SVR-Miner: Mining Security Validation Rules and Detecting Violations in Large Software

Bin Liang,Subin Xie,Wenchang Shi,Zhaohui Liang,Hong Chen
2011-01-01
China Communications
Abstract:For various reasons, many of the security programming rules applicable to specific software have not been recorded in official documents, and hence can hardly be employed by static analysis tools for detection. In this paper, we propose a new approach, named SW-Miner (Security Validation Rules Miner), which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language. Different from the past works in this area, SVR-Miner introduces three techniques which are sensitive thread, program slicing [5-7], and equivalent statements computing to improve the accuracy of rules. Experiments with the Linux Kernel demonstrate the effectiveness of our approach. With the ten given sensitive threads, SW-Miner automatically generated 17 security validation rules and detected 8 violations, 5 of which were published by Linux Kernel Organization before we detected them. We have reported the other three to the Linux Kernel Organization recently.
What problem does this paper attempt to address?