAMMING LANGUAGE
title_full_unstemmed DEVELOPMENT OF INJECTION VULNERABILITY DETECTION IN STATIC ANALYSIS TOOL FOR MULTI- PROGRAMMING LANGUAGE
title_sort development of injection vulnerability detection in static analysis tool for multi- programming language
url https://digilib.itb.ac.id/gdl/view/76889
_version_ 1822995106738733056