123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Automated Source Code Analysis Whitepaper

Profile Picture
By Author: Gwyn Fisher
Total Articles: 9
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Abstract Syntax Trees

An abstract syntax tree, or AST for short, is simply a tree-structured representation of the source code as might be typically generated by the preliminary parsing stages of a compiler. This tree contains a rich breakdown of the structure of the code in a non-ambiguous manner, allowing for simple searches to be performed for anomalous syntax.

Consider the example of an organization wishing to enforce a set of corporate coding standards. Stated in the standard is the basic requirement for the use of a compound statement block rather than single statements as the body of a loop (e.g. a for-loop). In this case,

Code Path Analysis
Consider now a more complex example. This time instead of looking for style violations, we wish to check whether an attempted dereference of a pointer should be expected to succeed or fail:

if( x & 1 )
ptr = NULL;
*ptr = 1;

In this case it is obvious from manual inspection that the variable ptr can assume a NULL value whenever the variable x is odd, and that this condition will cause an unavoidable zero-page dereference.

Attempting ...
... to find a bug of this type using AST scanning, however, is seriously non-trivial. Consider the (simplified, for clarity) AST that would be created from that snippet of code:

Statement Block
If-statement
Check-Expression
Binary-operator &
x
1
True-Branch
Expression-statement
Assignment-operator =
ptr
0
Expression-statement
Assignment-operator =
Dereference-pointer - ptr
1

In this case, there is no obvious tree search or simple node enumeration that could cover the attempted, and at least occasionally illegal, dereferencing of ptr in anything like a reasonably generalized form. So for cases such as this, it is necessary to take a step beyond simply searching for patterns of syntax.

What type of issues can be found?
In this section, we will walk through a number of examples of problems that can be identified using modern static source code analysis tools, showing how they occur and what can happen if they are not remedied before shipment. Whilst many more types of weakness can be found using Klocwork's tools, these examples should give the reader a firm grounding in what a good static analysis suite can do, regardless of the vendor.

Note that the examples given here are shown in a variety of C/C++ and Java. Where appropriate, the relevant capabilities within the product are available in all supported languages, however.
Security vulnerabilities
Traditionally of interest to developers working on consumer-facing applications, security is becoming more and more critical to developers in all types of environments, even those that have until recently considered source code security to be a non-issue. Some of the more important areas of security that can be found with automated source code analysis are:

Denial of service
SQL injection
Buffer overflow
Cross-site scripting (XSS)
Process/file injection

Total Views: 217Word Count: 439See All articles From Author

Add Comment

Computer Programming Articles

1. Learn Programming Efficiently With A Data Structures And Algorithms Tutorial
Author: Tech Point

2. How To Choose The Best Cybersecurity Certification That Offers Top Career Opportunities For You
Author: Lorcam Securities

3. Best C# Tutorial 2026: Master C# For Web And Desktop Development
Author: Tech Point

4. Data Center Cooling Market Growth, Trends & Forecast 2032 | Gmr
Author: Caitan Cruz

5. Ceh, Oscp, Or Comptia Security+: Which Cybersecurity Certification Is Best For You?
Author: Lorcam Securities

6. Microsoft Power Automate Workflow Automation Services
Author: brainbell10

7. Comprehensive Salesforce Tutorial: Learn Sales Cloud, Service Cloud, And Architecture
Author: Tech Point

8. Why Call Centers Prefer Renting Pcs Instead Of Buying Them
Author: Harsh

9. Macbook Repairs Adelaide – Professional & Reliable Service By Fix Laptops
Author: Fix Laptops

10. The Complete Ccie Security Lab Practice Companion
Author: ccielabpass

11. Web3 Blockchain Experts Jaipur
Author: Lalit Kumar Gupta

12. Flutter Tutorial For Beginners: Step-by-step Guide To Mobile App Development
Author: Tech Point

13. Python Cgi Programming Tutorial: Learn Server-side Python Step By Step
Author: Tech Point

14. Incomplete Access Reviews: A Growing Enterprise Security Risk And How To Resolve It
Author: Tushar Pansare

15. Typescript Tutorial: Learn Typescript From Basics To Advanced
Author: Tech Point

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: