SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
VCC-FINDER: FINDING POTENTIALVULNERABILITIES
IN OPEN-SOURCE PROJECTSTO ASSIST CODE AUDITS
: ACM CCS 2015 http://
www.sigsac.org/ccs/CCS2015/
Henning Perl, Sergej Dechand, Matthew Smith, Daniel Arp,
FabianYamaguchi, Konrad Rieck, Sascha Fahl, andYasemin
Acar. 2015.VCCFinder: Finding PotentialVulnerabilities in
Open-Source Projects to Assist Code Audits. In
Proceedings of the 22nd ACM SIGSAC Conference on
Computer and Communications Security (CCS '15).ACM,
NewYork, NY, USA, 426-437. DOI=http://dx.doi.org/
10.1145/2810103.2813604
: KentaYamamoto <ymkjp@jaist.ac.jp>
VCC
VCC-Finder
VCC
VCC
-VCC-FINDER
VCC-Finder
( false-positive)
“VCC” (Vulnerability-contributing Commits):

CVE GitHub
640 VCC
SVM
FlawFinder recall false-positive
99%
-
CVE
2000 1000
2010 4500
2014 8000
OSS
if-statement
switch-statement
FlawFinder
Flawfinder 53
true positive 5,460 false positive
1
FlawFinder Rats,
Prefast, Splint
Coventry
SCM (Software configuration management)
fix bug
SVM
C
3.VCC
66 , 170,860 , 718CVE
: C C++
VCC
https://www.dropbox.com/s/x1shbyw0nmd2x45/vcc-
database.dump?dl=0
VCC
#1
e.g.
CVE
GitHub CVE
CVE 2
1. CVE
2. CVE ID
10%
718 CVE
#2 VCC
VCC
Git
(`git blame` )
VCC
718 CVE 640 VCC
VCC 1
CVE
#2VCC
1.
2. `blame`
:
diff
3.
`blame`
: fix
4. `blame`
(VCC)
`blame`
VCC
VCC
15% VCC (96 )
3.1% (3 )
`blame`
`blame` 3
e.g. Update libtool to version 2.2.8. · vadz/
libtiff@31040a3 https://github.com/vadz/libtiff/commit/
31040a39
VCC-Finder
3.1%
VCC 640 169,502
CVE
3-2.VCC
* 1
Git GitHub
1
3-2.VCC
GitHub
GitHub
:
i.e. /
: 1 diff
(hunk)
: `bag of words`
: C C++
3-4.
Mann-Whitney U ( ;
2 )
VCC
VCC * 2
p < 0.000357, 0.01/28
( familywise error rate
)
effect size ( )
: `if` 70%
VCC
VCC
2
4. VCC
VCC
Generality ( ):
Scalability ( ):
Explainability ( ):
Generalised Bag-of-Words Model
(SVM)
Git, GitHub
S
4-1. BAG-OF-WORDS
S
email
φ
φ: X → ℝ^|S|, φ: x ⟼ (b(x, s))s∈S
X ,x ∈ X
b(x, s) s x
0, 1
x
0
4-2.
1 linear SupportVector Machines (SVM)
Linear SVM
SVM
LibLinear
VCC-Finder Linear SVM
LibLinear
2 VCC
ω
ω
φ(x) ω φ(x)
f(x) = (x), ω = Σs∈S ωs b(x, s)
cf.
Linear SVM
VCC C = 1,
W = 100
5.
SVM (-2011) vs.
(2011-2014) cf.
(TP): SVM
CVE-2012-2119, Linux Karnel. ,
, `socket`
CVE-2013-0862, FFmpeg.
, 1
CVE-2014-1438, Linux Karnel. ,
, ,
`__input` `user`
CVE-2014-0148 Qemu.
"opaque", "*bs", "bytes"
(FP) : CVE
VCC
FFmpeg
cca1a42653 . :
, ,
(precision) - (recall)
1
(combined)
VCC-FINDER FLAWFINDER
2 VCC-Finder vs. Flawfinder (precision) -
(recall) Flawfinder
: PRECISION-RECALL CURVE
Precision (P), Recall (R), true positives (Tp), false positive (Fp),
false negative (Fn)
P = Tp / (Tp + Fp)
R = Tp / (Fp + Fn)
Ref.“Image Matching in Large Scale Indoor Environment” -
http://www.cs.cmu.edu/~hebert/
indexing.html
VCC-FINDER
VCC goto
`goto` `out`
`error`
SVM `-EINVAL`
C goto
goto
`exception` `error-handling`
: Apple SSL/TSL
https://www.imperialviolet.org/2014/02/22/applebug.html
`sizeof` `len`, `length`
VCC `buf`, `net`, `socket`
1%
5 (
: p < 0.0001)
VCC-FINDER
C, C++
VCC-Finder
Flawfinder
C C++ 170,860
2010 2011 2014
Flawfinder
99% 219 53
Flawfinder 5460 36
VCC
Flawfinder
APPENDIX:
C C++
(Linux, Kerberos, OpenSSL, etc.)
66 GitHub
Portspoof, GnuPG, Kerberos, PHP, MapServer, HHVM, Mozilla
Gecko, Quagga, libav, Libreswan, Redland Raptor RDF syntax
library, charybdis, Jabberd2, ClusterLabs pacemaker, bdwgc,
pango, qemu, glibc, OpenVPN, torque, curl, jansson,
PostgreSQL, corosync, tinc, FFmpeg, nedmalloc, mosh, trojita,
inspircd, nspluginwrapper, cherokee webserver, openssl, libfep,
quassel, polarssl, radvd, tntnet,Android Platform Bionic, uzbl,
LibRaw, znc, nbd, Pidgin,V8, SpiderLabs ModSecurity, file,
graphviz, Linux Kernel, libti, ZRTPCPP, taglib, suhosin, Phusion
passenger, monkey, memcached, lxc, libguestfs, libarchive,
Beanstalkd, Flac, libX11, Xen, libvirt,Wireshark, and Apache
HTTPD
1.
(e.g.
ref. https://twitter.com/
neubig/status/712857703241089024 ) VCC
Flawfinder
recall precision 99%
2
CVE
CVE-ID CVE
Linear SVM
2. Git
4.
5
5.
Prophet VCC-Finder
ref. http://people.csail.mit.edu/fanl/papers/prophet-popl16.pdf
THANKYOU
FORYOUR ATTENTION
Donating to OpenSSL https://www.openssl.org/support/donations.html

