Oracle Corporation
Detecting second-order security vulnerabilities via modelling information flow through persistent storage

Last updated:

Abstract:

A method may include determining that a source variable in code receives a source value from a source function specified by a target analysis, determining that a source statement in the code writes, using the source variable, the source value to a column in a table, obtaining, for a sink statement in the code, a set of influenced variables influenced by the source variable, determining that the sink statement reads the source value into a sink variable including an identifier of the column, generating a modified set of influenced variables by adding the sink variable to the set of influenced variables, and reporting a defect at the sink statement.

Status:
Grant
Type:

Utility

Filling date:

15 Feb 2019

Issue date:

2 Nov 2021