2018 IEEE International Conference on Big Data (Big Data) 2018
DOI: 10.1109/bigdata.2018.8622456
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing False Positive Source Code Vulnerabilities Using Static Analysis Tools

Abstract: Static source code analysis for the detection of vulnerabilities may generate a huge amount of results making it difficult to manually verify all of them. In addition, static code analysis yields a large number of false positives. Consequently, software developers may ignore the results of static code analysis. This paper analyzes the results of static code analysis tools to identify false positive trends per tool. The novel idea is to assist developers and analysts identify the likelihood of a finding to be a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 22 publications
(21 reference statements)
0
6
0
Order By: Relevance
“…There are also approaches that identify patterns from warnings, source code and software repositories for predicting false positives [7,9,17,17,40,45,59,71,74], and that use machine learning techniques to learn what are likely true and false positives [7, 23, 39, 45, 59, 70? ]. For example, Zhang et al automatically learned and integrated the users' feedback to rank the warnings [76].…”
Section: Related Workmentioning
confidence: 99%
“…There are also approaches that identify patterns from warnings, source code and software repositories for predicting false positives [7,9,17,17,40,45,59,71,74], and that use machine learning techniques to learn what are likely true and false positives [7, 23, 39, 45, 59, 70? ]. For example, Zhang et al automatically learned and integrated the users' feedback to rank the warnings [76].…”
Section: Related Workmentioning
confidence: 99%
“…Their expansion reduces only one false alert type by detecting the alert's name and applying a rule-based knowledge algorithm to check its truth. Authors in [4] propose a new algorithm to distinguish true positive from false-positive alerts. They try to identify the connection between the CWE and false positives to extract new rule-based patterns.…”
Section: E Rule Based Approachesmentioning
confidence: 99%
“…• The inability of the SAT to get knowledge about the software architecture, its dependencies, and the manner of how data flows through the system, which may result in throwing FP alerts considered as potential errors [4].…”
Section: Introductionmentioning
confidence: 99%
“…Tools like RATS [14], Flawfinder [40], and Infer [6] are of this type. However, they produce many false positives, a problem identified early on by [2,8,15], making these tools difficult to use effectively as part of the developer tool chain.…”
Section: Related Workmentioning
confidence: 99%