Contenu connexe

En vedette

優れたビデオゲームに共通する不変の法則
優れたビデオゲームに共通する不変の法則優れたビデオゲームに共通する不変の法則
優れたビデオゲームに共通する不変の法則
Kenta Yamamoto
 

En vedette (9)

優れたビデオゲームに共通する不変の法則
優れたビデオゲームに共通する不変の法則優れたビデオゲームに共通する不変の法則
優れたビデオゲームに共通する不変の法則
 
私たちは何を Web っぽいと感じているのか
私たちは何を Web っぽいと感じているのか 私たちは何を Web っぽいと感じているのか
私たちは何を Web っぽいと感じているのか
 
20110804 ui14課題
20110804 ui14課題20110804 ui14課題
20110804 ui14課題
 
東日本大震災後の訪日外国人数の変移_2011.3
東日本大震災後の訪日外国人数の変移_2011.3東日本大震災後の訪日外国人数の変移_2011.3
東日本大震災後の訪日外国人数の変移_2011.3
 
20110805 ui14課題2
20110805 ui14課題220110805 ui14課題2
20110805 ui14課題2
 
文字コードとセキュリティ
文字コードとセキュリティ文字コードとセキュリティ
文字コードとセキュリティ
 
良いUrlを設計する
良いUrlを設計する良いUrlを設計する
良いUrlを設計する
 
Tips for bash script
Tips for bash scriptTips for bash script
Tips for bash script
 
