SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
2
SafeRiver
• SME
• Independent- founded december 2005
• 18 consultants highly skilled in Software and Formal methods
• Turnover 2015: 1,5M€ (excluding R&D public fundings)
• Added Value Solutions for Embedded Systems
• Functional Safety (FuSa)
• Software Security
• Tools for FuSa and Software Security
• Packaged Services
• CIR agreed
3
Functional Safety
• Modeling rules
• Models metrology (technical debt, change management)
• Formal Proof of Functional safety requirements and System level
safety properties –
• Model- Code Equivalence
4
Software Security
• Carto-C supports Vulnerability Analysis (SVA) – Benchmarked on Juliet Database
• IFFree addresses Software architecture analysis with respect to trust/integrity
domains both for safety and security. Supports FFI analysis and helps in
interfaces mastering- ISO 26262-6
C C++
- Security Design and Coding Rules
- Security Code Production Rules
Outputs
- Attack Surface Computation
- CWE detection
- RTE, buffer OVFL
- Format string
- Command injection
- Data exposure
- SW boundaries and interactions
- Freedom from Interference analysis
- Flow analysis
Expertise Carto-C IFFree
Inputs
5
Static Analysis for SW Security:
key issues
• 150 to 200 tools
• What does mean « Perform a static analysis » ?
• Tools classification /underlying techniques
• Sound
• Unsound
• Verification objectives
• Rules Verification/Detection of Coding Rules violations
• DSIG Cert-C CERT-Java
• Detection of well known vulnerabilities
• NIST, CVE, CWE
• Run Time Errors detection
• Level of assurance and errors coverage
• Public reference
• Evaluation
6
Static tools for security:
Observations
• Results from sound tools
• Fit a small subset of security flaws
• Are subject to false positive
• But are not subject to false negatives
• Do not take the security environment into account
• Results from unsound tools
• Fit a large subset of security flaws
• Are subject to false positive
• Are subject to false negative
• Do take the security environment into account
•  Adequate tool is difficult to choose and use
Sound RTE (subset of CWE) False positive
Unsound CWE, CVE, CAPEC or
CERT C, CERT java, JavaSec, DISA
STIG
False positive and False
negative
7
Static Analysis for Security :
Configuration kits
• Detection objectives
• Eliminate most current vulnerabilities as defined by
• SANS Top25
• OWASP Top 10
• Configuration kit content
• Sets of checkers to be activated
• Detection parameters
• Definition of criticality levels
• Result filters and synthesis
• Available kits
• Klocwork for Java or C: 69 checkers for 22 CWE
• Coverity for java or C: 30 checkers for 20 CWE
8
Static Analysis for security:
Evaluation kit
• Juliet
• Is developed in SAMATE SATE project to challenge static tools
• Is composed of ~45000 C codes
• Analyzable in « flaw » and « fix » mode
• Flaw: the source code contains a flaw
• Fix: the source code contains a fix of the flaw
• Covering more than 121 main classes of CWE flaws
• Juliet User kit by SafeRiver
• Libraries Support
• libC, POSIX
• Automatic launch
• Automatic synthesis
9
Static Analysis for Security: Carto-C
• Why Carto-C ?
• Use cases
• Support of Secure Development
• Support of Security audits
• Only sound static tool to detect
• Missing input filtering
• Impact on known flaws
• Missing asset protections
• Impact on asset exposure
• Evaluation with Juliet Test base
• Internationally recognized tests base
• Independent test base
10
Carto-C
• Carto-C is a static Analyzer based on the open source
platform Frama-C, that we have specialized for Security
• Attack Surface Computation
• Format String and Injection Related Weaknesses Detection
• Risk analysis support
• Identification of assets that can be reached/controlled by malevolent
actions through attack surface
• Verification of protections
• Freedom from Interference Analysis
• Characterization of cascading failures that can be caused by
uncontrolled or malevolent interactions
• Use cases : document interactions between software that have
different integrity or assurance levels
11
Carto-C architecture
Frama-C modules
Lib C
Lib C99
Hearders
POSIX
Headers
Compilation
module
Cartography
module
Dependency
module
Cartography Data Base
Attack Surface
Format functions
Command execution
RTE-to-CWE
module
ACSL description
RTE
module
CIL modules
IFFree
module
Config.
Extractor:
Tasking
Compiler
Built
System
Ext.
GNU C
12
Added Value analysis
• Frama-C modules
• Static analysis algorithms
• RTE detection
• asserts
• Carto-C Proprietary modules for end user generic needs
• Usability for complete applications
• Stubs (ACSL description)
• False positive reduction
• Carto-C Proprietary modules for customer needs
• Attack Surface
• Detection of weaknesses according to CWE model
• Freedom From Interference analysis
13
Carto-C Feature 1
Identify Attack surface
• Attack Ways
• All the entry points and exit points methods
• The set of input / output channels
• The set of input / output data
• All the calls to external code (third party tool, open source)
• Protection functions
• Resource connection and authentication
• Authorization
• Data validation and encoding
• Events logging
• User defined declarations
• I/O functions
• Protection functions
• Trusted channels
14
Carto-C Feature 1
Identify Attack surface
• Attack objectives
• Assets of the application
• confidential, sensitive, regulated data
• secrets and keys, intellectual property, critical business data, personal data and
PI
• (user defined)
• Protection functions
• Encryption, digest
• access and authorization
• data integrity and operational security controls
• User defined declaration
• Valuable data
• Protection functions
15
Feature 2
Detect exhaustively certain classes of flaws
• Extracted from Frama-C RTE
• CWE119: Improper Restriction of Operations within the Bounds of a Memory Buffer
• CWE787
• CWE121_Stack_Based_Buffer_Overflow
• CWE122_Heap_Based_Buffer_Overflow
• CWE124_Buffer_Underwrite
• CWE125
• CWE126_Buffer_Overread
• CWE127_Buffer_Underread
• CWE664 : Improper Control of resources through lifetime
• CWE401_Improper release of memory before removing last reference
• CWE457_use of uninitialized variable
• CWE665_Improper Initialization
• CWE682: Incorrect Calculation
• CWE190: Integer Overflow or Wraparound
• CWE191: Integer Underflow or Wraparound
• CWE369: Divide_by_Zero
• CWE681: Incorrect Conversion between Numeric Types
16
Feature 2
Detect exhaustively certain classes of flaws
• Carto-C specific Plug ins/modules
• Cartography
• CWE-749: Exposed Dangerous Method or Function (format and command
execution function)
• Syntactic Verification
• CWE-628: Function Call with Incorrectly Specified Arguments
• CWE685_Function_Call_With_Incorrect_Number_of_Arguments
• CWE686:Function with Incorrect Argument Type
• CWE688_Function_Call_With_Incorrect_Variable_or_Reference_as_Argument
• Dependency analysis
• CWE-134: Uncontrolled Format String)
• CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS
Command Injection')
17
Carto C results on Juliet benchmark
CWE Entry ID CWE Entry Name Flaw test casesFlaw detect Rate Fix test casesFix detect Rate
78
Improper Neutralization of Special Elements used in an OS
Command ('OS Command Injection') 40 100% 40 100%
134 Uncontrolled Format String 30 100% 60 100%
191 Integer Underflow (Wrap or Wraparound) 29 79% 66 74%
190 Integer Overflow or Wraparound 48 75% 108 70%
681 Incorrect Conversion between Numeric Types 3 67% 3 33%
369 Divide By Zero 16 63% 36 78%
126 Buffer Over-read 23 39% 30 83%
124 Buffer Underwrite (‘Buffer Underflow’) 19 32% 32 97%
127 Buffer Under-read 21 29% 32 97%
122 Heap-based Buffer Overflow 66 21% 75 75%
121 Stack-based Buffer Overflow 48 19% 68 93%
• Carto-C specific Plug ins/modules -> detection rate 100%
• Extracted Results (underflw and overflow, buffer errors) surprising ->
open point under investigation
18
Feature 3
Exploitation of flaws
• Controllable from the attack surface entry points
۷ Example: command read from the keyboard is highly dangerous
۷ Controllability : high / low / unknown
• Observable from the attack surface exit points
• Example: password printed in a log
• Observability: high / low / unknown
19
RTE 2 CWE
• Problematic
• Formal Backend analyzers detect errors that have an unambiguous
specification
• Some analyzers detect errors wrt
• Patterns
• Rules
• CWE model is an enumeration, not a clear classification tool
• RTE2CWE module
• Maps RTE detected by Frama-C in terms of CWE flaws
• Helps for benchmarking and comparison of tools
20
Open Source Model Applicability
• Strengths
• Recognized static analyzers
• Public Static Analyzers may be evaluated
• Hard problems to be addressed by the community
• Weaknesses
• Usage restrictions of formal static analysis methods
• Language restrictions
• Requires semantic specification at language level
• Lack of interest or lack of cooperation for evaluation and
benchmarks
• Security analysis do not match directly to static analysis results
• Many customer data to be taken into account
21
Open Source Model Applicability
• Opportunities for cooperation
• Development of static analysis market
• Languages to be covered
• C++
• Java
• Script
• Relaxed analysis methods
• Confidence level requirements
• Benchmarks/labels
• Threats
• Stubs and Libraries are necessary but user does not want to pay for
• Same for « false positive » reduction
• Competition among many SMEs
22
Cyber-security References
• ANSSI (on going study)
• Development of a Referential for Static Analysis Tools labellisation
with respect to detection of cyber security flaws
• THALES Communication & Security & DGA
• Study and business case on formal methods for cryptographic
modules development, creation of a prototype
• Development of a certified XML parser, Assurance level EAL4+
• ANSSI
• Study (state of the art, security analysis) of the functional
Languages For Secure applications (LaFoSec), Development
Guide for Ocaml language and tools usage
• Development of an XML parser, with proof of robustness
(vulnerabilities detection and analysis)
23
Cyber-security References
• DGA (CORAC) 2013-2014-2015
• Cyber-security methods and tools for the future avionic platform
• SAFRAN (2013-2014)
• Code Analysis Tools Configuration (Klocwork) for CWE detection
• Development of a document of the functional security requirements for a
flight recorder, using the EBIOS method
• Airbus (2008-2010)
• Risks Analysis on the safety and the security of the information system
embedded on the Aircraft
• Security Guidelines for the information system components suppliers
(coding rules, COTS evaluation guidelines, vulnerabilities analysis
24
Formal Verification
• Use case : Verification of Design with respect to functional safety
requirements in an MBD process
25
SafeProver tool chain
ScadeSimulink CADADvel ControlBuild HLL
SafeRiver Translators
Kernel
Imperative Common Language (ICL)
Optimization
Proof Strategies
(BMC, K-Induction, IC3/PDR)
Automatic
Lemma Generation
SMT
Solvers
SAT
Solvers
26
User Accessibility
• SMT solvers are very powerful
• Deduction part
• Can solve problems with many many variables
• But users do not interact with low level formulas
• Representation of models and formulas in high level formalisms
(e.g. Simulink, SCADE, Control Build etc..)
• Translation from High level formalisms to intermediate format
• High level optimizations -> help in proof convergence
• Proof strategy -> compliance with expected results, soundness
• Automatic Lemma Generation « the hard problem »
27
Kernel is the key for user accessibility
• Kernel components importance
• Guarantee soundness of deduction parts
• Ensure convergence and mastering of scalability issues
• Are responsible of taking benefits of backend solvers
• Not only results of the verification are provided but many other
information:
• Counterexamples, traced back to the high level model
• Proof coverage
• Proof log or evidence that the whole process is auditable
• Kernel development is a very expensive effort
• Needs for verification and certification of the kernel imply a very rigourous
documentation and development process, quite centralized rather than cooperative
• Kernel is a very important asset for expertise and service
28
Confidence in formal Verification
• Low level engines and solvers
• May be diversified
• Some benchmarks exist
• Verification kernel is safety critical
• Failure or even false positive may be caused by translation and
optimization errors
• Verified checkers are required (strategy implementation)
• Needs for « proven » or « verified » kernel
• Impacts the applicability of Open source model
29
Service level Metrology
• Time to make the model able to be analyzed/proved
• Compatibility (syntactic)
• Convergence
• Iterations with the model owner
• Time to implement and execute one proof
• Memory/execution time consumption
• Scalability
• Time to analyze counter-examples
• Proof Coverage
30
Return from Experience
• Intensive use on large CBTC models (railway domain)
• Complex Functions modelled in Matlab/Simulink
• Localization,
• Train Tracking
• Evacuation
• Passenger exchange
• Etc.
• Time for Compatibility and Convergence :
• 40 days about for the whole model
• More than 700 properties
• Functional safety requirements traceable with the design requirements level
• Average Cycle time for one property
• 2.5 days the first issue
• 1.5 days for rework.
31
Open Source Model Applicability
• Opportunities
• Cooperation on backend solvers
• Parametrization
• Distributed models
• Etc.
• Strategies development
• Many contributors at academic level (SAT, SMT, Proof assistants etc.)
• Threats
• COTS editors are more aggressive than they were on the topic
• E.g. The Mathworks
• Certification -> Kernel shall be evaluated
• Development cost
• Changes and evolutions are more difficult to manage
32
Conclusion
• Formal Methods
• Many backend solvers are being developed
• User accessibility bottlenecks still the same
• Scalability
• Abstraction level
• Controllability of results
• False positive
• Proof coverage
• Cooperation between actors
• Academic and Expertise companies
• TRL assignment depending on actors

