Questions tagged [static-analysis]

Static analysis is the examination of computer source code without executing it. Most commonly static analysis is used to find bugs or ensure conformance to coding guidelines. The classic example is a compiler which finds lexical, syntactic and even some semantic mistakes. A source code security analyzer examines source code to detect and report weaknesses that can lead to security vulnerabilities.

Static analysis is the process of detecting errors and defects in software's source code. Although manual code review is technically static analysis, the term is most commonly used to refer to an automated code review process. Static code analysis (aka static analysis security testing or SAST) inputs source texts of programs and give recommendations to the programmer on what code fragments he/she should consider. Although an automated tool can not completely replace manual review, SAST is seen as by many organizations to be a cost effective supplement.

The tasks solved by static code analysis software can be divided into 3 categories:

  1. Detecting errors in programs.
  2. Recommendations on code formatting. Some static analyzers check if the source code corresponds to code formatting standards of practice such as the number of indents in various constructs, use of spaces/tabs, etc.
  3. Metrics computation. Static code analyzers can generate numerical values for properties of software or its specifications.

http://stackoverflow.com/questions/49716/what-is-static-code-analysis

SAST tools can employ model checking, data-flow analysis, abstract interpretation, and heuristic analysis. See Brian Chess, Jacob West (Fortify Software) (2007). Secure Programming with Static Analysis. Addison-Wesley. ISBN 978-0-321-42477-8, and the National Institute of Standards and Technology (NIST) Software Assurance Metrics and Tool Evaluation (SAMATE) Project

57 questions
1
vote
0 answers

Findbugs Source Code Analyzer not able to detect vulnerabilities in JSP file?

I am using FindBugs to do source code analysis along with Find Security Bugs plugin to specifically detect security vulnerabilities like SQL Injection, XSS, etc. I installed the FindBugs plugin for Eclipse IDE and I am using the source code of known…
Krishna Pandey
  • 1,497
  • 1
  • 16
  • 26
0
votes
1 answer

Sandbox environment for "php malware" analysis

I would like to know how can I analyse an obfuscated malware php code ? I heard about cuckoo sandbox, but it seems too overwhelming for this particular task. So I decided to run a Vagrant box, install php-cli, tcpdump, ... run the php code and look…
kondor
  • 229
  • 2
  • 6
0
votes
1 answer

Open Source tool for analysing javascript for security vulnerabilities

I am completely new to this field and am a college student. I am looking for a static code analysis tool that scans the source code of a web app ( NOT the URL) for security vulnerabilities. So far i have not found a tool that scans the code, it is…
0
votes
0 answers

How to Scan Firebase Database?

I have the APK of an application and analyzed it using MobSF static analysis. It says the application talks with Firebase Database and provides a URL. Obviously, the URL is not accessible. I am new to this so trying to find tools from GitHub. Are…
0
votes
0 answers

How do you connect a piece of code in a repo to an actual user-input point in an app?

This is conceptual I know so let me know if there's a better place to ask this. I'm wondering how people can view a piece of code in a repo they aren't familiar with, or simply didn't write, and connect it to specific user-input point like a form…
Tikiyetti
  • 135
  • 5
0
votes
0 answers

What tools/checklists can help determine the presence of malicious code in a database? MS SQL specifically

Consider a scenario, where your AV / EDR software has to exclude paths of database files as suggested by vendors to avoid affecting performance or stability issues. You want to review your database for integrity with the aim to make sure that any…
0
votes
1 answer

CWE-234 - Snprintf Missing Parameter issues

We are scanning a third party library using a well know static analysis tool here. We keep getting: "Failure to Handle Missing Parameter CWE ID 234" I'm not a C developer but I can't see what is different or wrong with the examples that have been…
Smitch
  • 3
  • 1
0
votes
1 answer

Having trouble with FindBugs exclude filter

I installed FindBugs plugin in Eclipse for Source Code Analysis with FindSecurityBugs plugin to find out security issues with the code. I want to filter out certain false positives and want to exclude them in generated reports. The exclude filter is…
Krishna Pandey
  • 1,497
  • 1
  • 16
  • 26
0
votes
2 answers

Analyze Windows executable

How can I see which files, ports, URLs, etc that are used by a suspicious Windows executable.
-1
votes
2 answers

Why do static code analyzers cite CWE rather than CVE in their findings?

I am writing a paper on "The Role of Architecture and Design in Software Assurance" and a commenter asked "Provide a stronger case for using the CWE over the CVE. Explain how CVE vulnerabilities relate to the design phase and static code analysis."…
WaltHouser
  • 321
  • 1
  • 10
-1
votes
1 answer

What is the difference between "secure code review" and "secure static code analysis"?

What are the subtle differences in both - as one could say that both are almost the same... Static Code Analysis (also known as Source Code Analysis) is usually performed as part of a Code Review (also known as white-box testing) and is…
-1
votes
1 answer

Decompiling folders inside a jar file

I am in possession of a jar file that I have reason to believe has a RAT inside. I downloaded it inside of a virtual machine with jad installed and began to attempt to look at the source. I found that jad was useful for decompiling one file at a…
Stoud
  • 344
  • 1
  • 10
1 2 3
4