This is not possible to achieve through static analysis based on the source code level constructs. In other words, you cannot build a tool that looks at source code, analyzes the tokens appearing in it, and infer whether a property on an object has been accessed.

To detect this kind of pattern, you should probably look at methods using symbolic execution. Very simplistically, symbolic execution looks at the program's input (typically from the user and/or the external world) and assumes that the input can be any valid value according to some constraints (in typed languages for example, you start by assuming that an integer input can take any valid value in the range acceptable by the type of the variable it is stored in). Then you start evaluating the program and as you make progress, you learn about the possible subranges of a value. Through following different branches in a program like this, you will find a set of constraints which can cause a program to take a specific path, and sometimes solving the system of constraints obtained like this gives you input values that can cause a program to take a specific path (an unsafe operation, for example.)

I'm not really sure how much this technique can be used on JS. Based on some quick searches, I found a number of resources which you may find interesting:

* http://webblaze.cs.berkeley.edu/2010/kudzu/kudzu.pdf
* https://code.google.com/p/js-symbolic-executor/ (which I'm exporting to github to make sure it won't get lost right now: https://github.com/ehsan/js-symbolic-executor/) * https://github.com/SRA-SiliconValley/jalangi (the readme says it has an undocumented symbolic execution engine, not sure how useful it is since the project is now replaced with jalangi2.)

That all being said, analyses based on symbolic execution even in typed languages have a lot of practical limitations and using it even for the simplest cases such as your example below in JS may very well turn into a research project that would result in nothing in practice. In my opinion, it's impractical to detect any useful properties in an add-on JS code statically based on the source code.

On 2015-10-08 4:32 AM, tofumatt wrote:
Hi there static analysis folks!

I’m tofumatt, I'm working with Stuart Colville on the new add-ons validator, 
written in JS.

One of the things we’d like to improve in this validator is the ability to 
detect rule bypassing via code obfuscation. For example, mozIndexedDB is a 
deprecated identifier and that is easy to find with a custom ESLint rule. But 
if someone types:


var badDB = ‘m’;
badDB += ‘oz’
badDB = badDB + ‘IndexedDB’;
var myDeprecatedDB = window[badDB];


The existing validator and our scans for an identifier with AST (using 
ESLint/ESPrima) don’t catch it.

Are there any tools (especially JS ones!) that can be used to at least detect 
this kind of obfuscation? Without it the validator remains more an 
advisory/helpful tool than something we could use to automate security 
validation.

Apologies if this is the wrong list; didn’t know exactly who to turn to for 
this (I’ve also asked security and spidermonkey folks). If I should check with 
someone specific, please let me know.

Cheers,

- tofumatt
_______________________________________________
dev-static-analysis mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-static-analysis


_______________________________________________
dev-static-analysis mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-static-analysis

Reply via email to