Contenu connexe

Tendances

Basics of Functional Verification - Arrow Devices
Basics of Functional Verification - Arrow DevicesBasics of Functional Verification - Arrow Devices
Basics of Functional Verification - Arrow DevicesArrow Devices
 
Code Management Workshop
Code Management WorkshopCode Management Workshop
Code Management WorkshopSameh El-Ashry
 
verification_planning_systemverilog_uvm_2020
verification_planning_systemverilog_uvm_2020verification_planning_systemverilog_uvm_2020
verification_planning_systemverilog_uvm_2020Sameh El-Ashry
 
Chipions session 2021 - VLSI career
Chipions session 2021 - VLSI careerChipions session 2021 - VLSI career
Chipions session 2021 - VLSI careerSameh El-Ashry
 
Towards creating an extension for patch management ISO/IEC 15408 &18045
Towards creating an extension for patch management ISO/IEC 15408 &18045Towards creating an extension for patch management ISO/IEC 15408 &18045
Towards creating an extension for patch management ISO/IEC 15408 &18045Javier Tallón
 
Custom security effective implementation
Custom security   effective implementationCustom security   effective implementation
Custom security effective implementationlog2srini
 
Automated Change Impact Analysis between SysML Models of Requirements and Design
Automated Change Impact Analysis between SysML Models of Requirements and DesignAutomated Change Impact Analysis between SysML Models of Requirements and Design
Automated Change Impact Analysis between SysML Models of Requirements and DesignLionel Briand
 
Classic Formal Methods Model Checking
Classic Formal Methods Model CheckingClassic Formal Methods Model Checking
Classic Formal Methods Model Checkingtyramisu
 
Rahul_Ramani_Profile
Rahul_Ramani_ProfileRahul_Ramani_Profile
Rahul_Ramani_ProfileRahul Ramani
 
System verilog verification building blocks
System verilog verification building blocksSystem verilog verification building blocks
System verilog verification building blocksNirav Desai
 
A comprehensive formal verification solution for ARM based SOC design
A comprehensive formal verification solution for ARM based SOC design A comprehensive formal verification solution for ARM based SOC design
A comprehensive formal verification solution for ARM based SOC design chiportal
 

Tendances (15)

Basics of Functional Verification - Arrow Devices
Basics of Functional Verification - Arrow DevicesBasics of Functional Verification - Arrow Devices
Basics of Functional Verification - Arrow Devices
 
Code Management Workshop
Code Management WorkshopCode Management Workshop
Code Management Workshop
 
verification_planning_systemverilog_uvm_2020
verification_planning_systemverilog_uvm_2020verification_planning_systemverilog_uvm_2020
verification_planning_systemverilog_uvm_2020
 
Chipions session 2021 - VLSI career
Chipions session 2021 - VLSI careerChipions session 2021 - VLSI career
Chipions session 2021 - VLSI career
 
Towards creating an extension for patch management ISO/IEC 15408 &18045
Towards creating an extension for patch management ISO/IEC 15408 &18045Towards creating an extension for patch management ISO/IEC 15408 &18045
Towards creating an extension for patch management ISO/IEC 15408 &18045
 
Custom security effective implementation
Custom security   effective implementationCustom security   effective implementation
Custom security effective implementation
 
Automated Change Impact Analysis between SysML Models of Requirements and Design
Automated Change Impact Analysis between SysML Models of Requirements and DesignAutomated Change Impact Analysis between SysML Models of Requirements and Design
Automated Change Impact Analysis between SysML Models of Requirements and Design
 
Classic Formal Methods Model Checking
Classic Formal Methods Model CheckingClassic Formal Methods Model Checking
Classic Formal Methods Model Checking
 
Rahul_Ramani_Profile
Rahul_Ramani_ProfileRahul_Ramani_Profile
Rahul_Ramani_Profile
 
Mohan r
Mohan rMohan r
Mohan r
 
System verilog verification building blocks
System verilog verification building blocksSystem verilog verification building blocks
System verilog verification building blocks
 
A comprehensive formal verification solution for ARM based SOC design
A comprehensive formal verification solution for ARM based SOC design A comprehensive formal verification solution for ARM based SOC design
A comprehensive formal verification solution for ARM based SOC design
 
Design Verification
Design VerificationDesign Verification
Design Verification
 
system verilog
system verilogsystem verilog
system verilog
 
Resume-Prerna
Resume-PrernaResume-Prerna
Resume-Prerna
 

En vedette

Building and verifying a quasi-certification entity over Distributed Hash Tables
Building and verifying a quasi-certification entity over Distributed Hash TablesBuilding and verifying a quasi-certification entity over Distributed Hash Tables
Building and verifying a quasi-certification entity over Distributed Hash TablesPôle Systematic Paris-Region
 
