Defect-Detecting Technique of Continuous Integration

Peng-cheng ZHOU,Yi-jun WANG,Zhi XUE
DOI: https://doi.org/10.3969/j.issn.1002-0802.2017.02.025
2017-01-01
Abstract:Continuous integration is commonly used in today's software development.Due to the lack of security awareness and the wrong security strategy,the attacker can easily exploit defect and achieve higher rights,acquire sensitive data,execute remote command and reach other purposes.Based on introduction of the architecture and basic components of continuous integration tools,this paper focuses on the existing defects and common attack surface of the continuous integration tools,also discusses the password cracking,remote command execution,and Java deserialization vulnerabilities on this platform.By using the defect detection technology to detect these components and achieving integrated integration and implementation of automated testing platform,a more intuitive and comprehensive assessment of system security could be acquired.
What problem does this paper attempt to address?