Code Obfuscation and Malware Detection by Abstract Interpretation

Total Page:16

File Type:pdf, Size:1020Kb

Code Obfuscation and Malware Detection by Abstract Interpretation Mila Dalla Preda Code Obfuscation and Malware Detection by Abstract Interpretation Ph.D. Thesis Universit`adegli Studi di Verona Dipartimento di Informatica Advisor: prof. Roberto Giacobazzi Series N◦: TD ???? Universit`adi Verona Dipartimento di Informatica Strada le Grazie 15, 37134 Verona Italy Summary An obfuscating transformation aims at confusing a program in order to make it more difficult to understand while preserving its functionality. Software protec- tion and malware detection are two major applications of code obfuscation. Soft- ware developers use code obfuscation in order to defend their programs against attacks to the intellectual property, usually called malicious host attacks. In fact, by making the programs more difficult to understand it is possible to obstruct malicious reverse engineering – a typical attack to the intellectual property of programs. On the other side, malware writers usually obfuscate their malicious code in order to avoid detection. In this setting, the ability of code obfuscation to foil most of the existing detection techniques, such as misuse detection al- gorithms, relies in their purely syntactic nature that makes malware detection sensitive to slight modifications of programs syntax. In the software protection scenario, researchers try to develop sophisticated obfuscating techniques that are able to resist as many attacks as possible. In the malware detection scenario, on the other hand, it is important to design advanced detection algorithms in order to detect as many variants of obfuscated malware as possible. It is clear how both malicious host and malicious code attacks represent harmful threats to the security of computer networks. In this dissertation, we are interested in both security issues described above. In particular, we describe a formal approach to code obfuscation and malware detection based on program semantics and abstract interpretation. This theoret- ical framework is useful in contrasting some well known drawbacks of software protection through code obfuscation, as well as for improving existing malware detection schemes. In fact, the lack of rigorous theoretical bases for code obfus- cation prevents any possibility to formally study and certify their effectiveness in protecting proprietary programs. Moreover, in order to design malware de- tection schemes that are resilient to obfuscation we have to focus on program semantics rather than on program syntax. ii Our formal framework for code obfuscation relies on a semantics-based def- inition of code obfuscation that characterizes each program transformation T as a potential obfuscation in terms of the most concrete property preserved by T on program semantics. Deobfuscating techniques, and reverse engineering in general, usually begin with some sort of static program analysis, which can be specified as an abstraction of program semantics. In the software protection scenario, this observation naturally leads to model attackers as abstractions of program semantics. In fact, the abstraction modeling the attacker expresses the amount of information, namely the semantic properties, that the attacker is able to observe. It follows that, comparing the degree of abstraction of an attacker A with the one of the most concrete property preserved by an obfuscating trans- formation T , it is possible to understand whether obfuscation T defeats attack A. Following the same reasoning it is possible to compare the efficiency of dif- ferent obfuscating transformations, as well as the ability of different attackers in contrasting a given obfuscation. We apply our semantics-based framework to a known control code obfuscation technique that aims at confusing the control flow of the original program by inserting opaque predicates. As argued above, an obfuscating transformation modifies a program while preserving an abstraction of its semantics. This means that different obfus- cated versions of the same malware have to share (at least) the malicious in- tent, namely the maliciousness of their semantics, even if they may express it through different syntactic forms. The basic idea of our formal approach to malware detection is to use program semantics to model both malware and pro- gram behaviour, and semantic abstractions to hide the details changed by the obfuscation. Thus, given an obfuscation T , we are interested in defining an ab- straction of program semantics that