ExplorCamp #3 Autoconsommation collective
ExplorCamp #3 Autoconsommation collectiveExplorCamp #3 Autoconsommation collective
ExplorCamp #3 Autoconsommation collectiveEnerGaïa
 
Manche Lab par le Manche Numérique
Manche Lab par le Manche NumériqueManche Lab par le Manche Numérique
Manche Lab par le Manche NumériqueLes Interconnectés
 
Open Odyssey - Créateur d'effervescence
Open Odyssey - Créateur d'effervescenceOpen Odyssey - Créateur d'effervescence
Open Odyssey - Créateur d'effervescenceLes Interconnectés
 
Mairie virtuelle - Communauté urbaine d'Arras
Mairie virtuelle - Communauté urbaine d'ArrasMairie virtuelle - Communauté urbaine d'Arras
Mairie virtuelle - Communauté urbaine d'ArrasLes Interconnectés
 
Innovation sociale, textile et numérique - Association Sew&Laine
Innovation sociale, textile et numérique - Association Sew&LaineInnovation sociale, textile et numérique - Association Sew&Laine
Innovation sociale, textile et numérique - Association Sew&LaineLes Interconnectés
 
Muséotopia et Gassendi Curiosity, des applications intéractives pour être act...
Muséotopia et Gassendi Curiosity, des applications intéractives pour être act...Muséotopia et Gassendi Curiosity, des applications intéractives pour être act...
Muséotopia et Gassendi Curiosity, des applications intéractives pour être act...Les Interconnectés
 
Habitants, Lieux, Mémoires (HLM) - Grand Projet des Villes Rive Droite
Habitants, Lieux, Mémoires (HLM) - Grand Projet des Villes Rive DroiteHabitants, Lieux, Mémoires (HLM) - Grand Projet des Villes Rive Droite
Habitants, Lieux, Mémoires (HLM) - Grand Projet des Villes Rive DroiteLes Interconnectés
 
Observatoire territorial par le wifi public - Eurométropole de Strasbourg
Observatoire territorial par le wifi public - Eurométropole de StrasbourgObservatoire territorial par le wifi public - Eurométropole de Strasbourg
Observatoire territorial par le wifi public - Eurométropole de StrasbourgLes Interconnectés
 
Stratégie numérique rurale - Communauté de Communes du Sud-Artois
Stratégie numérique rurale - Communauté de Communes du Sud-ArtoisStratégie numérique rurale - Communauté de Communes du Sud-Artois
Stratégie numérique rurale - Communauté de Communes du Sud-ArtoisLes Interconnectés
 
Pays de Châteaubriant - Les pratiques collaboratives
Pays de Châteaubriant - Les pratiques collaborativesPays de Châteaubriant - Les pratiques collaboratives
Pays de Châteaubriant - Les pratiques collaborativesLes Interconnectés
 
#SMPS2016 Présentation des pôles de compétitivité
#SMPS2016 Présentation des pôles de compétitivité#SMPS2016 Présentation des pôles de compétitivité
#SMPS2016 Présentation des pôles de compétitivitéPôle Systematic Paris-Region
 
Services numérique à la population - Ville de Mulhouse
Services numérique à la population - Ville de MulhouseServices numérique à la population - Ville de Mulhouse
Services numérique à la population - Ville de MulhouseLes Interconnectés
 
Amienscope (plateforme AppAwelty Agenda) - Amiens Métropole
Amienscope (plateforme AppAwelty Agenda) - Amiens MétropoleAmienscope (plateforme AppAwelty Agenda) - Amiens Métropole
Amienscope (plateforme AppAwelty Agenda) - Amiens MétropoleLes Interconnectés
 

En vedette (20)

Building and verifying a quasi-certification entity over Distributed Hash Tables
Building and verifying a quasi-certification entity over Distributed Hash TablesBuilding and verifying a quasi-certification entity over Distributed Hash Tables
Building and verifying a quasi-certification entity over Distributed Hash Tables
 
Monolithe media - Agoraa
Monolithe media - AgoraaMonolithe media - Agoraa
Monolithe media - Agoraa
 
ExplorCamp #3 Autoconsommation collective
ExplorCamp #3 Autoconsommation collectiveExplorCamp #3 Autoconsommation collective
ExplorCamp #3 Autoconsommation collective
 
Créalab - Grand Angoulême
Créalab - Grand AngoulêmeCréalab - Grand Angoulême
Créalab - Grand Angoulême
 
Manche Lab par le Manche Numérique
Manche Lab par le Manche NumériqueManche Lab par le Manche Numérique
Manche Lab par le Manche Numérique
 
Open Odyssey - Créateur d'effervescence
Open Odyssey - Créateur d'effervescenceOpen Odyssey - Créateur d'effervescence
Open Odyssey - Créateur d'effervescence
 
Wizway
WizwayWizway
Wizway
 
Mairie virtuelle - Communauté urbaine d'Arras
Mairie virtuelle - Communauté urbaine d'ArrasMairie virtuelle - Communauté urbaine d'Arras
Mairie virtuelle - Communauté urbaine d'Arras
 
Innovation sociale, textile et numérique - Association Sew&Laine
Innovation sociale, textile et numérique - Association Sew&LaineInnovation sociale, textile et numérique - Association Sew&Laine
Innovation sociale, textile et numérique - Association Sew&Laine
 
Muséotopia et Gassendi Curiosity, des applications intéractives pour être act...
Muséotopia et Gassendi Curiosity, des applications intéractives pour être act...Muséotopia et Gassendi Curiosity, des applications intéractives pour être act...
Muséotopia et Gassendi Curiosity, des applications intéractives pour être act...
 
