Enviar búsqueda
Cargar
[論文紹介] VCC-Finder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
•
0 recomendaciones
•
784 vistas
Kenta Yamamoto
Seguir
セキュリティカンファレンス ACM CCS 2015 http://www.sigsac.org/ccs/CCS2015/ にて発表
Leer menos
Leer más
Educación
Denunciar
Compartir
Denunciar
Compartir
1 de 28
Descargar ahora
Descargar para leer sin conexión
Recomendados
An Empirical Study on Bounded Model Checking
An Empirical Study on Bounded Model Checking
Stefano Dalla Palma
Analyzing the Dolphin-emu project
Analyzing the Dolphin-emu project
PVS-Studio
VHDL Programs
VHDL Programs
A B Shinde
Digital Security by Design: Formal modelling of, and reasoning about, CHERI -...
Digital Security by Design: Formal modelling of, and reasoning about, CHERI -...
KTN
100 bugs in Open Source C/C++ projects
100 bugs in Open Source C/C++ projects
Andrey Karpov
PVS-Studio. Static code analyzer. Windows/Linux, C/C++/C#. 2017
PVS-Studio. Static code analyzer. Windows/Linux, C/C++/C#. 2017
Andrey Karpov
CodeChecker Overview Nov 2019
CodeChecker Overview Nov 2019
Olivera Milenkovic
1 Vampir Overview
1 Vampir Overview
PTIHPA
Recomendados
An Empirical Study on Bounded Model Checking
An Empirical Study on Bounded Model Checking
Stefano Dalla Palma
Analyzing the Dolphin-emu project
Analyzing the Dolphin-emu project
PVS-Studio
VHDL Programs
VHDL Programs
A B Shinde
Digital Security by Design: Formal modelling of, and reasoning about, CHERI -...
Digital Security by Design: Formal modelling of, and reasoning about, CHERI -...
KTN
100 bugs in Open Source C/C++ projects
100 bugs in Open Source C/C++ projects
Andrey Karpov
PVS-Studio. Static code analyzer. Windows/Linux, C/C++/C#. 2017
PVS-Studio. Static code analyzer. Windows/Linux, C/C++/C#. 2017
Andrey Karpov
CodeChecker Overview Nov 2019
CodeChecker Overview Nov 2019
Olivera Milenkovic
1 Vampir Overview
1 Vampir Overview
PTIHPA
優れたビデオゲームに共通する不変の法則
優れたビデオゲームに共通する不変の法則
Kenta Yamamoto
私たちは何を Web っぽいと感じているのか
私たちは何を Web っぽいと感じているのか
Kenta Yamamoto
20110804 ui14課題
20110804 ui14課題
Kenta Yamamoto
東日本大震災後の訪日外国人数の変移_2011.3
東日本大震災後の訪日外国人数の変移_2011.3
Kenta Yamamoto
20110805 ui14課題2
20110805 ui14課題2
Kenta Yamamoto
文字コードとセキュリティ
文字コードとセキュリティ
Kenta Yamamoto
良いUrlを設計する
良いUrlを設計する
Kenta Yamamoto
Tips for bash script
Tips for bash script
Kenta Yamamoto
文字コード入門 理論編 クイズ付き
文字コード入門 理論編 クイズ付き
Takao Baba
Rouault imbert alpc_rpc_pacsec
Rouault imbert alpc_rpc_pacsec
PacSecJP
Secure Programming And Common Errors[Michele Orru Dec 2008]
Secure Programming And Common Errors[Michele Orru Dec 2008]
Michele Orru'
Parsing and Type checking all 2^10000 configurations of the Linux kernel
Parsing and Type checking all 2^10000 configurations of the Linux kernel
chk49
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability Detection
Lionel Briand
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
OW2
REX CraftConf 2022 / Supply Chain Attack
REX CraftConf 2022 / Supply Chain Attack
Yvan PHELIZOT
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Timur Bagirov
Importance of having a vulnerability management | Vfeed
Importance of having a vulnerability management | Vfeed
DNIF
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...
