SlideShare a Scribd company logo
1 of 29
Download to read offline
© 2019 Synopsys, Inc. 1
Why All Open Source Scans Aren’t Created Equal
Emmanuel Tournier, Senior Manager, Black Duck Audits
Phil Odence, General Manager, Black Duck Audits
© 2019 Synopsys, Inc. 2
Speakers
Phil Odence
General Manager
Black Duck Audits
Emmanuel Tournier
Senior Manager
Black Duck Audits
© 2019 Synopsys, Inc. 3
Agenda
Open Source Scanning and Risk Basics
Solutions and Tradeoffs
Real World Examples
Conclusions and Q&A
© 2019 Synopsys, Inc. 4
Open Source Scanning and Risk Basics
© 2019 Synopsys, Inc. 5
The Value of Open Source is Clear
Accelerates time to market
Frees developers to work on other tasks
Reduces development costs
© 2019 Synopsys, Inc. 6
So open source is often unchecked, resulting in risks
Codebase
Commercial
third-party code
Purchasing
• Licensing?
• Security?
• Quality?
• Support?
Open source
OPERATIONAL FACTORS
Which versions of code are being used,
and how old are they (dead projects)?
LEGAL RISK
Which licenses are used, and do they
match anticipated use of the code?
SECURITY RISK
Which components have
vulnerabilities, and what are they?
Management
visibility—not!
© 2019 Synopsys, Inc. 7
What we find in Black Duck Open Source Audits…
Source: 2019 Annual Open Source Security and Risk Assessment
of the 2018 audited
code analyzed was
open source
of the audited
codebases contained
license issues
of the audited
codebases
contained
vulnerabilities
"...many open-source assets
are either undermanaged or
altogether unmanaged …."
-Gartner, 2017
© 2019 Synopsys, Inc. 8
Requirements for World-Class OSS Management
• Strategy
– The business objectives for use of OSS
• Policy
– Usage rules
• Process
– How managed
• Technology
– Automated governance and compliance
– Including scanning
© 2019 Synopsys, Inc. 9
Solutions and Tradeoffs
© 2019 Synopsys, Inc. 10
Concept
• All open source scans shouldn’t be created equal
– Engineering tradeoffs are based on requirements
© 2019 Synopsys, Inc. 11
This Photo by Unknown Author is
licensed under CC BY-SA-NC
The Spectrum of Open Source Scans
Tools
Other Tools
Tools
Auditor
Automated
Tool
Human
w/tools
© 2019 Synopsys, Inc. 12
The way of the world…
Human Effort
Depth and
Accuracy of
Analysis
© 2019 Synopsys, Inc. 13
So what’s the right tradeoff?
• It depends…
• On the scenario
– Risk Tolerance
– Use Case
– Issues/Requirements
– Resources
• More risk and specific needs require
deep/accurate analysis
This Photo by Unknown Author is licensed under CC BY-NC
© 2019 Synopsys, Inc. 14
M&A is Risky Business
• Reputations and fortunes on the line on both sides
• "...many open-source assets are either undermanaged or
altogether unmanaged once established within an IT
portfolio.” (Gartner)
• And even more so for smaller companies
• Deeper pockets may draw fire
• OSS questions have gone from unusual to being the norm
in tech due diligence
© 2019 Synopsys, Inc. 15
Typically M&A Due Diligence Demands Depth & Accuracy
Human Effort
Depth and
Accuracy of
Analysis
M&A
Audit
Typical
Automated
Solution
© 2019 Synopsys, Inc. 16
Accuracy
• Getting the BoM “right
– Complete/Correct
• Range of Techniques
– Examples:
– Finding declarations in build files
– Recognizing Binary Signatures
– String Search
– Human Inspection
• Each finds some open source
– Some find other 3rd party
• The Best Technique
– …all of the above
© 2019 Synopsys, Inc. 17
Depth of Analysis and Use Case
• Levels of software composition
– Component
– File
– Source Code Snippets
• License Compliance vs. Security Use Case
– Open Source Licenses
– Apply at source level
– Vulnerabilities
– Apply at component level
© 2019 Synopsys, Inc. 18
Example of a problematic license: GPL v.2
GPL v.2
(Section 2. b.)
You must cause any work that you distribute or publish, that in whole or in part contains or is derived from
the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms
of this license.
GPL v.2
(Section 3)
You may copy and distribute the Program (or a work based on it) in object code or executable form … provided that you
also do one of the following:
• accompany it with the complete corresponding machine-readable source code … on a medium customarily used for
software interchange; or,
• accompany it with a written offer … to give any third party, for a charge no more than your cost of physically performing
source distribution, a complete machine-readable copy of the corresponding source code.
© 2019 Synopsys, Inc. 19
Other Considerations
M & A Due Diligence Internal Management
Nature of Analysis One-time snap shot Dynamic
Code Access Generally, remote via trusted 3rd
Party
Integration with SDLC
Timing Quick turnaround Deployed, On-Going
Credibility Important for multiple parties Built and tuned over time
Reporting Easily shareable format Application with user roles
© 2019 Synopsys, Inc. 20
Real World Examples
© 2019 Synopsys, Inc. 21
Code analysis engine—binary and source code
Dependency analysis
• Detects dependencies inside libraries, executables,
jars, classes, dll’s, etc.
• Import/include statements
Archives*
• Descends into archives such as zip, jar, and tar
files, and recursively performs source and binary
analysis
Exact file matching
• KB contains libraries, class files, binaries, archives, and
images
Snippet matching
KB contains hundreds of millions of code prints to detect
matches down to the snippet level
• Detects matches of components, files, and code fragments
(finds reused code even when altered)
• Language independent
Integrated string search
• Enables targeted license and copyright searches
• Finds licenses, copyrights, URLs, company names, user
comments (“taken from”), etc.
File pattern name matching
• Customize file types to include/exclude in scans
* Many archives are redundant
or unnecessary to scan, and
inclusion can affect the audit
cost. Please verify that they are
in scope for your engagement.
© 2019 Synopsys, Inc. 22
Manual analysis benefits vs. automated scan
• Manual review of source code matches: achieve better accuracy than
automated scan
• Snippet matches: discover modified 3rd party source files
• String searches: discover 3rd party components that are not in the KB:
• StackOverflow.com / StackExchange, gist.github.com, MSDN …
• New or little known source code from blogs / personal websites
• 3rd party commercial code
• Manual inspection of libraries or executables with no match against the
KB
© 2019 Synopsys, Inc. 23
Example #1: manual review allows better accuracy
© 2019 Synopsys, Inc. 24
Example #2: snippets
© 2019 Synopsys, Inc. 25
Example #3: string searches
© 2019 Synopsys, Inc. 26
Example #4: precompiled libs or executable
• Using custom tool to extract binary file data, we are able to find 3rd party commercial or recompiled
open source content
© 2019 Synopsys, Inc. 27
Conclusions and Q&A
© 2019 Synopsys, Inc. 28
So what kind of scan do you need?
• Internal Management
– Simple
– Integrated
– Dynamic
• M&A Due Diligance
– Typically 3rd party
– Accurate
– All OSS
– Other 3rd Party
– Deep
– Other 3rd Party
– Snapshot
© 2019 Synopsys, Inc. 24
So what kind of scan do you need?
• Internal Management
– Simple
– Integrated
– Dynamic
• M&A Due Diligance
– Typically 3rd party
– Accurate
– All OSS
– Other 3rd Party
– Deep
– Other 3rd Party
– Snapshot
Thank You

More Related Content

What's hot

Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Synopsys Software Integrity Group
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksSynopsys Software Integrity Group
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsSynopsys Software Integrity Group
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Synopsys Software Integrity Group
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Black Duck by Synopsys
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodeDevOps.com
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesInfosec
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisCarlos Andrés García
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...Synopsys Software Integrity Group
 

What's hot (20)

Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 
Webinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis ReportWebinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis Report
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or RealityWebinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 

Similar to Why All Open Source Scans Aren't Created Equal: The Spectrum of Scanning Depth and Accuracy

Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisVMware Tanzu
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companiesiasaglobal
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Synopsys Software Integrity Group
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsBlack Duck by Synopsys
 
OSS - enterprise adoption strategy and governance
OSS -  enterprise adoption strategy and governanceOSS -  enterprise adoption strategy and governance
OSS - enterprise adoption strategy and governancePrabir Kr Sarkar
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Executive Leaders Network
 
Chp 8 lect 8 - software issues (shared)
Chp 8   lect 8 - software issues (shared)Chp 8   lect 8 - software issues (shared)
Chp 8 lect 8 - software issues (shared)YUSRA FERNANDO
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyAll Things Open
 
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationWebinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationSynopsys Software Integrity Group
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...Black Duck by Synopsys
 
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...hani727151
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Mary Lou Wakimura
 
Open source iam value, benefits, and risks
Open source iam  value, benefits, and risksOpen source iam  value, benefits, and risks
Open source iam value, benefits, and risksWSO2
 
