A Python Security Analysis Framework in Integrity Verification and Vulnerability Detection

被引:3
|
作者
PENG Shuanghe [1 ]
LIU Peiyao [1 ]
HAN Jing [1 ]
机构
[1] Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University
基金
中国国家自然科学基金;
关键词
Python; integrity verification; vulnerability detection;
D O I
暂无
中图分类号
TP309 [安全保密]; TP312.2 [];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Python is widely used in web crawler, machine learning, data analysis and so on. However, there is no guarantee that Python scripts are trusted in their whole lifetime because of system insecurity. When the system is attacked, scripts in the computer are likely to be tampered with. Therefore, the trustworthiness of Python scripts needs to be checked through different configuration strategies, including integrity verification and vulnerability detection. In this paper, integrity verification and vulnerability detection are based on two Python scripts, an original Python script and a current Python script, and the original Python script is assumed to has no vulnerabilities. By comparing with the original script, we can find out whether the current script is integrity or not and detect whether there are vulnerabilities if the integrity of the current file is destroyed. Integrity verification with Hash functions is not applied in some cases. In this mode, any changes including blank lines added are considered illegal. So loose integrity verification by combining UNIX diff tool with abstract syntax trees is proposed. The vulnerability detection starts from the premise that the original Python script has no vulnerabilities, and taint analysis is applied on the vulnerability detection framework Bandit to find vulnerabilities. Besides, in order not to change the usage of Python, both integrity verification and vulnerability detection modules are embedded in Python interpreter. The experiments show that the performance of security analysis framework is good and Bandit with taint can greatly reduce the false positive results without affecting the performance.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [1] Cryptographic core design security verification and vulnerability detection based on information flow analysis
    Ma Y.
    Tang S.
    Tan J.
    Li X.
    Hu W.
    Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2022, 40 (01): : 76 - 83
  • [2] Supply Chain Security: Pre-training Model for Python']Python Source Code Vulnerability Detection
    Le, Yiwang
    Li, Hui
    Wang, Bin
    Luo, Zhixiong
    Yang, Ao
    Ma, Ziheng
    2024 3RD INTERNATIONAL JOINT CONFERENCE ON INFORMATION AND COMMUNICATION ENGINEERING, JCICE 2024, 2024, : 150 - 155
  • [3] Web Vulnerability Detection Analyzer Based on Python']Python
    Xu, Dawei
    Chen, Tianxin
    Tan, Zhonghua
    Wu, Fudong
    Gao, Jiaqi
    Yang, Yunfan
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2022, 14 (02)
  • [4] Accelerating SoC Security Verification and Vulnerability Detection Through Symbolic Execution
    Tang, Shibo
    Wang, Xingxin
    Gao, Yifei
    Hu, Wei
    2022 19TH INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2022, : 207 - 208
  • [5] SV-AF - A Security Vulnerability Analysis Framework
    Alqahtani, Sultan S.
    Eghan, Ellis E.
    Rilling, Juergen
    2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, : 219 - 229
  • [6] SecureQwen: Leveraging LLMs for vulnerability detection in python']python codebases
    Mechri, Abdechakour
    Ferrag, Mohamed Amine
    Debbah, Merouane
    COMPUTERS & SECURITY, 2025, 148
  • [7] VUDENC: Vulnerability Detection with Deep Learning on a Natural Codebase for Python']Python
    Wartschinski, Laura
    Noller, Yannic
    Vogel, Thomas
    Kehrer, Timo
    Grunske, Lars
    INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 144
  • [8] Python']Python source code vulnerability detection with named entity recognition
    Ehrenberg, Melanie
    Sarkani, Shahram
    Mazzuchi, Thomas A.
    COMPUTERS & SECURITY, 2024, 140
  • [9] Machine Learning Techniques For Python']Python Source Code Vulnerability Detection
    Farasat, Talaya
    Posegga, Joachim
    PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024, 2024, : 151 - 153
  • [10] The role of program analysis in security vulnerability detection: Then and now
    Cifuentes, Cristina
    Gauthier, Francois
    Hassanshahi, Behnaz
    Krishnan, Padmanabhan
    Mccall, Davin
    COMPUTERS & SECURITY, 2023, 135