Oracle Corporation
Detecting second-order security vulnerabilities via modelling information flow through persistent storage
Last updated:
Abstract:
A method may include determining that a source variable in code receives a source value from a source function specified by a target analysis, determining that a source statement in the code writes, using the source variable, the source value to a column in a table, obtaining, for a sink statement in the code, a set of influenced variables influenced by the source variable, determining that the sink statement reads the source value into a sink variable including an identifier of the column, generating a modified set of influenced variables by adding the sink variable to the set of influenced variables, and reporting a defect at the sink statement.
Status:
Grant
Type:
Utility
Filling date:
15 Feb 2019
Issue date:
2 Nov 2021