Injection-Angriffe: Szenarien, Analyseansätze, Gegenmaßnahmen und Erfahrungen aus der Praxis
- Dr. Alexander von Rhein
Injection-Angriffe: Szenarien, Analyseanstze, Gegenmanahmen und - - PowerPoint PPT Presentation
Injection-Angriffe: Szenarien, Analyseanstze, Gegenmanahmen und Erfahrungen aus der Praxis Dr. Alexander von Rhein Alexander von Rhein Research Software Verification Software-Product-Line Analysis Taint-Analysis Consulting Software
rm -rf
source sink
[Business Risk Illustration, Onapsis]
source sink
Object, can be invoked by user Parameter of the report „Main method“ of the report Class declaration Class implementation
source sink
y = 1, z = 2 x z = x + y z
y x z
source sink source sink
sink source
Version History Static Analysis Test Coverage
Does our system leak confidential data? Where are gaps in my tests?
Version History Static Analysis
Coverage
Does our system leak confidential data? Where are gaps in my tests? Which code is actually used?
Version History Static Analysis
Coverage
Does our system leak confidential data? Where are gaps in my tests? Which code is actually used? Are there head- monopolies?
Version History Static Analysis
Coverage
Which changes have not been reviewed? Is our architecture in conformance with the code? Does our system leak confidential data? Where are gaps in my tests? Which code is actually used? Are there head- monopolies? Which components are most error-prone? Do we discover errors early enough?
Version History Static Analysis
Coverage