Stefano Dalla Palma
Never Trust Your Inputs
Never Trust Your Inputs
Alexander Bolshev
MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)
MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)
Alexandre Borges
Bridging the Pervasive Computing Gap: An Aggregate Perspective
Bridging the Pervasive Computing Gap: An Aggregate Perspective
Roberto Casadei
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
AnilKumar109331
Más contenido relacionado
Destacado
優れたビデオゲームに共通する不変の法則
優れたビデオゲームに共通する不変の法則
Kenta Yamamoto
私たちは何を Web っぽいと感じているのか
私たちは何を Web っぽいと感じているのか
Kenta Yamamoto
20110804 ui14課題
20110804 ui14課題
Kenta Yamamoto
東日本大震災後の訪日外国人数の変移_2011.3
東日本大震災後の訪日外国人数の変移_2011.3
Kenta Yamamoto
20110805 ui14課題2
20110805 ui14課題2
Kenta Yamamoto
文字コードとセキュリティ
文字コードとセキュリティ
Kenta Yamamoto
良いUrlを設計する
良いUrlを設計する
Kenta Yamamoto
Tips for bash script
Tips for bash script
Kenta Yamamoto
文字コード入門 理論編 クイズ付き
文字コード入門 理論編 クイズ付き
Takao Baba
Destacado
(9)
優れたビデオゲームに共通する不変の法則
優れたビデオゲームに共通する不変の法則
私たちは何を Web っぽいと感じているのか
私たちは何を Web っぽいと感じているのか
20110804 ui14課題
20110804 ui14課題
東日本大震災後の訪日外国人数の変移_2011.3
東日本大震災後の訪日外国人数の変移_2011.3
20110805 ui14課題2
20110805 ui14課題2
文字コードとセキュリティ
文字コードとセキュリティ
良いUrlを設計する
良いUrlを設計する
Tips for bash script
Tips for bash script
文字コード入門 理論編 クイズ付き
文字コード入門 理論編 クイズ付き
Similar a [論文紹介] VCC-Finder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
Rouault imbert alpc_rpc_pacsec
Rouault imbert alpc_rpc_pacsec
PacSecJP
Secure Programming And Common Errors[Michele Orru Dec 2008]
Secure Programming And Common Errors[Michele Orru Dec 2008]
Michele Orru'
Parsing and Type checking all 2^10000 configurations of the Linux kernel
Parsing and Type checking all 2^10000 configurations of the Linux kernel
chk49
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability Detection
Lionel Briand
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
OW2
REX CraftConf 2022 / Supply Chain Attack
REX CraftConf 2022 / Supply Chain Attack
Yvan PHELIZOT
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Timur Bagirov
Importance of having a vulnerability management | Vfeed
Importance of having a vulnerability management | Vfeed
DNIF
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...
Stefano Dalla Palma
Never Trust Your Inputs
Never Trust Your Inputs
Alexander Bolshev
MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)
MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)
Alexandre Borges
Bridging the Pervasive Computing Gap: An Aggregate Perspective
Bridging the Pervasive Computing Gap: An Aggregate Perspective
Roberto Casadei
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
AnilKumar109331
Thesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.ppt
KavitaChhajed
Thesis_presentation.ppt
Thesis_presentation.ppt
MohdIshaq24
Thesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.ppt
AmanJohnTudu
Thesis_presentation.ppt
Thesis_presentation.ppt
Nishant Kumar
Serhiy Kalinets "Building Service Mesh with .NET Core"
Serhiy Kalinets "Building Service Mesh with .NET Core"
Fwdays
Secure Programming And Common Errors Part II
Secure Programming And Common Errors Part II
Michele Orru'
Cling the llvm based interpreter
Cling the llvm based interpreter
Roberto Nogueira
Similar a [論文紹介] VCC-Finder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
(20)
Rouault imbert alpc_rpc_pacsec
Rouault imbert alpc_rpc_pacsec
Secure Programming And Common Errors[Michele Orru Dec 2008]
Secure Programming And Common Errors[Michele Orru Dec 2008]
Parsing and Type checking all 2^10000 configurations of the Linux kernel
Parsing and Type checking all 2^10000 configurations of the Linux kernel
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability Detection
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
REX CraftConf 2022 / Supply Chain Attack
REX CraftConf 2022 / Supply Chain Attack
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Importance of having a vulnerability management | Vfeed
Importance of having a vulnerability management | Vfeed
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...