does not distinguish between the semantics of malware M and the semantics of its obfuscated version T (M). In particular, we provide this suitable abstraction for an interesting class of commonly used obfuscating transformations. It is clear that, given a malware detector D, it is always possible to define its semantic counterpart by analyzing how D works on program semantics. At this point, by translating both malware detectors and obfuscating transformations in the semantic world, we are able to certify which obfuscations a detector is able to handle. This means that our semantics- based framework provides a formal setting where malware detectors designers can prove the efficiency of their algorithms. Acknowledgements The first person that I would like to thank is my advisor Roberto Giacobazzi for his precious guide and encouragement over these years. He taught me how to develop my ideas and how to be independent. A great thanks goes to Saumya Debray for his very kind hospitality and constant support while I was visiting the department of Computer Science at Tucson. I sincerely thank Somesh Jha and Mihai Christodorescu for the inter- esting discussions we had and their precious collaboration. I also thank Matias Madou and Koen De Boscheere for the work done together. A warm thank goes to the participants of the Doctoral Symposium affiliated to Formal Methods 2006 and in particular to the organizers Ana Cavalcanti, Augusto Sampaio and Jim Woodcock for their interesting comments and advices on my work. I would also like to thank my PhD thesis referees Christian Collberg and Patrick Cousot, but also Andrea Masini and Massimo Merro for their precious advices and comments on my studies. Contents Preface ................................................... ....... ix 1 Introduction ................................................. 1 1.1 Motivations ..................................... .......... 1 1.2 TheProblem ...................................... ........ 3 1.3 The Idea: A Semantics-based Approach . ....... 6 1.4 MainResults ..................................... ......... 8 1.5 Overview of the Thesis............................. ......... 10 2 Basic Notions ................................................ 13 2.1 Mathematical Background.......................... ......... 13 2.1.1 Sets.......................................... ....... 13 2.1.2 Ordered structures............................. ....... 16 2.1.3 Fixpoints..................................... ....... 20 2.1.4 Closure operators.............................. ....... 21 2.1.5 Galois connections ............................. ....... 22 2.1.6 Galois connections and closure operators . ...... 24 2.2 Abstract Interpretation .......................... ........... 24 2.2.1 Lattice of abstract interpretations . ........ 28 2.2.2 Abstract Operations ............................ ...... 30 2.2.3 Abstract Semantics ............................. ...... 35 2.3 Syntactic and Semantic Program Transformations . ........ 36 3 Code Obfuscation ............................................ 43 3.1 Software Protection .............................. .......... 44 3.1.1 Obfuscating Transformations and their Evaluation . ...... 47 3.1.2 A Taxonomy of Obfuscating Transformations. 49 3.1.3 Positive and Negative Theoretical Results. ....... 52 3.1.4 Code Deobfuscation............................. ...... 55 3.2 Malware Detection ................................ ......... 55 vi Contents 3.2.1 Detection Techniques . ...... 57 3.2.2 Metamorphic Malware ............................ 59 3.2.3 Theoretical Limitations . ........ 62 3.2.4 Formal Methods Approaches ....................... 62 4 Code Obfuscation as Semantic Transformation ............... 65 4.1 Standard Definition of Code Obfuscation . ........ 67 4.2 Semantics-based Definition of Code Obfuscation. ......... 69 4.2.1 Constructive characterization of δØ ...................... 73 4.2.2 Comparing Transformations...................... ...... 75 4.3 Modeling Attackers............................... .......... 76 4.4 Case study: Constant Propagation................... ......... 77 4.5 Discussion...................................... ........... 82 5 Control Code Obfuscation ................................... 85 5.1 Control Code Obfuscation.......................... ......... 86 5.1.1 Semantic Opaque Predicate Insertion. ...... 87 5.1.2 Syntactic Opaque Predicate Insertion . ...... 89 5.1.3 Obfuscating behaviour of opaque predicate insertion ...... 93 5.1.4 Detecting Opaque Predicates . ...... 96 5.2 Opaque Predicates Detection Techniques . ......... 99 5.2.1 Dynamic Attack................................. 100 5.2.2 Brute Force Attack .............................. 101 5.3 Breaking Opaque Predicates by Abstract Interpretation .........102 5.3.1 Breaking Opaque Predicates n|f(x).....................103 5.3.2 Experimental results ........................... .......112 5.3.3 Breaking Opaque Predicates h(x)= g(x) ................114 5.3.4 Comparing Attackers............................ 118 5.4 Discussion...................................... ...........119 6 A Semantics-Based approach to Malware Detection