SQLite with a Fine-Toothed Comb
SQLite with a Fine-Toothed CombSQLite with a Fine-Toothed Comb
SQLite with a Fine-Toothed Comb
 
Habitants, Lieux, Mémoires (HLM) - Grand Projet des Villes Rive Droite
Habitants, Lieux, Mémoires (HLM) - Grand Projet des Villes Rive DroiteHabitants, Lieux, Mémoires (HLM) - Grand Projet des Villes Rive Droite
Habitants, Lieux, Mémoires (HLM) - Grand Projet des Villes Rive Droite
 
Sold Out
Sold OutSold Out
Sold Out
 
Escale littorale
 Escale littorale Escale littorale
Escale littorale
 
Observatoire territorial par le wifi public - Eurométropole de Strasbourg
Observatoire territorial par le wifi public - Eurométropole de StrasbourgObservatoire territorial par le wifi public - Eurométropole de Strasbourg
Observatoire territorial par le wifi public - Eurométropole de Strasbourg
 
Stratégie numérique rurale - Communauté de Communes du Sud-Artois
Stratégie numérique rurale - Communauté de Communes du Sud-ArtoisStratégie numérique rurale - Communauté de Communes du Sud-Artois
Stratégie numérique rurale - Communauté de Communes du Sud-Artois
 
Pays de Châteaubriant - Les pratiques collaboratives
Pays de Châteaubriant - Les pratiques collaborativesPays de Châteaubriant - Les pratiques collaboratives
Pays de Châteaubriant - Les pratiques collaboratives
 
#SMPS2016 Présentation des pôles de compétitivité
#SMPS2016 Présentation des pôles de compétitivité#SMPS2016 Présentation des pôles de compétitivité
#SMPS2016 Présentation des pôles de compétitivité
 
Services numérique à la population - Ville de Mulhouse
Services numérique à la population - Ville de MulhouseServices numérique à la population - Ville de Mulhouse
Services numérique à la population - Ville de Mulhouse
 
Amienscope (plateforme AppAwelty Agenda) - Amiens Métropole
Amienscope (plateforme AppAwelty Agenda) - Amiens MétropoleAmienscope (plateforme AppAwelty Agenda) - Amiens Métropole
Amienscope (plateforme AppAwelty Agenda) - Amiens Métropole
 

Similaire à Mise en œuvre des méthodes de vérification de modèle et d'analyse statique de code pour la détection de faiblesses et de vulnérabilités

Getting started with RISC-V verification what's next after compliance testing
Getting started with RISC-V verification what's next after compliance testingGetting started with RISC-V verification what's next after compliance testing
Getting started with RISC-V verification what's next after compliance testingRISC-V International
 
Static code analyzers as a DevSecOps solution
Static code analyzers as a DevSecOps solutionStatic code analyzers as a DevSecOps solution
Static code analyzers as a DevSecOps solutionAndrey Karpov
 
Navigating the jungle of Secure Coding Standards
Navigating the jungle of Secure Coding StandardsNavigating the jungle of Secure Coding Standards
Navigating the jungle of Secure Coding StandardsChantalWauters
 
Tutorial getting started with RISC-V verification
Tutorial getting started with RISC-V verificationTutorial getting started with RISC-V verification
Tutorial getting started with RISC-V verificationRISC-V International
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
Quality in a Square. K8s-native Quality Assurance of Microservices with Testkube
Quality in a Square. K8s-native Quality Assurance of Microservices with TestkubeQuality in a Square. K8s-native Quality Assurance of Microservices with Testkube
Quality in a Square. K8s-native Quality Assurance of Microservices with TestkubeQAware GmbH
 
Vulnerability Detection Based on Git History
Vulnerability Detection Based on Git HistoryVulnerability Detection Based on Git History
Vulnerability Detection Based on Git HistoryKenta Yamamoto
 
Incremental Queries and Transformations for Engineering Critical Systems
Incremental Queries and Transformations for Engineering Critical SystemsIncremental Queries and Transformations for Engineering Critical Systems
Incremental Queries and Transformations for Engineering Critical SystemsÁkos Horváth
 
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)lifove
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect PredictionSung Kim
 
Quadratisch. Praktisch. Gut. K8s-native Quality Assurance mit Testkube @ Java...
Quadratisch. Praktisch. Gut. K8s-native Quality Assurance mit Testkube @ Java...Quadratisch. Praktisch. Gut. K8s-native Quality Assurance mit Testkube @ Java...
Quadratisch. Praktisch. Gut. K8s-native Quality Assurance mit Testkube @ Java...QAware GmbH
 
Safety on the Max: How to Write Reliable C/C++ Code for Embedded Systems
Safety on the Max: How to Write Reliable C/C++ Code for Embedded SystemsSafety on the Max: How to Write Reliable C/C++ Code for Embedded Systems
Safety on the Max: How to Write Reliable C/C++ Code for Embedded SystemsAndrey Karpov
 
Software Architecture For Condition Monitoring Of Mobile Underground
Software Architecture For Condition Monitoring Of Mobile UndergroundSoftware Architecture For Condition Monitoring Of Mobile Underground
Software Architecture For Condition Monitoring Of Mobile UndergroundJordan McBain
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect Predictionlifove
 
Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Real-Time Innovations (RTI)
 

Similaire à Mise en œuvre des méthodes de vérification de modèle et d'analyse statique de code pour la détection de faiblesses et de vulnérabilités (20)

Getting started with RISC-V verification what's next after compliance testing
Getting started with RISC-V verification what's next after compliance testingGetting started with RISC-V verification what's next after compliance testing
Getting started with RISC-V verification what's next after compliance testing
 
Static code analyzers as a DevSecOps solution
Static code analyzers as a DevSecOps solutionStatic code analyzers as a DevSecOps solution
Static code analyzers as a DevSecOps solution
 
Navigating the jungle of Secure Coding Standards
Navigating the jungle of Secure Coding StandardsNavigating the jungle of Secure Coding Standards
Navigating the jungle of Secure Coding Standards
 
Tutorial getting started with RISC-V verification
Tutorial getting started with RISC-V verificationTutorial getting started with RISC-V verification
Tutorial getting started with RISC-V verification
 
CodeChecker Overview Nov 2019
CodeChecker Overview Nov 2019CodeChecker Overview Nov 2019
CodeChecker Overview Nov 2019
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
Simics - Break the Rules of Product Development
Simics - Break the Rules of Product DevelopmentSimics - Break the Rules of Product Development
Simics - Break the Rules of Product Development
 
Quality in a Square. K8s-native Quality Assurance of Microservices with Testkube
Quality in a Square. K8s-native Quality Assurance of Microservices with TestkubeQuality in a Square. K8s-native Quality Assurance of Microservices with Testkube
Quality in a Square. K8s-native Quality Assurance of Microservices with Testkube
 
