F4F: Taint analysis of framework-based web applications
Manu Sridharan, Shay Artzi, et al.
OOPSLA 2011
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis can detect many common vulnerabilities in Web applications, and so has attracted much attention from both the research community and industry. However, most static taint-analysis tools do not address critical requirements for an industrial-strength tool. Specifically, an industrial-strength tool must scale to large industrial Web applications, model essential Web-application code artifacts, and generate consumable reports for a wide range of attack vectors. We have designed and implemented a static Taint Analysis for Java (TAJ) that meets the requirements of industry-level applications. TAJ can analyze applications of virtually any size, as it employs a set of techniques designed to produce useful answers given limited time and space. TAJ addresses a wide variety of attack vectors, with techniques to handle reflective calls, flow through containers, nested taint, and issues in generating useful reports. This paper provides a description of the algorithms comprising TAJ, evaluates TAJ against production-level benchmarks, and compares it with alternative solutions. Copyright © 2009 ACM.
Manu Sridharan, Shay Artzi, et al.
OOPSLA 2011
Pauline J. Ollitrault, Abhinav Kandala, et al.
PRResearch
Marco Pistoia, Omer Tripp, et al.
MDM 2015
Chun Fu Chen, Jinwook Oh, et al.
ISM 2018