Recommended publications
  • Integrated Program Debugging, Verification, and Optimization Using Abstract Interpretation (And the Ciao System Preprocessor)
    Integrated Program Debugging, Verification, and Optimization Using Abstract Interpretation (and The Ciao System Preprocessor) Manuel V. Hermenegildo a,b Germ´anPuebla a Francisco Bueno a Pedro L´opez-Garc´ıa a aDepartment of Computer Science, Technical University of Madrid (UPM) {herme,german,bueno,pedro.lopez}@fi.upm.es http://www.clip.dia.fi.upm.es/ bDepts. of Comp. Science and Electrical and Computer Eng., U. of New Mexico [email protected] – http://www.unm.edu/~herme Abstract The technique of Abstract Interpretation has allowed the development of very so- phisticated global program analyses which are at the same time provably correct and practical. We present in a tutorial fashion a novel program development frame- work which uses abstract interpretation as a fundamental tool. The framework uses modular, incremental abstract interpretation to obtain information about the pro- gram. This information is used to validate programs, to detect bugs with respect to partial specifications written using assertions (in the program itself and/or in system libraries), to generate and simplify run-time tests, and to perform high-level program transformations such as multiple abstract specialization, parallelization, and resource usage control, all in a provably correct way. In the case of valida- tion and debugging, the assertions can refer to a variety of program points such as procedure entry, procedure exit, points within procedures, or global computations. The system can reason with much richer information than, for example, traditional types. This includes data structure shape (including pointer sharing), bounds on data structure sizes, and other operational variable instantiation properties, as well as procedure-level properties such as determinacy, termination, non-failure, and bounds on resource consumption (time or space cost).
    [Show full text]
  • Abstract Interpretation and Abstract Domains with Special Attention to the Congruence Domain
    Malardalen¨ University Master Thesis Abstract Interpretation and Abstract Domains with special attention to the congruence domain Stefan Bygde May 2006 Department of Computer Science and Electronics Malardalen¨ University Vaster¨ as,˚ Sweden Abstract This thesis is a survey on a framework for program analysis known as Abstract interpre- tation. Abstract interpretation uses abstract semantics to obtain important properties of programs. Different abstract semantics can be used in abstract interpretation, to obtain different properties. For instance there are semantics that spots upper and lower limits for the values of the variables of the program. These different semantics are called abstract domains and this thesis is meant to summarize different numerical abstract domains as well as give mathematical properties to them. The thesis also offers a small survey of free software libraries that implements abstract domains. Special attention will be given to the congruence domain. The congruence domain was implemented in a program analysis tool developed at M¨alardalen University. In the congruence domain the property ”variable x is always congruent to n modulo m” is obtained. Abstract operators for this domain are presented and new bit-operators are introduced. Contents 1 Introduction 4 1.1 Static analysis and WCET . ..................... 4 1.2 SWEET . ................................ 5 1.3 Motivation and results ......................... 7 1.4 Related work . ......................... 7 1.5 Outline . ................................ 7 2 Collecting semantics 8 2.1 Definitions ................................ 8 2.2 The transition system . ......................... 9 3 Abstract Interpretation 9 3.1 The idea of abstraction ......................... 10 3.2 Galois connections . ......................... 10 3.2.1 An example . ......................... 11 3.3 Relational and non-relational domains ................