Sdlc
Sdlc Sdlc
Sdlc
 
Vulnerability Detection Based on Git History
Vulnerability Detection Based on Git HistoryVulnerability Detection Based on Git History
Vulnerability Detection Based on Git History
 
Resume
ResumeResume
Resume
 
Incremental Queries and Transformations for Engineering Critical Systems
Incremental Queries and Transformations for Engineering Critical SystemsIncremental Queries and Transformations for Engineering Critical Systems
Incremental Queries and Transformations for Engineering Critical Systems
 
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect Prediction
 
Quadratisch. Praktisch. Gut. K8s-native Quality Assurance mit Testkube @ Java...
Quadratisch. Praktisch. Gut. K8s-native Quality Assurance mit Testkube @ Java...Quadratisch. Praktisch. Gut. K8s-native Quality Assurance mit Testkube @ Java...
Quadratisch. Praktisch. Gut. K8s-native Quality Assurance mit Testkube @ Java...
 
Safety on the Max: How to Write Reliable C/C++ Code for Embedded Systems
Safety on the Max: How to Write Reliable C/C++ Code for Embedded SystemsSafety on the Max: How to Write Reliable C/C++ Code for Embedded Systems
Safety on the Max: How to Write Reliable C/C++ Code for Embedded Systems
 
ASIC design verification
ASIC design verificationASIC design verification
ASIC design verification
 
Software Architecture For Condition Monitoring Of Mobile Underground
Software Architecture For Condition Monitoring Of Mobile UndergroundSoftware Architecture For Condition Monitoring Of Mobile Underground
Software Architecture For Condition Monitoring Of Mobile Underground
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect Prediction
 
Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.
 

Plus de Pôle Systematic Paris-Region

OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...Pôle Systematic Paris-Region
 
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...Pôle Systematic Paris-Region
 
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...Pôle Systematic Paris-Region
 
OSIS19_Cloud : Performance and power management in virtualized data centers, ...
OSIS19_Cloud : Performance and power management in virtualized data centers, ...OSIS19_Cloud : Performance and power management in virtualized data centers, ...
OSIS19_Cloud : Performance and power management in virtualized data centers, ...Pôle Systematic Paris-Region
 
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...Pôle Systematic Paris-Region
 
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...Pôle Systematic Paris-Region
 
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...Pôle Systematic Paris-Region
 
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick MoyOsis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick MoyPôle Systematic Paris-Region
 
Osis18_Cloud : Virtualisation efficace d’architectures NUMA
Osis18_Cloud : Virtualisation efficace d’architectures NUMAOsis18_Cloud : Virtualisation efficace d’architectures NUMA
Osis18_Cloud : Virtualisation efficace d’architectures NUMAPôle Systematic Paris-Region
 
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur BittorrentOsis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur BittorrentPôle Systematic Paris-Region
 
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...Pôle Systematic Paris-Region
 
OSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riot
OSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riotOSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riot
OSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riotPôle Systematic Paris-Region
 
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...Pôle Systematic Paris-Region
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...Pôle Systematic Paris-Region
 
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...Pôle Systematic Paris-Region
 
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)Pôle Systematic Paris-Region
 
PyParis 2017 / Un mooc python, by thierry parmentelat
PyParis 2017 / Un mooc python, by thierry parmentelatPyParis 2017 / Un mooc python, by thierry parmentelat
PyParis 2017 / Un mooc python, by thierry parmentelatPôle Systematic Paris-Region
 

Plus de Pôle Systematic Paris-Region (20)

OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
 
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
 
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
 
OSIS19_Cloud : Performance and power management in virtualized data centers, ...
OSIS19_Cloud : Performance and power management in virtualized data centers, ...OSIS19_Cloud : Performance and power management in virtualized data centers, ...
OSIS19_Cloud : Performance and power management in virtualized data centers, ...
 
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
 
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
 
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
 
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick MoyOsis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
 
Osis18_Cloud : Pas de commun sans communauté ?
Osis18_Cloud : Pas de commun sans communauté ?Osis18_Cloud : Pas de commun sans communauté ?
Osis18_Cloud : Pas de commun sans communauté ?
 
Osis18_Cloud : Projet Wolphin
Osis18_Cloud : Projet Wolphin Osis18_Cloud : Projet Wolphin
Osis18_Cloud : Projet Wolphin
 
Osis18_Cloud : Virtualisation efficace d’architectures NUMA
Osis18_Cloud : Virtualisation efficace d’architectures NUMAOsis18_Cloud : Virtualisation efficace d’architectures NUMA
Osis18_Cloud : Virtualisation efficace d’architectures NUMA
 
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur BittorrentOsis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
 
Osis18_Cloud : Software-heritage
Osis18_Cloud : Software-heritageOsis18_Cloud : Software-heritage
Osis18_Cloud : Software-heritage
 
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
 
OSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riot
OSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riotOSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riot
OSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riot
 
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
 
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
 
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
 
PyParis 2017 / Un mooc python, by thierry parmentelat
PyParis 2017 / Un mooc python, by thierry parmentelatPyParis 2017 / Un mooc python, by thierry parmentelat
PyParis 2017 / Un mooc python, by thierry parmentelat
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Mise en œuvre des méthodes de vérification de modèle et d'analyse statique de code pour la détection de faiblesses et de vulnérabilités