Unlocking Engineering Observability with advanced IT analytics
Unlocking Engineering Observability with advanced IT analyticsUnlocking Engineering Observability with advanced IT analytics
Unlocking Engineering Observability with advanced IT analyticssource{d}
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays
 
IP and WTP for digital products
IP and WTP for digital productsIP and WTP for digital products
IP and WTP for digital productsMIPLM
 

Similar to Why All Open Source Scans Aren't Created Equal: The Spectrum of Scanning Depth and Accuracy (20)

Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companies
 
Webinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript ApplicationsWebinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript Applications
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOps
 
OSS - enterprise adoption strategy and governance
OSS -  enterprise adoption strategy and governanceOSS -  enterprise adoption strategy and governance
OSS - enterprise adoption strategy and governance
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
 
Chp 8 lect 8 - software issues (shared)
Chp 8   lect 8 - software issues (shared)Chp 8   lect 8 - software issues (shared)
Chp 8 lect 8 - software issues (shared)
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
 
Social Code Scanning
Social Code ScanningSocial Code Scanning
Social Code Scanning
 
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationWebinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
 
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...
 
Open source iam value, benefits, and risks
Open source iam  value, benefits, and risksOpen source iam  value, benefits, and risks
Open source iam value, benefits, and risks
 
Unlocking Engineering Observability with advanced IT analytics
Unlocking Engineering Observability with advanced IT analyticsUnlocking Engineering Observability with advanced IT analytics
Unlocking Engineering Observability with advanced IT analytics
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
 
IP and WTP for digital products
IP and WTP for digital productsIP and WTP for digital products
IP and WTP for digital products
 

More from Synopsys Software Integrity Group

More from Synopsys Software Integrity Group (9)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity
 
Webinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec ResourceWebinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec Resource
 
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production Environments
 
Infographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPRInfographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPR
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 

Why All Open Source Scans Aren't Created Equal: The Spectrum of Scanning Depth and Accuracy

