AutoISES: automatically inferring security specifications and detecting violations

  • Authors:
  • Lin Tan;Xiaolan Zhang;Xiao Ma;Weiwei Xiong;Yuanyuan Zhou

  • Affiliations:
  • University of Illinois, Urbana-Champaign;IBM T.J. Watson Research Center;University of Illinois, Urbana-Champaign and Pattern Insight Inc.;University of Illinois, Urbana-Champaign;University of Illinois, Urbana-Champaign and Pattern Insight Inc.

  • Venue:
  • SS'08 Proceedings of the 17th conference on Security symposium
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The importance of software security cannot be overstated. In the past, researchers have applied program analysis techniques to automatically detect security vulnerabilities and verify security properties. However, such techniques have limited success in reality because they require manually provided code-level security specifications. Manually writing and generating these code-level security specifications are tedious and error-prone. Additionally, they seldom exist in production software. In this paper, we propose a novel method and tool, called AutoISES, which Automatically Infers Security Specifications by statically analyzing source code, and then directly use these specifications to automatically detect security violations. Our experiments with the Linux kernel and Xen demonstrated the effectiveness of this approach - AutoISES automatically generated 84 security specifications and detected 8 vulnerabilities in the Linux kernel and Xen, 7 of which have already been confirmed by the corresponding developers.