    [Show full text]
  • Static Program Analysis Via 3-Valued Logic
    Static Program Analysis via 3-Valued Logic ¡ ¢ £ Thomas Reps , Mooly Sagiv , and Reinhard Wilhelm ¤ Comp. Sci. Dept., University of Wisconsin; [email protected] ¥ School of Comp. Sci., Tel Aviv University; [email protected] ¦ Informatik, Univ. des Saarlandes;[email protected] Abstract. This paper reviews the principles behind the paradigm of “abstract interpretation via § -valued logic,” discusses recent work to extend the approach, and summarizes on- going research aimed at overcoming remaining limitations on the ability to create program- analysis algorithms fully automatically. 1 Introduction Static analysis concerns techniques for obtaining information about the possible states that a program passes through during execution, without actually running the program on specific inputs. Instead, static-analysis techniques explore a program’s behavior for all possible inputs and all possible states that the program can reach. To make this feasible, the program is “run in the aggregate”—i.e., on abstract descriptors that repre- sent collections of many states. In the last few years, researchers have made important advances in applying static analysis in new kinds of program-analysis tools for identi- fying bugs and security vulnerabilities [1–7]. In these tools, static analysis provides a way in which properties of a program’s behavior can be verified (or, alternatively, ways in which bugs and security vulnerabilities can be detected). Static analysis is used to provide a safe answer to the question “Can the program reach a bad state?” Despite these successes, substantial challenges still remain. In particular, pointers and dynamically-allocated storage are features of all modern imperative programming languages, but their use is error-prone: ¨ Dereferencing NULL-valued pointers and accessing previously deallocated stor- age are two common programming mistakes.
    [Show full text]
  • Design of Semantics by Abstract Interpretation
    …/… Design of Semantics by Abstract Interpretation -- Abstraction of the relational into a nondeterministic Plotkin/- Smyth/Hoare denotational/functional semantics; -- Abstraction of the natural/demoniac relational into a determin­ istic denotational/functional semantics;Scott’ssemantics; Patrick COUSOT -- Abstraction of nondeterministic denotational semantics to weakest École Normale Supérieure precondition/strongest postcondition predicate transformer se­ DMI, 45, rue d’Ulm mantics; 75230 Paris cedex 05 Abstraction of predicate transformer semantics to à la Hoare France -- ax­ ;Programproofmethods; [email protected] iomatic semantics http://www.dmi.ens.fr/ cousot Extension to the λ-calculus. ˜ • MPI-Kolloquium, Max-Planck-Institut für Informatik, Saarbrücken, am Montag, dem 2. Juni 1997 um 14.15 Uhr 1 1 Extended version of the invited address at MFPS XIII, CMU, Pittsburgh, March 24, 1997 © P. Cousot 1 MPI-Kolloquium, Max-Planck-Institut für Informatik, Saarbrücken, 2. Juni 1997 © P. Cousot 3 MPI-Kolloquium, Max-Planck-Institut für Informatik, Saarbrücken, 2. Juni 1997 Content Application of abstract interpretation ideas to the design of formal semantics: Examples of Abstract Interpretations Examples of abstract interpretations; • Abstraction of fixpoint semantics; • -- Maximal trace semantics of nondeterministic transition systems; -- Abstraction of the trace into a natural/demoniac/angelic relational semantics; …/… © P. Cousot 2 MPI-Kolloquium, Max-Planck-Institut für Informatik, Saarbrücken, 2. Juni 1997 © P. Cousot 4 MPI-Kolloquium,
    [Show full text]
  • Abstract Interpretation Based Program Testing
    1 Abstract Interpretation Based Program Testing Patrick Cousot and Radhia Cousot Département d’informatique Laboratoire d’informatique École normale supérieure École polytechnique 45 rue d’Ulm 91128 Palaiseau cedex, France 75230 Paris cedex 05, France [email protected] [email protected] http://lix.polytechnique.fr/˜rcousot http://www.di.ens.fr/˜cousot Abstract— Every one can daily experiment that programs II. An informal introduction to abstract are bugged. Software bugs can have severe if not catas­ testing trophic consequences in computer-based safety critical ap­ plications. This impels the development of formal methods, Abstract testing is the verification that the abstract se­ whether manual, computer-assisted or automatic, for verify­ mantics of a program satisfies an abstract specification. ing that a program satisfies a specification. Among the auto­ matic formal methods, program static analysis can be used The origin is the abstract interpretation based static check­ to check for the absence of run-time errors. In this case the ing of safety properties [1], [2] such as array bound checking specification is provided by the semantics of the program­ and the absence of run-time errors which was extended to ming language in which the program is written. Abstract in­ terpretation provides a formal theory for approximating this liveness properties such as termination [3], [4]. semantics, which leads to completely automated tools where Consider for example, the factorial program (the random run-time bugs can be statically and safely classified as un­ assignment ? is equivalent to the reading of an input value reachable, certain, impossible or potential. We discuss the or the passing of an unknown but initialized parameter extension of these techniques to abstract testing where speci­ fications are provided by the programmers.
