Best of Both Worlds: Correlating Static and Dynamic Analysis Results

2,288 views
2,148 views

Published on

One of the only guarantees in life is that the first time you analyze a piece of software for security vulnerabilities, you're going to find them. Whether you’re using static or dynamic analysis, prioritizing defects for remediation can strain any organization. This session will demonstrate methods for integrating analysis techniques and show how a combined approach gives better results.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,288
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
89
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Best of Both Worlds: Correlating Static and Dynamic Analysis Results

  1. 1. Correlating Static and Dynamic Analysis Results <br />Jeremiah GrossmanFounder and CTOWhiteHat Security<br />Jacob WestDirector, Security ResearchFortify Software<br />Session ID: AND-302<br />
  2. 2. Jeremiah Grossman<br />Technology R&D and industry evangelist<br />InfoWorld's CTO Top 25 for 2007<br />Frequent international conference speaker<br />Co-founder of the Web Application Security Consortium<br />Co-author: Cross-Site Scripting Attacks<br />Former Yahoo! information security officer<br />
  3. 3. Jacob West<br />Director, Security Research, Fortify Software<br />Secure Programming with Static Analysis<br />Conference speaker at RSA, Black Hat, Def Con, OWASP, SANS, Web 2.0, etc.<br />Contributor to MOPS, a C/C++ static analysis tool (UC Berkeley)<br />
  4. 4. Overview<br />Introduction<br />Overview of WhiteHat dynamic analysis<br />Overview of Fortify static analysis<br />Benefits of a combined approach<br />Case Study: Fortify on Demand<br />Questions<br />
  5. 5. Motivation<br />Between 2005 – 2009 there were:<br />2,064 reported data security breaches1<br />470 million reported records compromised1<br />No industries immune: Finance, retail, government, military, technology, healthcare, telecom, energy, manufacturing, education<br />Today, we rely increasing on software:<br />114 million active Web sites in the world2<br />17 million software developers in the world 3<br />Trillions of lines of code<br />http://www.privacyrights.org/ar/ChronDataBreaches.htm<br />http://www.domaintools.com/internet-statistics/<br />http://www.forbes.com/2008/04/03/ctia-mobile-developer-tech-wire-cx_ew_0403ctia.html<br />
  6. 6. Security Encompasses Many Things<br />Network<br /><ul><li> Penetration Testing
  7. 7. Network Firewalls</li></ul>Host<br /><ul><li> Application Whitelists
  8. 8. Anti-Virus
  9. 9. OS Hardening</li></ul>Software<br /><ul><li>Dynamic Analysis
  10. 10. Static Analysis</li></ul>Data<br /><ul><li>Database testing
  11. 11. Event monitoring</li></li></ul><li>Software Security<br />Developed in-house<br />Outsourced to third-parties<br />Purchased from ISV (COTS)<br />Licensed from open source community<br />7<br />
  12. 12. Primary Analysis Techniques<br />Dynamic Analysis<br />Also known as:<br />Web app scanning<br />Penetration testing<br />Black box testing<br />Benefits<br />Quick and easy to get started<br />Simulates a hacker's point of view<br />Drawbacks<br />Difficult to exercise the entire application<br />Lacks code-level details<br />Static Analysis<br /><ul><li>Also known as:
  13. 13. Source code analysis
  14. 14. Binary or byte-code analysis
  15. 15. Benefits
  16. 16. 100 percent code coverage
  17. 17. Early in SDLC
  18. 18. Drawbacks
  19. 19. Results require review</li></li></ul><li>Deployment Options<br />Software<br />Benefits<br />Integrates into SDLC<br />Trains developersto write secure code<br />Drawbacks<br />Time, expertise and resources<br />Software-as-a-Service (SaaS)<br /><ul><li>Benefits
  20. 20. Quick and easyto get started
  21. 21. Less expertise required
  22. 22. Fewer resources used
  23. 23. Drawbacks
  24. 24. Not integrated into SDLC
  25. 25. Fails to reinforce security best practices in development</li></li></ul><li>Dynamic Analysis<br />10<br />
  26. 26. WhiteHat Sentinel<br />SaaS-based<br />Full Coverage – On-going testing for business logic flaws and technical vulnerabilities – uses WASC 24 classes of attacks as reference point<br />Unlimited Assessments – Anytime websites change<br />Eliminates False Positives – Security Operations Team verifies all vulnerabilities<br />
