Carnegie Mellon University
file.pdf (287.99 kB)

Improving the Automated Detection and Analysis of Secure Coding Violations

Download (287.99 kB)
posted on 2014-06-01, 00:00 authored by Daniel Plakosh, Robert Seacord, Robert W. Stoddard, David Svoboda, David Zubrow

Coding errors cause the majority of software vulnerabilities. For example, 64% of the nearly 2,500 vulnerabilities in the National Vulnerability Database in 2004 were caused by programming errors. The CERT Division’s Source Code Analysis Laboratory (SCALe) offers conformance testing of C language software systems against the CERT C Secure Coding Standard and the CERT Oracle Secure Coding Standard for Java, using various analysis tools available from commercial software vendors. Unfortunately, the current SCALe analysis process and tools do not collect any statistics about the accuracy of the code analysis tools or about the coding violations they flag, such as frequency of occurrence. This paper describes the approach used to add the ability to collect and statistically analyze data regarding coding violations and tool characteristics along with the initial results. The collected data will be used over time to improve the effectiveness of the SCALe analysis.




Usage metrics