skip to main content
10.1145/2048147.2048149acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
demonstration

Automatically fixing security vulnerabilities in Java code

Published: 22 October 2011 Publication History

Abstract

Most kinds of security vulnerabilities in web applications can be fixed by adding appropriate sanitization methods. Finding the correct place for the sanitizers can be difficult due to complicated data and control flow. Fixing SQL injection vulnerabilities may require more complex transformations, such as replacing uses of Statement by PreparedStatement, which could include some code motion.
We have developed algorithms to place sanitizers correctly, as well as to transform Statement to PreparedStatement. These have been implemented as "quick fixes" in an Eclipse plugin that works together with a commercial tool that discovers security vulnerabilities in web applications.

Reference

[1]
A. Abadi, Y. A. Feldman, and M. Shomrat. Code-motion for API migration: Fixing SQL injection vulnerabilities in Java. In Proc. Fourth Workshop on Refactoring Tools, May 2011.

Cited By

View all
  • (2024)On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair toolsEmpirical Software Engineering10.1007/s10664-024-10506-z29:5Online publication date: 3-Aug-2024
  • (2023)APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilitiesEmpirical Software Engineering10.1007/s10664-023-10415-729:1Online publication date: 6-Dec-2023
  • (2021)DepthStAr: Deep Strange Arguments DetectionCyber Security Cryptography and Machine Learning10.1007/978-3-030-78086-9_5(71-85)Online publication date: 1-Jul-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
OOPSLA '11: Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion
October 2011
360 pages
ISBN:9781450309424
DOI:10.1145/2048147

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. quick fix
  2. security

Qualifiers

  • Demonstration

Conference

SPLASH '11
Sponsor:

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)2
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair toolsEmpirical Software Engineering10.1007/s10664-024-10506-z29:5Online publication date: 3-Aug-2024
  • (2023)APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilitiesEmpirical Software Engineering10.1007/s10664-023-10415-729:1Online publication date: 6-Dec-2023
  • (2021)DepthStAr: Deep Strange Arguments DetectionCyber Security Cryptography and Machine Learning10.1007/978-3-030-78086-9_5(71-85)Online publication date: 1-Jul-2021
  • (2019)Automatic Software RepairIEEE Transactions on Software Engineering10.1109/TSE.2017.275501345:1(34-67)Online publication date: 1-Jan-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media