Proceedings of the 29th Annual Computer Security Applications Conference 2013
DOI: 10.1145/2523649.2523650
|View full text |Cite
|
Sign up to set email alerts
|

Uncovering access control weaknesses and flaws with security-discordant software clones

Abstract: Software clone detection techniques identify fragments of code that share some level of syntactic similarity. In this study, we investigate security-sensitive clone clusters: clusters of syntactically similar fragments of code that are protected by some privileges. From a security perspective, security-sensitive clone clusters can help reason about the implemented security model: given syntactically similar fragments of code, it is expected that they are protected by similar privileges. We hypothesize that clo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 26 publications
0
18
0
Order By: Relevance
“…Yamaguchi et al [28] are the first to describe the extrapolation of vulnerabilities by finding close neighbors. They, as well as Gauthier et al [9], further describe finding missing checks through anomaly detection. Modern approaches for binaries follow strategies to compare the semantics of code.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Yamaguchi et al [28] are the first to describe the extrapolation of vulnerabilities by finding close neighbors. They, as well as Gauthier et al [9], further describe finding missing checks through anomaly detection. Modern approaches for binaries follow strategies to compare the semantics of code.…”
Section: Related Workmentioning
confidence: 99%
“…The problem of finding bugs at the source code level has been addressed by a lot of researchers [9,11,12,16,28]. Professional code verification tools ensure source code quality and a number of automated bug finding proposals analyze source code to find security-critical bugs.…”
Section: Introductionmentioning
confidence: 99%
“…In future work we will look into methods how to further improve the performance. For example, an M-Tree, a data structure for fast k-nearest neighbor search in metric spaces [8], could speed up the candidate search.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…In contrast to both Merlin and Chucky, sources, sanitizers, and sinks are expressed as regular expressions as part of traversals, making it easy for the analyst to adapt them to further improve the specification. Finally, several authors employ similarity measures to determine vulnerabilities similar to a known vulnerability [17,24,42,61].…”
Section: Related Workmentioning
confidence: 99%