    [Show full text]
  • Abstract Interpretation of Programs for Model-Based Debugging
    Abstract Interpretation of Programs for Model-Based Debugging Wolfgang Mayer Markus Stumptner Advanced Computing Research Centre University of South Australia [mayer,mst]@cs.unisa.edu.au Language Abstract Semantics Test-Cases Developing model-based automatic debugging strategies has been an active research area for sev- Program eral years. We present a model-based debug- Conformance Test Components ging approach that is based on Abstract Interpre- Fault Conflict sets tation, a technique borrowed from program analy- Assumptions sis. The Abstract Interpretation mechanism is inte- grated with a classical model-based reasoning en- MBSD Engine gine. We test the approach on sample programs and provide the first experimental comparison with earlier models used for debugging. The results Diagnoses show that the Abstract Interpretation based model provides more precise explanations than previous Figure 1: MBSD cycle models or standard non-model based approaches. 2 Model-based debugging 1 Introduction Model-based software debugging (MBSD) is an application of Model-based Diagnosis (MBD) [19] techniques to locat- Developing tools to support the software engineer in locating ing errors in computer programs. MBSD was first intro- bugs in programs has been an active research area during the duced by Console et. al. [6], with the goal of identifying last decades, as increasingly complex programs require more incorrect clauses in logic programs; the approach has since and more effort to understand and maintain them. Several dif- been extended to different programming languages, includ- ferent approaches have been developed, using syntactic and ing VHDL [10] a n d JAVA [21]. semantic properties of programs and languages. The basic principle of MBD is to compare a model,ade- This paper extends past research on model-based diagnosis scription of the correct behaviour of a system, to the observed of mainstream object oriented languages, with Java as con- behaviour of the system.
    [Show full text]
  • Abstract Interpretation: a Unified Lattice Model for Static Analysis of Programs by Construction Or Approximation of Fixpoints
    ABSTRACT INTERPRETATION : ‘A UNIFIED LATTICE MODEL FOR STATIC ANALYSIS OF PROGRAMS BY CONSTRUCTION OR APPROXIMATION OF FIXPOINTS Patrick Cousot*and Radhia Cousot** Laboratoire d’Informatique, U.S.M.G., BP. 53 38041 Grenoble cedex, France 1. Introduction Abstract program properties are modeled by a com– plete semilattice, Birkhoff[611. Elementary Pro- A program denotes computations in some universe of gram constructs are locally interpreted by order objects. Abstract interpretation of programs con– preserving functions which are used to associate sists in using that denotation to describe compu– a system of recursive equations with a program. The tations in another universe of abstract objects, program global properties are then defined as one so that the results of abstract execution give of the extreme fixpoints of that system, Tarski [55]. some information on the actual computations. An The abstraction process is defined in section 6. It intuitive example (which we borrow from Sintzoff is shown that the program properties obtained by 172]) is the rule of signs. The text ‘1515* 17 an abstract interpretation of a program are consis– may be understood to denote computations on the tent with those obtained by a more refined inter– abstract universe {(+), (-), (~)} where the se- pretation of that program. In particular, an ab– mantics of arithmetic operators is defined by the stract interpretation may be shown to be consistent rule of signs. The abstract execution -1515* 17 with the formal semantics of the language. Levels => -(+) * (+) e> (–) * (+) => (–), proves that of abstraction are formalized by showing that con- –1515 * 17 is a negative number. Abstract interpre– sistent abstract interpretations form a lattice tation is concerned by a particular underlying (section 7).
