TY - JOUR
T1 - Vulnerabilities mapping based on OWASP-SANS
T2 - A survey for static application security testing (SAST)
AU - Li, Jinfeng
N1 - Publisher Copyright:
© 2020 by the author.
PY - 2020/7/1
Y1 - 2020/7/1
N2 - The delivery of a framework in place for secure application development is of real value for application development teams to integrate security into their development life cycle, especially when a mobile or web application moves past the scanning stage and focuses increasingly on the remediation or mitigation phase based on static application security testing (SAST). For the first time, to the author’s knowledge, the industry-standard Open Web Application Security Project (OWASP) top 10 vulnerabilities and CWE/SANS top 25 most dangerous software errors are synced up in a matrix with Checkmarx vulnerability queries, producing an application security framework that helps development teams review and address code vulnerabilities, minimise false positives discovered in static scans and penetration tests, targeting an increased accuracy of the findings. A case study is conducted for vulnerabilities scanning of a proof-of-concept mobile malware detection app. Mapping the OWASP/SANS with Checkmarx vulnerabilities queries, flaws and vulnerabilities are demonstrated to be mitigated with improved efficiency.
AB - The delivery of a framework in place for secure application development is of real value for application development teams to integrate security into their development life cycle, especially when a mobile or web application moves past the scanning stage and focuses increasingly on the remediation or mitigation phase based on static application security testing (SAST). For the first time, to the author’s knowledge, the industry-standard Open Web Application Security Project (OWASP) top 10 vulnerabilities and CWE/SANS top 25 most dangerous software errors are synced up in a matrix with Checkmarx vulnerability queries, producing an application security framework that helps development teams review and address code vulnerabilities, minimise false positives discovered in static scans and penetration tests, targeting an increased accuracy of the findings. A case study is conducted for vulnerabilities scanning of a proof-of-concept mobile malware detection app. Mapping the OWASP/SANS with Checkmarx vulnerabilities queries, flaws and vulnerabilities are demonstrated to be mitigated with improved efficiency.
KW - Application Security
KW - Checkmarx
KW - Malware Detection
KW - OWASP Top 10
KW - SANS Top 25
KW - Static Application Security Testing
KW - Vulnerability Mapping
UR - https://www.scopus.com/pages/publications/85088235911
U2 - 10.33166/AETiC.2020.03.001
DO - 10.33166/AETiC.2020.03.001
M3 - Article
AN - SCOPUS:85088235911
SN - 2516-0281
VL - 4
SP - 1
EP - 8
JO - Annals of Emerging Technologies in Computing
JF - Annals of Emerging Technologies in Computing
IS - 3
M1 - 1
ER -