文字コード入門 理論編 クイズ付き
文字コード入門 理論編 クイズ付き文字コード入門 理論編 クイズ付き
文字コード入門 理論編 クイズ付き
 

Similaire à [論文紹介] VCC-Finder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits

Rouault imbert alpc_rpc_pacsec
Rouault imbert alpc_rpc_pacsecRouault imbert alpc_rpc_pacsec
Rouault imbert alpc_rpc_pacsec
PacSecJP
 
Secure Programming And Common Errors[Michele Orru Dec 2008]
Secure Programming And Common Errors[Michele Orru Dec 2008]Secure Programming And Common Errors[Michele Orru Dec 2008]
Secure Programming And Common Errors[Michele Orru Dec 2008]
Michele Orru'
 
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, ParisSOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
OW2
 
Bridging the Pervasive Computing Gap: An Aggregate Perspective
Bridging the Pervasive Computing Gap: An Aggregate PerspectiveBridging the Pervasive Computing Gap: An Aggregate Perspective
Bridging the Pervasive Computing Gap: An Aggregate Perspective
Roberto Casadei
 
Thesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.pptThesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.ppt
KavitaChhajed
 
Thesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.pptThesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.ppt
AmanJohnTudu
 

Similaire à [論文紹介] VCC-Finder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits (20)

Rouault imbert alpc_rpc_pacsec
Rouault imbert alpc_rpc_pacsecRouault imbert alpc_rpc_pacsec
Rouault imbert alpc_rpc_pacsec
 
Secure Programming And Common Errors[Michele Orru Dec 2008]
Secure Programming And Common Errors[Michele Orru Dec 2008]Secure Programming And Common Errors[Michele Orru Dec 2008]
Secure Programming And Common Errors[Michele Orru Dec 2008]
 
Parsing and Type checking all 2^10000 configurations of the Linux kernel
Parsing and Type checking all 2^10000 configurations of the Linux kernelParsing and Type checking all 2^10000 configurations of the Linux kernel
Parsing and Type checking all 2^10000 configurations of the Linux kernel
 
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability DetectionSearch-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability Detection
 
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, ParisSOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
SOA in the cloud with FraSCAti, OW2con11, Nov 24-25, Paris
 
REX CraftConf 2022 / Supply Chain Attack
REX CraftConf 2022 / Supply Chain AttackREX CraftConf 2022 / Supply Chain Attack
REX CraftConf 2022 / Supply Chain Attack
 
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора OracleДоступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
 
Importance of having a vulnerability management | Vfeed
Importance of having a vulnerability management | Vfeed Importance of having a vulnerability management | Vfeed
Importance of having a vulnerability management | Vfeed
 
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assis...
 
Never Trust Your Inputs
Never Trust Your InputsNever Trust Your Inputs
Never Trust Your Inputs
 
MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)
MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)
MODERN MALWARE: OBFUSCATION AND EMULATION DEF CON CHINA 1.0 (2019)
 
Bridging the Pervasive Computing Gap: An Aggregate Perspective
Bridging the Pervasive Computing Gap: An Aggregate PerspectiveBridging the Pervasive Computing Gap: An Aggregate Perspective
Bridging the Pervasive Computing Gap: An Aggregate Perspective
 
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
 
Thesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.pptThesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.ppt
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.ppt
 
Thesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.pptThesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.ppt
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.ppt
 
Serhiy Kalinets "Building Service Mesh with .NET Core"
Serhiy Kalinets "Building Service Mesh with .NET Core"Serhiy Kalinets "Building Service Mesh with .NET Core"
Serhiy Kalinets "Building Service Mesh with .NET Core"
 
Secure Programming And Common Errors Part II
Secure Programming And Common Errors Part IISecure Programming And Common Errors Part II
Secure Programming And Common Errors Part II
 
Cling the llvm based interpreter
Cling the llvm based interpreterCling the llvm based interpreter
Cling the llvm based interpreter
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Dernier (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

[論文紹介] VCC-Finder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits