Visual analysis of code security

  • Authors:
  • John R. Goodall;Hassan Radwan;Lenny Halseth

  • Affiliations:
  • A division of Applied Visions, Inc., Northport NY;Applied Visions, Inc., Northport NY;Applied Visions, Inc., Northport NY

  • Venue:
  • Proceedings of the Seventh International Symposium on Visualization for Cyber Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.