    [Show full text]
  • Arxiv:1007.3250V1 [Cs.PL] 19 Jul 2010 Ple Opromhg-Adlwlvlotmztosand Optimizations Low-Level and High- Perform to Applied Ae Rpoesro the of Etc
    Verification of Java Bytecode using Analysis and Transformation of Logic Programs E. Albert1, M. G´omez-Zamalloa1, L. Hubert2, and G. Puebla2 1 DSIC, Complutense University of Madrid, E-28040 Madrid, Spain 2 CLIP, Technical University of Madrid, E-28660 Boadilla del Monte, Madrid, Spain {elvira,mzamalloa,laurent,german}@clip.dia.fi.upm.es Abstract. State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including termination, bounds on re- source consumption, etc. The aim of this work is to automatically transfer the power of such analysis tools for LP to the analysis and verification of Java bytecode (jvml). In order to achieve our goal, we rely on well-known techniques for meta-programming and program specialization. More pre- cisely, we propose to partially evaluate a jvml interpreter implemented in LP together with (an LP representation of) a jvml program and then analyze the residual program. Interestingly, at least for the examples we have studied, our approach produces very simple LP representations of the original jvml programs. This can be seen as a decompilation from jvml to high-level LP source. By reasoning about such residual programs, we can automatically prove in the CiaoPP system some non-trivial prop- erties of jvml programs such as termination, run-time error freeness and infer bounds on its resource consumption. We are not aware of any other system which is able to verify such advanced properties of Java bytecode. 1 Introduction Verifying programs in the (Constraint) Logic Programming paradigm —(C)LP— offers a good number of advantages, an important one being the maturity and sophistication of the analysis tools available for it.
    [Show full text]
  • Verification by Abstract Interpretation
    Verification by Abstract Interpretation Patrick Cousot École normale supérieure, Département d’informatique 45 rue d’Ulm, 75230 Paris cedex 05, France [email protected], www.di.ens.fr/~cousot Dedicated to Zohar Manna, for his 26th birthday. Abstract. Abstract interpretation theory formalizes the idea of abstrac- tion of mathematical structures, in particular those involved in the spec- ification of properties and proof methods of computer systems. Verifica- tion by abstract interpretation is illustrated on the particular cases of predicate abstraction, which is revisited to handle infinitary abstractions, and on the new parametric predicate abstraction. 1 Introduction Abstract interpretation theory [7,8,9,11,13] formalizes the idea of abstraction of mathematical structures, in particular those involved in the specification of properties and proof methods of computer systems. Verification by abstract interpretation is illustrated on the particular cases of predicate abstraction [4,15,19] (where the finitary program-specific ground atomic propositional components of inductive invariants have to be provided) which is revisited (in that it is derived by systematic approximation of the con- crete semantics of a programming language using an infinitary abstraction) and on the new parametric predicate abstraction, a program-independent generaliza- tion (where parameterized infinitary predicates are automatically combined by reduction and instantiated to particular programs by approximation). 2 Elements of Abstract Interpretation Let us first recall a few elements of abstract interpretation from [7,9,11]. 2.1 Properties and Their Abstraction. Given a set Σ of objects (such as program states, execution traces, etc.), we represent properties P of objects s ∈ Σ as sets of objects P ∈ ℘(Σ) (which have the considered property).
    [Show full text]
  • Abstract Interpretation: Theory and Practice
    Abstract Interpretation: Theory and Practice Patrick Cousot École normale supérieure Département d'informatique, 45 rue d'Ulm 75230 Paris cedex 05, France [email protected] http://www.di.ens.fr/~cousot/ Our objective in this talk is to give an intuitive account of abstract interpre- tation theory [1,2,3,4,5] and to present and discuss its main applications [6]. Abstract interpretation theory formalizes the conservative approximation of the semantics of hardware and software computer systems. The semantics pro- vides a formal model describing all possible behaviors of a computer system in interaction with any possible environment. By approximation we mean the observation of the semantics at some level of abstraction, ignoring irrelevant de- tails. Conservative means that the approximation can never lead to an erroneous conclusion. Abstract interpretation theory provides thinking tools since the idea of ab- straction by conservative approximation is central to reasoning (in particular on computer systems) and mechanical tools since the idea of an effective computable approximation leads to a systematic and constructive formal design methodol- ogy of automatic semantics-based program manipulation algorithms and tools (e.g. [7]). Semantics have been studied in the framework of abstract interpretation [8,9] and compared according to their relative precision. A number of semantics including among others small-step, big-step, termination and nontermination se- mantics, Plotkin's natural, Smyth's demoniac, Hoare's angelic relational and cor- responding denotational semantics, Dijkstra's weakest precondition and weakest liberal precondition predicate transformers and Hoare's partial and total ax- iomatic semantics have all been derived by successive abstractions starting from an operational maximal trace semantics of a transition system.
