发明名称 After-the-fact configuration of static analysis tools able to reduce user burden
摘要 A method includes mapping, based on a first mapping from possible security findings to possible configuration-related sources of imprecision, actual security findings from a static analysis of a program to corresponding configuration-related sources of imprecision, the mapping of the actual security findings creating a second mapping. A user is requested to configure selected ones of the configuration-related sources of imprecision from the second mapping. Responsive to a user updating configuration corresponding to the selected ones of the configuration-related sources of imprecision, security analysis results are updated for the static analysis of the program at least by determining whether one or more security findings from the security analysis results are no longer considered to be vulnerable based on the updated configuration by the user. The updated security analysis results are output. Apparatus and program products are also disclosed.
申请公布号 US9223984(B2) 申请公布日期 2015.12.29
申请号 US201314024761 申请日期 2013.09.12
申请人 GlobalFoundries Inc. 发明人 Guarnieri Salvatore A.;Pistoia Marco;Tripp Omer
分类号 G06F11/00;G06F21/57 主分类号 G06F11/00
代理机构 Harrington & Smith 代理人 Harrington & Smith
主权项 1. An apparatus, comprising: one or more memories comprising computer-readable code; one or more hardware processors, wherein the one or more hardware processors are configured, in response to execution of the computer-readable code, to cause the apparatus to perform the following: mapping, based on a first mapping from possible security findings for possible security vulnerabilities in a static analysis of a program to possible configuration-related sources of imprecision, actual security findings in security analysis results from the static analysis of the program to corresponding configuration-related sources of imprecision, the mapping of the actual security findings creating a second mapping; selecting configuration-related sources of imprecision, wherein selecting further comprises converging on a subset of the configuration-related sources of imprecision that optimizes the following two constraints: minimum number of configuration-related sources of imprecision; and maximal precision, and wherein selecting further comprises setting the subset of the configuration-related sources of imprecision as the selected configuration-related sources of imprecision; requesting a user configure the selected ones of the configuration-related sources of imprecision from the second mapping; responsive to a user updating configuration corresponding to the selected ones of the configuration-related sources of imprecision, updating security analysis results for the static analysis of the program at least by determining whether one or more security findings from the security analysis results are no longer considered to be vulnerable based on the updated configuration by the user and by removing from the security analysis results any of the one or more security findings that are no longer considered to be vulnerable based on the updated configuration by the user; and outputting the updated security analysis results.
地址 Grand Cayman KY