  • 1.
  • 2. 2 SafeRiver • SME • Independent- founded december 2005 • 18 consultants highly skilled in Software and Formal methods • Turnover 2015: 1,5M€ (excluding R&D public fundings) • Added Value Solutions for Embedded Systems • Functional Safety (FuSa) • Software Security • Tools for FuSa and Software Security • Packaged Services • CIR agreed
  • 3. 3 Functional Safety • Modeling rules • Models metrology (technical debt, change management) • Formal Proof of Functional safety requirements and System level safety properties – • Model- Code Equivalence
  • 4. 4 Software Security • Carto-C supports Vulnerability Analysis (SVA) – Benchmarked on Juliet Database • IFFree addresses Software architecture analysis with respect to trust/integrity domains both for safety and security. Supports FFI analysis and helps in interfaces mastering- ISO 26262-6 C C++ - Security Design and Coding Rules - Security Code Production Rules Outputs - Attack Surface Computation - CWE detection - RTE, buffer OVFL - Format string - Command injection - Data exposure - SW boundaries and interactions - Freedom from Interference analysis - Flow analysis Expertise Carto-C IFFree Inputs
  • 5. 5 Static Analysis for SW Security: key issues • 150 to 200 tools • What does mean « Perform a static analysis » ? • Tools classification /underlying techniques • Sound • Unsound • Verification objectives • Rules Verification/Detection of Coding Rules violations • DSIG Cert-C CERT-Java • Detection of well known vulnerabilities • NIST, CVE, CWE • Run Time Errors detection • Level of assurance and errors coverage • Public reference • Evaluation
  • 6. 6 Static tools for security: Observations • Results from sound tools • Fit a small subset of security flaws • Are subject to false positive • But are not subject to false negatives • Do not take the security environment into account • Results from unsound tools • Fit a large subset of security flaws • Are subject to false positive • Are subject to false negative • Do take the security environment into account •  Adequate tool is difficult to choose and use Sound RTE (subset of CWE) False positive Unsound CWE, CVE, CAPEC or CERT C, CERT java, JavaSec, DISA STIG False positive and False negative
  • 7. 7 Static Analysis for Security : Configuration kits • Detection objectives • Eliminate most current vulnerabilities as defined by • SANS Top25 • OWASP Top 10 • Configuration kit content • Sets of checkers to be activated • Detection parameters • Definition of criticality levels • Result filters and synthesis • Available kits • Klocwork for Java or C: 69 checkers for 22 CWE • Coverity for java or C: 30 checkers for 20 CWE
  • 8. 8 Static Analysis for security: Evaluation kit • Juliet • Is developed in SAMATE SATE project to challenge static tools • Is composed of ~45000 C codes • Analyzable in « flaw » and « fix » mode • Flaw: the source code contains a flaw • Fix: the source code contains a fix of the flaw • Covering more than 121 main classes of CWE flaws • Juliet User kit by SafeRiver • Libraries Support • libC, POSIX • Automatic launch • Automatic synthesis
  • 9. 9 Static Analysis for Security: Carto-C • Why Carto-C ? • Use cases • Support of Secure Development • Support of Security audits • Only sound static tool to detect • Missing input filtering • Impact on known flaws • Missing asset protections • Impact on asset exposure • Evaluation with Juliet Test base • Internationally recognized tests base • Independent test base
  • 10. 10 Carto-C • Carto-C is a static Analyzer based on the open source platform Frama-C, that we have specialized for Security • Attack Surface Computation • Format String and Injection Related Weaknesses Detection • Risk analysis support • Identification of assets that can be reached/controlled by malevolent actions through attack surface • Verification of protections • Freedom from Interference Analysis • Characterization of cascading failures that can be caused by uncontrolled or malevolent interactions • Use cases : document interactions between software that have different integrity or assurance levels
  • 11. 11 Carto-C architecture Frama-C modules Lib C Lib C99 Hearders POSIX Headers Compilation module Cartography module Dependency module Cartography Data Base Attack Surface Format functions Command execution RTE-to-CWE module ACSL description RTE module CIL modules IFFree module Config. Extractor: Tasking Compiler Built System Ext. GNU C
  • 12. 12 Added Value analysis • Frama-C modules • Static analysis algorithms • RTE detection • asserts • Carto-C Proprietary modules for end user generic needs • Usability for complete applications • Stubs (ACSL description) • False positive reduction • Carto-C Proprietary modules for customer needs • Attack Surface • Detection of weaknesses according to CWE model • Freedom From Interference analysis
  • 13. 13 Carto-C Feature 1 Identify Attack surface • Attack Ways • All the entry points and exit points methods • The set of input / output channels • The set of input / output data • All the calls to external code (third party tool, open source) • Protection functions • Resource connection and authentication • Authorization • Data validation and encoding • Events logging • User defined declarations • I/O functions • Protection functions • Trusted channels
  • 14. 14 Carto-C Feature 1 Identify Attack surface • Attack objectives • Assets of the application • confidential, sensitive, regulated data • secrets and keys, intellectual property, critical business data, personal data and PI • (user defined) • Protection functions • Encryption, digest • access and authorization • data integrity and operational security controls • User defined declaration • Valuable data • Protection functions
  • 15. 15 Feature 2 Detect exhaustively certain classes of flaws • Extracted from Frama-C RTE • CWE119: Improper Restriction of Operations within the Bounds of a Memory Buffer • CWE787 • CWE121_Stack_Based_Buffer_Overflow • CWE122_Heap_Based_Buffer_Overflow • CWE124_Buffer_Underwrite • CWE125 • CWE126_Buffer_Overread • CWE127_Buffer_Underread • CWE664 : Improper Control of resources through lifetime • CWE401_Improper release of memory before removing last reference • CWE457_use of uninitialized variable • CWE665_Improper Initialization • CWE682: Incorrect Calculation • CWE190: Integer Overflow or Wraparound • CWE191: Integer Underflow or Wraparound • CWE369: Divide_by_Zero • CWE681: Incorrect Conversion between Numeric Types
