Re: [SC-L] Integrated Dynamic and Static Scanning

2009-08-07 Thread Ben Livshits
Speaking of the lab environment, my thesis from 2006 
(http://research.microsoft.com/en-us/um/people/livshits/papers/pdf/thesis.pdf) 
explores the interplay between static and runtime in gory detail. I am not 
aware of these hybrid approaches being integrated into commercial products.

Regards,
-Ben

-Original Message-
From: sc-l-boun...@securecoding.org [mailto:sc-l-boun...@securecoding.org] On 
Behalf Of Jeremiah Grossman
Sent: Thursday, August 06, 2009 4:30 PM
To: sc-l@securecoding.org; websecur...@webappsec.org
Subject: Re: [SC-L] Integrated Dynamic and Static Scanning

Hey all,

I've been monitoring this thread [1] and some excellent points have been raised 
(cross-posting to websecurity as the subject matter applies). I'm personally 
very interested in the potential benefits of an integration between dynamic and 
static analysis scanning technology. The spork of software security testing. 
The desire of many is a single solution that unifies the benefits of both 
methodologies and simultaneously reduces their respective well-described 
limitations. For at least the last couple of years there have been vendors 
claiming success in this area, of which I remain skeptical.

A brief explanation of the bi-directional and somewhat simple sounding 
innovations that vendors are trying to develop:

1) Dynamic Scanner - Static Analyzer
A dynamic analysis engine capable of providing HTTP vulnerability details (URL, 
cookie, form etc.) to a static analysis tool. Static analysis results narrowed 
down to a single line of insecure code or subroutine to speed vulnerability 
remediation. Prioritize issues that are located in a publicly available code 
flow vs. those that are not technically remotely-exploitable. Isolate security 
issues where source code was not available, such as third-party libraries.

Static Analyzer - Dynamic Scanner
2) A static analyzer capable of providing a remotely available attack surface 
(URLs, Forms, etc.) to a dynamic analysis tool. Dynamic analysis may realize 
additional testing comprehensiveness, measurement of coverage depth, and hints 
for creating exploit proof-of-concepts.
Not to mention able to provide more detailed application fix recommendations.

vendor bias
As it stands currently, the state-of-the-art is basically a reporting mash-up. 
Very little of the aforementioned advancements have been proven to funtion 
outside of the lab environment. If anyone has evidence to the contrary they can 
point to, please speak up. For those curious as to Tom Brennan's comment, these 
are the areas Fortify and WhiteHat are together working on.
/vendor bias

This is an excellent time to be in the application and software security 
industry. Over the next few years there is going to be a lot of innovation and 
awareness in the defense side of the industry.
Talent, skill, and experience is going to command a premium.


[1] http://www.mail-archive.com/sc-l@securecoding.org/msg02731.html


Regards,

Jeremiah Grossman
Chief Technology Officer
WhiteHat Security, Inc.
http://www.whitehatsec.com/
blog: http://jeremiahgrossman.blogspot.com/
twitter: @jeremiahg
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, 
subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a 
free, non-commercial service to the software security community.
___


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Integrated Dynamic and Static Scanning

2009-07-30 Thread Brad Andrews



While I completely agree with this statement, it is a much tougher  
sell to management that is seeking to keep the company making money  
(or perhaps even alive).  I believe that having (and using) an  
imperfect tool is better than nothing, so I would at least push for  
that.  Getting things that play well together is even better.


I think a complete overhaul and digging security flaws out is even  
better, but is a much harder sell in many places in my experience.   
Perhaps I am too jaded, but you have to work with what you can get  
approved and paid for.


The cost of the indispensable experience is much higher than most  
companies will stomach.  :)


Some companies do value it, but most haven't seen the light yet in  
my experience.  While that is limited compared to many on this list, I  
think my perspective is something that is easy to lose track of when  
you are fixing security issues every day.  Everyone doesn't share the  
vision, unfortunately.


And some of those that see the problem don't have the budget and  
executive support to fix the problem


--

Brad Andrews
RBA Communications
CSSLP, SANS/GIAC GSEC, GCFW, GCIH, GPCI


Quoting Andre Gironda and...@gmail.com:


On 7/28/09, Brad Andrews andr...@rbacomm.com wrote:

Experts can't be replaced by tools.


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Integrated Dynamic and Static Scanning

2009-07-30 Thread Brad Andrews


That is certainly true.  I was just commenting on the issue of systems  
that work together tightly.  None do now (as far as I know), but this  
should potentially allow that to happen.


I did here a few moans when this news came out, since IBM is not known  
for inexpensiveness from what I hear  :)


--

Brad Andrews
RBA Communications
CSSLP, SANS/GIAC GSEC, GCFW, GCIH, GPCI


Quoting McGovern, James F (HTSC, IT) james.mcgov...@thehartford.com:


Sometimes integration is a good and bad thing.

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___