2018-125
2018-125
Software Integrity Tester
JOSEPH N. ANTAKI, ABBY E. BEIZER, EDWARD F. KLEIN, SEAN D. LAWTON, KRISTELLE JEAN M. LUCERO,and JAMIE T. WALDER
Many computer programs have vulnerabilities that may be exploited by malicious parties. Several of these vulnerabilities are a result of the developer’s coding style. Whether they arise from oversight or lack of knowledge, these vulnerabilities pose a serious threat to the integrity of a system.
Our research was to explore whether an efficient Software Integrity Tester (SIT) could be developed to search through developer code and present warnings if specific vulnerabilities are detected.
Research into vulnerability detection and existing detection tools yielded the finding that many available static analysis tools focus on one or few languages. We wanted to allow for future expansion to a large computer programming language set, starting with Ada, C++, and Java. Open-source static analysis tools also tend towards hard-coded vulnerability analysis, causing the addition of new vulnerabilities over time to require knowledge of the tool’s codebase. We wanted a design to be updatable using Java reflection, allowing the creation of an analysis algorithm to be added to the SIT’s vulnerability database without altering related source code. To detect vulnerabilities, we parse code for patterns and regular expressions. Research into designs that render code exploitable was necessary in determining the best methods of detecting common vulnerabilities and preventing the SIT from generating false warnings. Suggested mitigation strategies for the detected vulnerabilities are shared with the SIT’s user based on detection solutions.
College of Science & Mathematics
Main Menu
- Computer Science
- Academic Programs
- BS Computer Science
- BA Computing & Informatics
- BA Computer Systems Technology
- MS Computer Science
- MS Cybersecurity
- MS Data Science
- PhD Data Science
- Minor in Computer Science
- Minor in Data Science
- Accelerated Dual Degree Program
- Certificates of Undergraduate Study
- Certificates of Graduate Study
- Concentrations BS CS
- Concentrations BA C&I
- Cybersecurity
- Data Science
- Compare University Computing Programs
- Compare our Undergraduate Programs
- Advising Materials
- Undergraduate
- BS Computer Science
- BA Computing & Informatics
- BA Computer Systems Technology
- Certificate of Undergraduate Studies
- Computer Programming
- Mobile Apps CUGS
- Fundamental Computing CUGS
- Cybersecurity
- Blockchain Technologies and Cryptocurrencies
- Advanced Network Technology
- Azure Fundamentals
- Cybersecurity in Information Technology
- Database Development
- Database Fundamentals
- Digital Forensics
- Ethical Hacking
- Internet of Things
- Intrusion Detection/Prevention
- Linux Systems Administration
- Network Fundamentals
- Operating Systems Fundamentals
- Minor Degrees
- CS Undergraduate Catalog
- Graduate
- "4+1" (ADDP)
- Program Guides
- BS Computer Science
- BS Data Science
- Minor in Computer Science
- Concentrations
- CUGS Guides
- Advanced Network Technology
- Azure Fundamentals
- Blockchain Technologies & Cryptocurrencies
- Computer Programming
- Cybersecurity
- Cybersecurity in Information Technology
- Database Development
- Database Fundamentals
- Digital Forensics
- Ethical Hacking
- Fundamental Computing
- Internet of Things
- Intrusion Detection/Prevention
- Linux Systems Administration
- Mobile Application Development
- Network Fundamentals
- Operating Systems Funamentals
- 4+1 Programs
- MS Computer Science
- MS Cybersecurity
- COGS Guides
- MS Data Science
- Standard Course Syllabi
- Forms & Policies
- Undergraduate
- Faculty and Staff
- Students
- Research
- News
- Events
- Contacts
- Faculty Portal - secured
- Site Index
- Can't find it?
- Computer Science