  • 16. 16 Feature 2 Detect exhaustively certain classes of flaws • Carto-C specific Plug ins/modules • Cartography • CWE-749: Exposed Dangerous Method or Function (format and command execution function) • Syntactic Verification • CWE-628: Function Call with Incorrectly Specified Arguments • CWE685_Function_Call_With_Incorrect_Number_of_Arguments • CWE686:Function with Incorrect Argument Type • CWE688_Function_Call_With_Incorrect_Variable_or_Reference_as_Argument • Dependency analysis • CWE-134: Uncontrolled Format String) • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • 17. 17 Carto C results on Juliet benchmark CWE Entry ID CWE Entry Name Flaw test casesFlaw detect Rate Fix test casesFix detect Rate 78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 40 100% 40 100% 134 Uncontrolled Format String 30 100% 60 100% 191 Integer Underflow (Wrap or Wraparound) 29 79% 66 74% 190 Integer Overflow or Wraparound 48 75% 108 70% 681 Incorrect Conversion between Numeric Types 3 67% 3 33% 369 Divide By Zero 16 63% 36 78% 126 Buffer Over-read 23 39% 30 83% 124 Buffer Underwrite (‘Buffer Underflow’) 19 32% 32 97% 127 Buffer Under-read 21 29% 32 97% 122 Heap-based Buffer Overflow 66 21% 75 75% 121 Stack-based Buffer Overflow 48 19% 68 93% • Carto-C specific Plug ins/modules -> detection rate 100% • Extracted Results (underflw and overflow, buffer errors) surprising -> open point under investigation
  • 18. 18 Feature 3 Exploitation of flaws • Controllable from the attack surface entry points ۷ Example: command read from the keyboard is highly dangerous ۷ Controllability : high / low / unknown • Observable from the attack surface exit points • Example: password printed in a log • Observability: high / low / unknown
  • 19. 19 RTE 2 CWE • Problematic • Formal Backend analyzers detect errors that have an unambiguous specification • Some analyzers detect errors wrt • Patterns • Rules • CWE model is an enumeration, not a clear classification tool • RTE2CWE module • Maps RTE detected by Frama-C in terms of CWE flaws • Helps for benchmarking and comparison of tools
  • 20. 20 Open Source Model Applicability • Strengths • Recognized static analyzers • Public Static Analyzers may be evaluated • Hard problems to be addressed by the community • Weaknesses • Usage restrictions of formal static analysis methods • Language restrictions • Requires semantic specification at language level • Lack of interest or lack of cooperation for evaluation and benchmarks • Security analysis do not match directly to static analysis results • Many customer data to be taken into account
  • 21. 21 Open Source Model Applicability • Opportunities for cooperation • Development of static analysis market • Languages to be covered • C++ • Java • Script • Relaxed analysis methods • Confidence level requirements • Benchmarks/labels • Threats • Stubs and Libraries are necessary but user does not want to pay for • Same for « false positive » reduction • Competition among many SMEs
  • 22. 22 Cyber-security References • ANSSI (on going study) • Development of a Referential for Static Analysis Tools labellisation with respect to detection of cyber security flaws • THALES Communication & Security & DGA • Study and business case on formal methods for cryptographic modules development, creation of a prototype • Development of a certified XML parser, Assurance level EAL4+ • ANSSI • Study (state of the art, security analysis) of the functional Languages For Secure applications (LaFoSec), Development Guide for Ocaml language and tools usage • Development of an XML parser, with proof of robustness (vulnerabilities detection and analysis)
  • 23. 23 Cyber-security References • DGA (CORAC) 2013-2014-2015 • Cyber-security methods and tools for the future avionic platform • SAFRAN (2013-2014) • Code Analysis Tools Configuration (Klocwork) for CWE detection • Development of a document of the functional security requirements for a flight recorder, using the EBIOS method • Airbus (2008-2010) • Risks Analysis on the safety and the security of the information system embedded on the Aircraft • Security Guidelines for the information system components suppliers (coding rules, COTS evaluation guidelines, vulnerabilities analysis
  • 24. 24 Formal Verification • Use case : Verification of Design with respect to functional safety requirements in an MBD process
  • 25. 25 SafeProver tool chain ScadeSimulink CADADvel ControlBuild HLL SafeRiver Translators Kernel Imperative Common Language (ICL) Optimization Proof Strategies (BMC, K-Induction, IC3/PDR) Automatic Lemma Generation SMT Solvers SAT Solvers
  • 26. 26 User Accessibility • SMT solvers are very powerful • Deduction part • Can solve problems with many many variables • But users do not interact with low level formulas • Representation of models and formulas in high level formalisms (e.g. Simulink, SCADE, Control Build etc..) • Translation from High level formalisms to intermediate format • High level optimizations -> help in proof convergence • Proof strategy -> compliance with expected results, soundness • Automatic Lemma Generation « the hard problem »
  • 27. 27 Kernel is the key for user accessibility • Kernel components importance • Guarantee soundness of deduction parts • Ensure convergence and mastering of scalability issues • Are responsible of taking benefits of backend solvers • Not only results of the verification are provided but many other information: • Counterexamples, traced back to the high level model • Proof coverage • Proof log or evidence that the whole process is auditable • Kernel development is a very expensive effort • Needs for verification and certification of the kernel imply a very rigourous documentation and development process, quite centralized rather than cooperative • Kernel is a very important asset for expertise and service
  • 28. 28 Confidence in formal Verification • Low level engines and solvers • May be diversified • Some benchmarks exist • Verification kernel is safety critical • Failure or even false positive may be caused by translation and optimization errors • Verified checkers are required (strategy implementation) • Needs for « proven » or « verified » kernel • Impacts the applicability of Open source model
  • 29. 29 Service level Metrology • Time to make the model able to be analyzed/proved • Compatibility (syntactic) • Convergence • Iterations with the model owner • Time to implement and execute one proof • Memory/execution time consumption • Scalability • Time to analyze counter-examples • Proof Coverage
  • 30. 30 Return from Experience • Intensive use on large CBTC models (railway domain) • Complex Functions modelled in Matlab/Simulink • Localization, • Train Tracking • Evacuation • Passenger exchange • Etc. • Time for Compatibility and Convergence : • 40 days about for the whole model • More than 700 properties • Functional safety requirements traceable with the design requirements level • Average Cycle time for one property • 2.5 days the first issue • 1.5 days for rework.
  • 31. 31 Open Source Model Applicability • Opportunities • Cooperation on backend solvers • Parametrization • Distributed models • Etc. • Strategies development • Many contributors at academic level (SAT, SMT, Proof assistants etc.) • Threats • COTS editors are more aggressive than they were on the topic • E.g. The Mathworks • Certification -> Kernel shall be evaluated • Development cost • Changes and evolutions are more difficult to manage
  • 32. 32 Conclusion • Formal Methods • Many backend solvers are being developed • User accessibility bottlenecks still the same • Scalability • Abstraction level • Controllability of results • False positive • Proof coverage • Cooperation between actors • Academic and Expertise companies • TRL assignment depending on actors