Never Trust Your Inputs
Never Trust Your Inputs
MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)
MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)
Bridging the Pervasive Computing Gap: An Aggregate Perspective
Bridging the Pervasive Computing Gap: An Aggregate Perspective
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
Thesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.ppt
Thesis_presentation.ppt
Thesis_presentation.ppt
Thesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.ppt
Thesis_presentation.ppt
Thesis_presentation.ppt
Serhiy Kalinets "Building Service Mesh with .NET Core"
Serhiy Kalinets "Building Service Mesh with .NET Core"
Secure Programming And Common Errors Part II
Secure Programming And Common Errors Part II
Cling the llvm based interpreter
Cling the llvm based interpreter
Último
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Admir Softic
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
pragatimahajan3
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Dr. Mazin Mohamed alkathiri
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
nomboosow
9548086042 for call girls in Indira Nagar with room service
9548086042 for call girls in Indira Nagar with room service
discovermytutordmt
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
GeoBlogs
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
chloefrazer622
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
agholdier
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Steve Thomason
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
Maksud Ahmed
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Chameera Dedduwage
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
RaunakKeshri1
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Celine George
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
AyushMahapatra5
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
iammrhaywood
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
Thiyagu K
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Jayanti Pande
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
dawncurless
Último
(20)
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
9548086042 for call girls in Indira Nagar with room service
9548086042 for call girls in Indira Nagar with room service
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
[論文紹介] VCC-Finder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
1.
VCC-FINDER: FINDING POTENTIALVULNERABILITIES IN
OPEN-SOURCE PROJECTSTO ASSIST CODE AUDITS : ACM CCS 2015 http:// www.sigsac.org/ccs/CCS2015/ Henning Perl, Sergej Dechand, Matthew Smith, Daniel Arp, FabianYamaguchi, Konrad Rieck, Sascha Fahl, andYasemin Acar. 2015.VCCFinder: Finding PotentialVulnerabilities in Open-Source Projects to Assist Code Audits. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15).ACM, NewYork, NY, USA, 426-437. DOI=http://dx.doi.org/ 10.1145/2810103.2813604 : KentaYamamoto <ymkjp@jaist.ac.jp>
2.
VCC VCC-Finder VCC VCC
3.
-VCC-FINDER VCC-Finder ( false-positive) “VCC” (Vulnerability-contributing
Commits): CVE GitHub 640 VCC SVM FlawFinder recall false-positive 99%
4.
- CVE 2000 1000 2010 4500 2014
8000 OSS if-statement switch-statement FlawFinder Flawfinder 53 true positive 5,460 false positive 1
5.
FlawFinder Rats, Prefast, Splint Coventry SCM
(Software configuration management) fix bug SVM C
6.
3.VCC 66 , 170,860
, 718CVE : C C++ VCC https://www.dropbox.com/s/x1shbyw0nmd2x45/vcc- database.dump?dl=0 VCC
7.
#1 e.g. CVE GitHub CVE CVE 2 1.
CVE 2. CVE ID 10% 718 CVE
8.
#2 VCC VCC Git (`git blame`
) VCC 718 CVE 640 VCC VCC 1 CVE
9.
#2VCC 1. 2. `blame` : diff 3. `blame` : fix 4.
`blame` (VCC) `blame` VCC
10.
VCC 15% VCC (96
) 3.1% (3 ) `blame` `blame` 3 e.g. Update libtool to version 2.2.8. · vadz/ libtiff@31040a3 https://github.com/vadz/libtiff/commit/ 31040a39 VCC-Finder 3.1% VCC 640 169,502 CVE
11.
3-2.VCC * 1 Git GitHub
12.
1
13.
