
8. Static Analysis Days 2021 - DIGITAL
Because some of the presentations were held in German, we have only linked the English presentations for you.
DevSecOps – Detecting 0-day and N-day vulnerabilities, everyday.
(Walter Capitani, Director Technical Product Management, GrammaTech Inc. USA)The software development industry is in the midst of a shift to integrating security into the software development process - this is often referred to as DevSecOps, the combination of Development, Security and Operations.
A key part of the DevSecOps movement is to perform security testing as close to the developer as possible to find vulnerabilities earlier in the development cycle. A proven technique to find issues early is the integration of Static Application Security Testing (SAST) and Software Composition Analysis (SCA) tools into CI/CD pipelines.
Integration of these tools will execute tests and detect new vulnerabilities automatically with every code change.
Join this session to learn how the latest release of GrammaTech’s CodeSonar and CodeSentry solutions work together to support DevSecOps and detect N-day vulnerabilities in your source code, binaries, and 3rd party software components.
Presentation slides (pdf) watch Video now on YouTube
Finding the Serious Bugs that Matter with Advanced Static Analysis
(Dr. Paul Anderson, Vice President of Engineering, GrammaTech Inc. USA)Many teams use static analysis tools primarily to enforce coding standards like MISRA that are designed to make programming in highly risky languages such as C and C++ much less hazardous. However, because C and C++ are such dangerous languages, programs that seem perfectly compliant with these standards may still contain serious defects and security vulnerabilities due to the inadvertent introduction of undefined behavior.
The primary purpose of advanced static analysis tools is to see past the superficial syntactic properties of programs and into their deep semantic meaning, and by doing so, find those bugs.
This talk will describe how these tools work, and will show some concrete examples of real bugs that they found in production code, despite the code having gone through style checking, manual review, and testing.
Finally, you will get a taste of how users can customize the tools to their own domain, thereby allowing users to greatly increase the value they receive from using them.
Presentation slides (pdf) watch Video now on YouTube
Finding N-day Security Vulnerabilities in Third-party Software
(Dr. Paul Anderson, Vice President of Engineering, GrammaTech Inc. USA)An N-day vulnerability is a known security problem for which a fix is available, but where the fix has not been applied due to oversight, poor practice, or misunderstanding.
To identify such risky components, Software Composition Analysis tools are available to scan the source code for matches against a database of known code vulnerabilities in versioned components.
This problem is particularly acute for organizations that receive software binary code from their suppliers because the source code is unavailable to scan. This talk introduces a new technique for identifying N-day vulnerabilities in binary components.
Under the hood are a set of identification algorithms that use a variety of techniques including machine learning that work in concert to produce a software bill of materials enumerating the components used in the compilation of the binary. This is then cross-checked against vulnerability databases to produce a report that assesses the risk of the program as a whole.
Presentation slides (pdf) watch Video now on YouTube
Tools to Perform a Security Review on Unknown Code
(John Blattner, President Imagix Corp. and Walter Capitani, Director Technical Product Management, GrammaTech Inc. USA)Performing a deep security review on third party code is hard. You typically receive a bunch of source code, no design documents, very little comments in the source code. Still, you have to do an assessment of the code and provide a risk score.
Where do you get started?
Learn how tools can help. GrammaTech CodeSonar can perform deep static application security testing on the source code. The result is a set of warnings of things that may be risky. Still, to understand whether a problem, say a buffer overrun, is externally triggerable, you would need to understand the design of the application. This is where Imagix 4D comes in, it can overlay the path of the static analysis warning over a design that is reverse engineered from the source code. And that is just one of the many tricks.
Presentation slides (pdf) watch Video now on YouTube
Speakers

Dr. Paul Anderson

M.Sc. Jan-David Baltzer

John Blattner

Walter Capitani