  • 1. © 2019 Synopsys, Inc. 1 Why All Open Source Scans Aren’t Created Equal Emmanuel Tournier, Senior Manager, Black Duck Audits Phil Odence, General Manager, Black Duck Audits
  • 2. © 2019 Synopsys, Inc. 2 Speakers Phil Odence General Manager Black Duck Audits Emmanuel Tournier Senior Manager Black Duck Audits
  • 3. © 2019 Synopsys, Inc. 3 Agenda Open Source Scanning and Risk Basics Solutions and Tradeoffs Real World Examples Conclusions and Q&A
  • 4. © 2019 Synopsys, Inc. 4 Open Source Scanning and Risk Basics
  • 5. © 2019 Synopsys, Inc. 5 The Value of Open Source is Clear Accelerates time to market Frees developers to work on other tasks Reduces development costs
  • 6. © 2019 Synopsys, Inc. 6 So open source is often unchecked, resulting in risks Codebase Commercial third-party code Purchasing • Licensing? • Security? • Quality? • Support? Open source OPERATIONAL FACTORS Which versions of code are being used, and how old are they (dead projects)? LEGAL RISK Which licenses are used, and do they match anticipated use of the code? SECURITY RISK Which components have vulnerabilities, and what are they? Management visibility—not!
  • 7. © 2019 Synopsys, Inc. 7 What we find in Black Duck Open Source Audits… Source: 2019 Annual Open Source Security and Risk Assessment of the 2018 audited code analyzed was open source of the audited codebases contained license issues of the audited codebases contained vulnerabilities "...many open-source assets are either undermanaged or altogether unmanaged …." -Gartner, 2017
  • 8. © 2019 Synopsys, Inc. 8 Requirements for World-Class OSS Management • Strategy – The business objectives for use of OSS • Policy – Usage rules • Process – How managed • Technology – Automated governance and compliance – Including scanning
  • 9. © 2019 Synopsys, Inc. 9 Solutions and Tradeoffs
  • 10. © 2019 Synopsys, Inc. 10 Concept • All open source scans shouldn’t be created equal – Engineering tradeoffs are based on requirements
  • 11. © 2019 Synopsys, Inc. 11 This Photo by Unknown Author is licensed under CC BY-SA-NC The Spectrum of Open Source Scans Tools Other Tools Tools Auditor Automated Tool Human w/tools
  • 12. © 2019 Synopsys, Inc. 12 The way of the world… Human Effort Depth and Accuracy of Analysis
  • 13. © 2019 Synopsys, Inc. 13 So what’s the right tradeoff? • It depends… • On the scenario – Risk Tolerance – Use Case – Issues/Requirements – Resources • More risk and specific needs require deep/accurate analysis This Photo by Unknown Author is licensed under CC BY-NC
  • 14. © 2019 Synopsys, Inc. 14 M&A is Risky Business • Reputations and fortunes on the line on both sides • "...many open-source assets are either undermanaged or altogether unmanaged once established within an IT portfolio.” (Gartner) • And even more so for smaller companies • Deeper pockets may draw fire • OSS questions have gone from unusual to being the norm in tech due diligence
  • 15. © 2019 Synopsys, Inc. 15 Typically M&A Due Diligence Demands Depth & Accuracy Human Effort Depth and Accuracy of Analysis M&A Audit Typical Automated Solution
  • 16. © 2019 Synopsys, Inc. 16 Accuracy • Getting the BoM “right – Complete/Correct • Range of Techniques – Examples: – Finding declarations in build files – Recognizing Binary Signatures – String Search – Human Inspection • Each finds some open source – Some find other 3rd party • The Best Technique – …all of the above
  • 17. © 2019 Synopsys, Inc. 17 Depth of Analysis and Use Case • Levels of software composition – Component – File – Source Code Snippets • License Compliance vs. Security Use Case – Open Source Licenses – Apply at source level – Vulnerabilities – Apply at component level
  • 18. © 2019 Synopsys, Inc. 18 Example of a problematic license: GPL v.2 GPL v.2 (Section 2. b.) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this license. GPL v.2 (Section 3) You may copy and distribute the Program (or a work based on it) in object code or executable form … provided that you also do one of the following: • accompany it with the complete corresponding machine-readable source code … on a medium customarily used for software interchange; or, • accompany it with a written offer … to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code.
  • 19. © 2019 Synopsys, Inc. 19 Other Considerations M & A Due Diligence Internal Management Nature of Analysis One-time snap shot Dynamic Code Access Generally, remote via trusted 3rd Party Integration with SDLC Timing Quick turnaround Deployed, On-Going Credibility Important for multiple parties Built and tuned over time Reporting Easily shareable format Application with user roles
  • 20. © 2019 Synopsys, Inc. 20 Real World Examples
  • 21. © 2019 Synopsys, Inc. 21 Code analysis engine—binary and source code Dependency analysis • Detects dependencies inside libraries, executables, jars, classes, dll’s, etc. • Import/include statements Archives* • Descends into archives such as zip, jar, and tar files, and recursively performs source and binary analysis Exact file matching • KB contains libraries, class files, binaries, archives, and images Snippet matching KB contains hundreds of millions of code prints to detect matches down to the snippet level • Detects matches of components, files, and code fragments (finds reused code even when altered) • Language independent Integrated string search • Enables targeted license and copyright searches • Finds licenses, copyrights, URLs, company names, user comments (“taken from”), etc. File pattern name matching • Customize file types to include/exclude in scans * Many archives are redundant or unnecessary to scan, and inclusion can affect the audit cost. Please verify that they are in scope for your engagement.
  • 22. © 2019 Synopsys, Inc. 22 Manual analysis benefits vs. automated scan • Manual review of source code matches: achieve better accuracy than automated scan • Snippet matches: discover modified 3rd party source files • String searches: discover 3rd party components that are not in the KB: • StackOverflow.com / StackExchange, gist.github.com, MSDN … • New or little known source code from blogs / personal websites • 3rd party commercial code • Manual inspection of libraries or executables with no match against the KB
  • 23. © 2019 Synopsys, Inc. 23 Example #1: manual review allows better accuracy
  • 24. © 2019 Synopsys, Inc. 24 Example #2: snippets
  • 25. © 2019 Synopsys, Inc. 25 Example #3: string searches
  • 26. © 2019 Synopsys, Inc. 26 Example #4: precompiled libs or executable • Using custom tool to extract binary file data, we are able to find 3rd party commercial or recompiled open source content
  • 27. © 2019 Synopsys, Inc. 27 Conclusions and Q&A
  • 28. © 2019 Synopsys, Inc. 28 So what kind of scan do you need? • Internal Management – Simple – Integrated – Dynamic • M&A Due Diligance – Typically 3rd party – Accurate – All OSS – Other 3rd Party – Deep – Other 3rd Party – Snapshot © 2019 Synopsys, Inc. 24 So what kind of scan do you need? • Internal Management – Simple – Integrated – Dynamic • M&A Due Diligance – Typically 3rd party – Accurate – All OSS – Other 3rd Party – Deep – Other 3rd Party – Snapshot