  27. 27. Know Your Enemy<br />Fully Targeted<br /> Customize their own tools<br /> Focused on business logic<br /> Clever and profit driven ($$$)<br />Directed Opportunistic<br /> Commercial / Open Source Tools<br /> Authentication scans<br /> Multi-step processes (forms)<br />Random Opportunistic<br /> Fully automated scripts<br /> Unauthenticated scans<br /> Targets chosen indiscriminately<br />
  28. 28. WhiteHat Security Statistics Report<br /><ul><li>1,364 total websites
  29. 29. 22,776 verified custom web application vulnerabilities
  30. 30. Data collected from January 1, 2006 to October 1, 2009
  31. 31. Vast majority of websites assessed for vulnerabilities weekly </li></ul>All Websites<br /><ul><li>83% of websites have had a HIGH, CRITICAL, or URGENT issue
  32. 32. 64% of websites currently have a HIGH, CRITICAL, or URGENT issue
  33. 33. 61% vulnerability resolution rate with 8,902 unresolved issues remaining
  34. 34. Average # of HIGH, CRITICAL, or URGENT severity vulnerabilities per website during the vulnerability assessment lifetime: 16.7
  35. 35. Average number of serious unresolved vulnerabilities per website: 6.5</li></ul>* Vulnerability severity naming convention aligns with PCI-DSS<br />* Vulnerabilities classified according to WASC Threat Classification<br />Percentage likelihood of a website having a vulnerability by severity<br />CRITICAL<br />HIGH<br />URGENT<br />
  36. 36. WhiteHat Security Top Ten<br />14<br />Percentage likelihood of a website having a vulnerability by class<br />
  37. 37. Time-to-Fix<br />15<br />Cross-Site Scripting<br />Information Leakage<br />Content Spoofing<br />Insufficient Authorization<br />SQL Injection<br />Pred. Res. Loc.<br />Cross-Site Request Forgery<br />Session Fixation<br />HTTP Response Splitting<br />-<br />Abuse of Functionality<br />* Up/down arrows indicate the increase or decrease since the last report. <br />Best-case scenario: Not all vulnerabilities have been fixed...<br />
  38. 38. Resolution Rates<br />16<br />
  39. 39. Dynamic Analysis Challenges<br />Coverage<br />URLs<br />Parameters<br />Remediation details<br />Code-level vulnerability details<br />Remediation guidance<br />
  40. 40. Static Analysis<br />18<br />
  41. 41. Inside a Static Analysis Engine<br />Translate source code into intermediate model<br />Perform multiple types of analysis<br />Render results for human to review<br />19<br />
  42. 42. Critical Attributes<br />Language support<br />Understands the relevant languages/dialects<br />Capacity<br />Ability to gulp down millions of lines of code<br />Rule set and analysis algorithms<br />Right rules and techniques to find and prioritize issues<br />Results management<br />Allow human to review results<br />Prioritization of issues<br />
  43. 43. Why Static Analysis is Good for Security<br />Fast compared to manual code review<br />Analyze code without executing it<br />Able to contemplate many possibilities <br />Fast compared to testing<br />Complete, consistent coverage<br />Integrates into development lifecycle<br />Brings security knowledge with it<br />Makes review process easier for non-experts<br />
  44. 44. Two Ways to Use the Tools<br />#1 Analyze completed programs<br />Large number of results<br />Most people have to start here<br />Good motivator<br />#2 Analyze as you write code<br />Run as part of build<br />Nightly/weekly/milestone<br />Fix as you go<br />
  45. 45. Static Analysis Challenges<br />Completed programs<br />Are not written with security in mind<br />Contain multiple paradigms and technologies<br />Exemplify varying developer skill and techniques<br />Which causes static analysis to produce<br />Large numbers of issues<br />Widely varying issues<br />Issues that are difficult to triage<br />Until Stage #2, prioritization is hugely important<br />
  46. 46. Prioritization<br />24<br />
  47. 47. Prioritizing Analysis Results<br />risk = impact · likelihood<br />Impact: negative outcome resulting from a vulnerability <br />Likelihood: probability that the impact will come to pass <br />
  48. 48. Axes Represent Risk<br />(Whitepaper Prioritizing Static Analysis Results at www.fortify.com)<br />High<br />High Impact /Low Likelihood<br />Critical<br />High Impact /High Likelihood<br />Impact<br />Medium<br />Low Impact /High Likelihood<br />Low<br />Low Impact /Low Likelihood<br />Likelihood<br />