3-2.VCC GitHub GitHub : i.e. / : 1
diff (hunk) : `bag of words` : C C++
14.
3-4. Mann-Whitney U (
; 2 ) VCC VCC * 2 p < 0.000357, 0.01/28 ( familywise error rate ) effect size ( ) : `if` 70% VCC VCC
15.
2
16.
4. VCC VCC Generality (
): Scalability ( ): Explainability ( ): Generalised Bag-of-Words Model (SVM) Git, GitHub S
17.
4-1. BAG-OF-WORDS S email φ φ: X
→ ℝ^|S|, φ: x ⟼ (b(x, s))s∈S X ,x ∈ X b(x, s) s x 0, 1 x 0
18.
4-2. 1 linear SupportVector
Machines (SVM) Linear SVM SVM LibLinear VCC-Finder Linear SVM LibLinear 2 VCC ω ω φ(x) ω φ(x) f(x) = (x), ω = Σs∈S ωs b(x, s) cf. Linear SVM VCC C = 1, W = 100
19.
5. SVM (-2011) vs. (2011-2014)
cf. (TP): SVM CVE-2012-2119, Linux Karnel. , , `socket` CVE-2013-0862, FFmpeg. , 1 CVE-2014-1438, Linux Karnel. , , , `__input` `user` CVE-2014-0148 Qemu. "opaque", "*bs", "bytes" (FP) : CVE VCC FFmpeg cca1a42653 . : , ,
20.
(precision) - (recall) 1 (combined)
21.
VCC-FINDER FLAWFINDER 2 VCC-Finder
vs. Flawfinder (precision) - (recall) Flawfinder
22.
: PRECISION-RECALL CURVE Precision
(P), Recall (R), true positives (Tp), false positive (Fp), false negative (Fn) P = Tp / (Tp + Fp) R = Tp / (Fp + Fn) Ref.“Image Matching in Large Scale Indoor Environment” - http://www.cs.cmu.edu/~hebert/ indexing.html
23.
VCC-FINDER VCC goto `goto` `out` `error` SVM
`-EINVAL` C goto goto `exception` `error-handling` : Apple SSL/TSL https://www.imperialviolet.org/2014/02/22/applebug.html `sizeof` `len`, `length` VCC `buf`, `net`, `socket` 1% 5 ( : p < 0.0001)
24.
VCC-FINDER C, C++
25.
VCC-Finder Flawfinder C C++ 170,860 2010
2011 2014 Flawfinder 99% 219 53 Flawfinder 5460 36 VCC Flawfinder
26.
APPENDIX: C C++ (Linux, Kerberos,
OpenSSL, etc.) 66 GitHub Portspoof, GnuPG, Kerberos, PHP, MapServer, HHVM, Mozilla Gecko, Quagga, libav, Libreswan, Redland Raptor RDF syntax library, charybdis, Jabberd2, ClusterLabs pacemaker, bdwgc, pango, qemu, glibc, OpenVPN, torque, curl, jansson, PostgreSQL, corosync, tinc, FFmpeg, nedmalloc, mosh, trojita, inspircd, nspluginwrapper, cherokee webserver, openssl, libfep, quassel, polarssl, radvd, tntnet,Android Platform Bionic, uzbl, LibRaw, znc, nbd, Pidgin,V8, SpiderLabs ModSecurity, file, graphviz, Linux Kernel, libti, ZRTPCPP, taglib, suhosin, Phusion passenger, monkey, memcached, lxc, libguestfs, libarchive, Beanstalkd, Flac, libX11, Xen, libvirt,Wireshark, and Apache HTTPD
27.
1. (e.g. ref. https://twitter.com/ neubig/status/712857703241089024 )
VCC Flawfinder recall precision 99% 2 CVE CVE-ID CVE Linear SVM 2. Git 4. 5 5. Prophet VCC-Finder ref. http://people.csail.mit.edu/fanl/papers/prophet-popl16.pdf
28.
THANKYOU FORYOUR ATTENTION Donating to
OpenSSL https://www.openssl.org/support/donations.html
Descargar ahora