A Mutation Framework for Evaluating Security Analysis Tools in IoT Applications

@article{Parveen2020AMF,
  title={A Mutation Framework for Evaluating Security Analysis Tools in IoT Applications},
  author={Sajeda Parveen and Manar H. Alalfi},
  journal={2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)},
  year={2020},
  pages={587-591}
}
  • Sajeda Parveen, M. Alalfi
  • Published 1 February 2020
  • Computer Science
  • 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)
In this paper, we present an automated framework to evaluate taint flow analysis tools in the domain of IoT (Internet of things) apps. First, we propose a set of mutational operators tailored to evaluate flow-sensitive analysis tools. Then we developed mutators to automatically generate mutants for this type of sensitivity analysis. We demonstrated the framework on flow- sensitivity mutational operators to evaluate two taint flow analyzers, SaINT and Taint-Things. To the best of our knowledge… 
Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach
TLDR
An approach is proposed and developed that mines features from the code related to program structure such as control statements and methods, in addition to program’s statement order, that is capable of accurately classify applications as vulnerable if the vulnerability is exhibited by changes in the order of statements in source code.

References

SHOWING 1-10 OF 56 REFERENCES
Security Analysis for SmartThings IoT Applications
TLDR
Taint-Things accurately identified all tainted flows reported by one of the state-of the-art tools with at least 4 times improved performance and reports potential vulnerable tainted flow in a concise security slice, which could provide security auditors with an effective and precise tool to pinpoint security issues in SmartThings apps under test.
Towards Security-Aware Mutation Testing
TLDR
This work designs security aware mutation operators to support mutation analysis for Java, and introduces 15 security-aware mutation operators for Java that are applicable and prevalent on open source projects, providing evidence that mutation analysis can support security testing activities.
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation
TLDR
The Mutation-based soundness evaluation (µSE) framework is proposed, which systematically evaluates Android static analysis tools to discover, document, and fix, flaws, by leveraging the well-founded practice of mutation analysis.
Detecting information flow by mutating input data
TLDR
In its evaluation, the MUTAFLOW prototype for Android programs showed that mutation-based flow analysis is a lightweight yet effective complement to existing tools, and compared to the popular FlowDroid static analysis tool, MutaFlow requires less than 10% of source code lines but has similar accuracy.
Identifying Vulnerable IoT Applications using Deep Learning
  • H. Naeem, M. Alalfi
  • Computer Science
    2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)
  • 2020
TLDR
The proposed approach of combining tainted flows features with the base benchmark that uses token frequencies only, has improved the accuracy of the prediction models from 77.78% to 92.59% for Corpus1 and 61.11% to 87.03%" for Corpus2.
Towards security testing with taint analysis and genetic algorithms
TLDR
It is shown that this approach can suggest candidate false positives reported by static analysis and provide input vectors that expose actual vulnerabilities, to be used as test cases in security testing.
Mutation-Based Test Generation from Security Protocols in HLPSL
TLDR
This paper introduces a set of mutation operators for HLPSL models that aim at introducing leaks in the security protocols, and introduces a testing technique that makes it possible to validate an implementation of a security protocol, based on a HLPSl model.
Program Analysis of Commodity IoT Applications for Security and Privacy
TLDR
This article studies privacy and security issues in IoT that require program-analysis techniques with an emphasis on identified attacks against these systems and defenses implemented so far and relates the efficacy of program- analysis techniques to security and privacy issues.
A Generic Metamodel For Security Policies Mutation
  • T. Mouelhi, F. Fleurey, B. Baudry
  • Computer Science
    2008 IEEE International Conference on Software Testing Verification and Validation Workshop
  • 2008
TLDR
A metamodel is proposed that provides a generic representation of security policies access control models and define a set of mutation operators at this generic level and is implemented using Kermeta to build and implement the mutation operators.
Pixy: a static analysis tool for detecting Web application vulnerabilities
TLDR
This paper uses flow-sensitive, interprocedural and context-sensitive dataflow analysis to discover vulnerable points in a program and applies it to the detection of vulnerability types such as SQL injection, cross-site scripting, or command injection.
...
1
2
3
4
5
...