    [Show full text]
  • Extending Abstract Interpretation to Dependency Analysis of Database Applications
    1 Extending Abstract Interpretation to Dependency Analysis of Database Applications Angshuman Jana1, Raju Halder1, K. V. Abhishekh1, S. D. Ganni1, and Agostino Cortesi2 1Indian Institute of Technology Patna, India {ajana.pcs13, halder, kalahasti.cs13, ganni.cs13}@iitp.ac.in 2Università Ca’ Foscari Venezia, Italy [email protected] Abstract—Dependency information (data- and/or control-dependencies) among program variables and program statements is playing crucial roles in a wide range of software-engineering activities, e.g. program slicing, information flow security analysis, debugging, code-optimization, code-reuse, code-understanding. Most existing dependency analyzers focus on mainstream languages and they do not support database applications embedding queries and data-manipulation commands. The first extension to the languages for relational database management systems, proposed by Willmor et al. in 2004, suffers from the lack of precision in the analysis primarily due to its syntax-based computation and flow insensitivity. Since then no significant contribution is found in this research direction. This paper extends the Abstract Interpretation framework for static dependency analysis of database applications, providing a semantics-based computation tunable with respect to precision. More specifically, we instantiate dependency computation by using various relational and non-relational abstract domains, yielding to a detailed comparative analysis with respect to precision and efficiency. Finally, we present a prototype semDDA, a semantics-based Database Dependency Analyzer integrated with various abstract domains, and we present experimental evaluation results to establish the effectiveness of our approach. We show an improvement of the precision on an average of 6% in the interval, 11% in the octagon, 21% in the polyhedra and 7% in the powerset of intervals abstract domains, as compared to their syntax-based counterpart, for the chosen set of Java Server Page (JSP)-based open-source database-driven web applications as part of the GotoCode project.
    [Show full text]
  • Static Analysis for Software Assurance: Soundness, Scalability and Adaptiveness
    Static Analysis for Software Assurance: Soundness, Scalability and Adaptiveness [Position Paper] Arnaud J. Venet Michael R. Lowry CMU / NASA Ames Research Center NASA Ames Research Center Moffett Field, CA 94035 Moffett Field, CA 94035 [email protected] [email protected] ABSTRACT The three objectives of no false negatives, high precision Standard approaches to software assurance are either process- (few false positives), and scaling to large systems push the based or test-based. We propose to include static analysis boundaries of computational complexity. In other words, by Abstract Interpretation to the software development cy- except for especially simple classes of defects, no single veri- cle. Static analysis by Abstract Interpretation provides a fication algorithm will be able to achieve all three. However, high level of assurance as well as ground-truth evidence in in case studies described here and elsewhere, human experts support of its findings. Successes in the verification of large have demonstrated that given a particular software system industrial codes demonstrate the readiness of this technol- being certified; they can adapt a custom algorithmic ap- ogy. However, in order to be practical in real development proach by carefully selecting, composing, and tuning known environments, static analysis must be able to scale and yield verification algorithms to simultaneously achieve these three few false positives without the need for expert hand-tuning. objectives. We present a research agenda to reach this goal based on the development of adaptive static analysis algorithms. Can this adaptive expert human approach of selecting and composing verification algorithms be automated? In this po- sition paper we discuss this approach within the context of Categories and Subject Descriptors Abstract Interpretation for static analysis.
    [Show full text]