  49. 49. Fortify Priority Order<br />Critical – Critical issues have high impact and high likelihood. Critical issues are easy to discover and exploit and result in large asset damage. <br />High – High-priority issues have high impact and low likelihood. High-priority issues are often difficult to discover and exploit, but can result in large asset damage. <br />Medium – Medium-priority issues have low impact and high likelihood. Medium-priority issues are easy to discover or exploit, but often result in small asset damage. <br />Low – Low-priority issues have low impact and low likelihood. Low-priority issues can be difficult to discover and exploit and typically result in small asset damage. <br />
  50. 50. Correlation<br />28<br />
  51. 51. Goals<br />Expanded dynamic coverage<br />Identify valid URLs<br />List parameters accessed under each URL<br />Correlating static and dynamic results<br />Remediation details for dynamic issues<br />Prioritization of static issues<br />Equality<br />Existence<br />Proximity<br />
  52. 52. Expanded Dynamic Coverage<br />List valid URLs<br />/riches/FindLocations.action<br /> /riches/pages/FindLocations.jsp<br />/riches/auth/oper/SendMessage.action<br /> /riches/pages/oper/SendMessage.jsp<br /> /riches/pages/oper/InvalidEmail.jsp<br />/riches/login/Error.action<br /> /riches/login/error.jsp<br />/riches/auth/oper/Admin.action<br /> /riches/pages/oper/Admin.jsp<br />/riches/login/Register.action<br /> /riches/login/Register.jsp<br />/riches/auth/Transfer.action<br /> /riches/pages/Transfer.jsp<br />/riches/auth/PerformCheck.action<br /> /riches/pages/PerformCheck.jsp<br />...<br />web.xml<br />- Action extension<br /> (e.g. .action)<br />context.xml<br />- Root context (e.g. /riches)<br />struts.config<br /><ul><li> Action mappings
  53. 53. Packages
  54. 54. Action results</li></li></ul><li>Expanded Dynamic Coverage<br />List parameters for each URL<br />/riches/FindLocations.action<br />/riches/auth/oper/SendMessage.action<br /> severity, subject, body, to<br />/riches/login/Error.action<br />/riches/auth/oper/Admin.action<br /> addresses, auth<br />/riches/login/Register.action<br />/riches/auth/Transfer.action<br /> accounts<br />/riches/auth/PerformCheck.action<br />addr, acct, account, memo, name, amount<br />/riches/ShowLocations.action<br /> zip, state, address, type, locations, city<br />/riches/login/Login.action<br />
  55. 55. Correlation: Equality<br />Find static and dynamic issues at same URL<br />Remediation details for dynamic issues<br />Improved prioritization for static issues<br />dynamicSQL Injection<br />program<br />staticSQL injection<br />
  56. 56. Remediation Details<br />
  57. 57. Correlation: Existence<br />Find dynamic Session Fixation, CSRF, ... issues<br />Prioritize static issues in same category<br />dynamicCSRF<br />program<br />staticCSRF <br />staticCSRF<br />
  58. 58. Correlation: Proximity (source)<br />Find dynamic SQL Injection<br />Prioritize static issues with same source<br />dynamicSQL injection<br />program<br />staticlog forging<br />static SQL injection<br />
  59. 59. Correlation: Proximity (sink)<br />Find dynamic SQL Injection, XSS, … issues at URL<br />Prioritize static issues in same category and file<br />dynamicSQL injection<br />program<br />source 1<br />source 2<br /> 2 static SQL injectionissues<br />
  60. 60. Case Study: Fortify on Demand<br />37<br />
  61. 61. Fortify on Demand<br />SaaS-based Software Security Testing <br />Fortify on Demand<br />Static <br />Analysis<br />Dynamic <br />Analysis<br />
  62. 62. Riches Wealth Online (RWO)<br />39<br />
  63. 63. Static Analysis of RWO<br />RWO produces 64 high-impact static issues <br />26 critical-priority issues (high likelihood)<br />38 high-priority issues (low likelihood)<br />Mapped 21 static issues to URLs<br />33% of high impact issues<br />73% of high impact issues that involve web input<br />Remaining 43 aren’t surprising<br />14 resource leaks in model code<br />6 unsafe configuration values<br />23 “other issues”, including database and file system inputs<br />
  64. 64. Correlation on RWO<br />41<br />
  65. 65. Conclusion<br />42<br />
  66. 66. Apply<br />Use static analysis to assess and improve completeness of dynamic tests<br />Use dynamic analysis to narrow down static analysis results to those that are exploitable<br />Don’t stop there – use the combined view of the program under test to better inform auditing and remediation activities (existence and proximity)<br />43<br />

×