A Python Security Analysis Framework in Integrity Verification and Vulnerability Detection

被引:3
|
作者
PENG Shuanghe [1 ]
LIU Peiyao [1 ]
HAN Jing [1 ]
机构
[1] Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University
基金
中国国家自然科学基金;
关键词
Python; integrity verification; vulnerability detection;
D O I
暂无
中图分类号
TP309 [安全保密]; TP312.2 [];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Python is widely used in web crawler, machine learning, data analysis and so on. However, there is no guarantee that Python scripts are trusted in their whole lifetime because of system insecurity. When the system is attacked, scripts in the computer are likely to be tampered with. Therefore, the trustworthiness of Python scripts needs to be checked through different configuration strategies, including integrity verification and vulnerability detection. In this paper, integrity verification and vulnerability detection are based on two Python scripts, an original Python script and a current Python script, and the original Python script is assumed to has no vulnerabilities. By comparing with the original script, we can find out whether the current script is integrity or not and detect whether there are vulnerabilities if the integrity of the current file is destroyed. Integrity verification with Hash functions is not applied in some cases. In this mode, any changes including blank lines added are considered illegal. So loose integrity verification by combining UNIX diff tool with abstract syntax trees is proposed. The vulnerability detection starts from the premise that the original Python script has no vulnerabilities, and taint analysis is applied on the vulnerability detection framework Bandit to find vulnerabilities. Besides, in order not to change the usage of Python, both integrity verification and vulnerability detection modules are embedded in Python interpreter. The experiments show that the performance of security analysis framework is good and Bandit with taint can greatly reduce the false positive results without affecting the performance.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [41] Security Enhancement in Image Steganography for Medical Integrity Verification System
    Sreekutty, M. S.
    Baiju, P. S.
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [42] Informational Analysis of Security and Integrity
    Gruska, Damas P.
    FUNDAMENTA INFORMATICAE, 2012, 120 (3-4) : 295 - 309
  • [43] SIDBench: A Python']Python Framework for Reliably Assessing Synthetic Image Detection Methods
    Schinas, Manos
    Papadopoulos, Symeon
    PROCEEDINGS OF THE 3RD ACM INTERNATIONAL WORKSHOP ON MULTIMEDIA AI AGAINST DISINFORMATION, MAD 2024, 2024, : 55 - 64
  • [44] Defect and Cluster Characterization: A Python']Python-Based Plugin for Wellbore Integrity Analysis
    Nuhn, Zachary
    Leong, Chad
    Kolomytsev, Leonid
    Le Calvez, Joel
    Valstar, Dirk
    JOURNAL OF PRESSURE VESSEL TECHNOLOGY-TRANSACTIONS OF THE ASME, 2022, 144 (06):
  • [45] Empirical analysis of security vulnerabilities in Python packages
    Mahmoud Alfadel
    Diego Elias Costa
    Emad Shihab
    Empirical Software Engineering, 2023, 28
  • [46] An integrated framework for software vulnerability detection, analysis and mitigation: an autonomic system
    Kumar, Manoj
    Sharma, Arun
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (09): : 1481 - 1493
  • [47] An integrated framework for software vulnerability detection, analysis and mitigation: an autonomic system
    Manoj Kumar
    Arun Sharma
    Sādhanā, 2017, 42 : 1481 - 1493
  • [48] A Security Assurance Framework Combining Formal Verification and Security Functional Testing
    Wang, Weiguang
    Zeng, Qingkai
    Mathur, Aditya P.
    2012 12TH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE (QSIC), 2012, : 136 - 139
  • [49] A Framework for Protocol Vulnerability Condition Detection
    Meng, Yuxin
    Kwok, Lam-for
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS AND TECHNOLOGIES (SECURWARE 2011), 2011, : 91 - 96
  • [50] Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework
    Wang, Yongzhi
    Wei, Jinpeng
    Duan, Yucong
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 53 - 70