JAVA语言之Fortify扫描 -- 软件安全错误的分类
小标 2019-04-25 来源 : 阅读 7197 评论 0

摘要:本文主要向大家介绍了JAVA语言之Fortify扫描 -- 软件安全错误的分类,通过具体的内容向大家展示,希望对大家学习JAVA语言有所帮助。

本文主要向大家介绍了JAVA语言之Fortify扫描 -- 软件安全错误的分类,通过具体的内容向大家展示,希望对大家学习JAVA语言有所帮助。

JAVA语言之Fortify扫描 -- 软件安全错误的分类

软件安全错误分类

  • Input Validation and Representation: 输入验证和表示

  • API Abuse: API滥用

  • Security Features: 安全功能

  • Time and State: 时间和国家

  • Errors: 错误

  • Code Quality: 代码质量

  • Encapsulation: 封装

1 Input Validation and Representation(输入验证和表示)

输入验证和表示问题是由元字符,备用编码和数字表示引起的。 信任输入导致安全问题。 问题包括:缓冲区溢出,跨站点脚本***,SQL注入以及许多其他问题

功能模块扫描项
Input Validation and RepresentationBuffer Overflow
Input Validation and RepresentationCommand Injection
Input Validation and RepresentationCross-Site Scripting
Input Validation and RepresentationFormat String
Input Validation and RepresentationHTTP Response Splitting
Input Validation and RepresentationIllegal Pointer Value
Input Validation and RepresentationInteger Overflow
Input Validation and RepresentationLog Forging
Input Validation and RepresentationPath Manipulation
Input Validation and RepresentationProcess Control
Input Validation and RepresentationResource Injection
Input Validation and RepresentationSetting Manipulation
Input Validation and RepresentationSQL Injection
Input Validation and RepresentationString Termination Error
Input Validation and RepresentationStruts: Duplicate Validation Forms
Input Validation and RepresentationStruts: Form Bean Does Not Extend Validation Class
Input Validation and RepresentationStruts: Form Field Without Validator
Input Validation and RepresentationStruts: Plug-in Framework Not In Use
Input Validation and RepresentationStruts: Unused Validation Form
Input Validation and RepresentationStruts: Unvalidated Action Form
Input Validation and RepresentationStruts: Validator Turned Off
Input Validation and RepresentationStruts: Validator Without Form Field
Input Validation and RepresentationUnsafe JNI
Input Validation and RepresentationUnsafe Reflection
Input Validation and RepresentationXML Validation

2 API Abuse

功能模块扫描项
API AbuseDangerous Function
API AbuseDirectory Restriction
API AbuseHeap Inspection
API AbuseJ2EE Bad Practices: getConnection()
API AbuseJ2EE Bad Practices: Sockets
API AbuseOften Misused: Authentication
API AbuseOften Misused: Exception Handling
API AbuseOften Misused: File System
API AbuseOften Misused: Privilege Management
API AbuseOften Misused: Strings
API AbuseUnchecked Return Value

3 Security Features

功能模块扫描项
Security FeaturesInsecure Randomness
Security FeaturesLeast Privilege Violation
Security FeaturesMissing Access Control
Security FeaturesPassword Management
Security FeaturesPassword Management: Empty Password in Config File
Security FeaturesPassword Management: Hard-Coded Password
Security FeaturesPassword Management: Password in Config File
Security FeaturesPassword Management: Weak Cryptography
Security FeaturesPrivacy Violation

4 Time and State

功能模块扫描项
Time and StateDeadlock
Time and StateFailure to Begin a New Session upon Authentication
Time and StateFile Access Race Condition: TOCTOU
Time and StateInsecure Temporary File
Time and StateJ2EE Bad Practices: System.exit()
Time and StateJ2EE Bad Practices: Threads
Time and StateSignal Handling Race Conditions

5 Errors

功能模块扫描项
ErrorsCatch NullPointerException
ErrorsEmpty Catch Block
ErrorsOverly-Broad Catch Block
ErrorsOverly-Broad Throws Declaration

6 Code Quality

功能模块扫描项
Code QualityDouble Free
Code QualityInconsistent Implementations
Code QualityMemory Leak
Code QualityNull Dereference
Code QualityObsolete
Code QualityUndefined Behavior
Code QualityUninitialized Variable
Code QualityUnreleased Resource
Code QualityUse After Free

7 Encapsulation

功能模块扫描项
EncapsulationComparing Classes by Name
EncapsulationData Leaking Between Users
EncapsulationLeftover Debug Code
EncapsulationMobile Code: Object Hijack
EncapsulationMobile Code: Use of Inner Class
EncapsulationMobile Code: Non-Final Public Field
EncapsulationPrivate Array-Typed Field Returned From a Public Method
EncapsulationPublic Data Assigned to Private Array-Typed Field
EncapsulationSystem Information Leak
EncapsulationTrust Boundary Violation

本文由职坐标整理并发布,希望对同学们有所帮助。了解更多详情请关注编程语言JAVA频道!

本文由 @小标 发布于职坐标。未经许可,禁止转载。
喜欢 | 0 不喜欢 | 3
看完这篇文章有何感觉?已经有3人表态,0%的人喜欢 快给朋友分享吧~
评论(0)
后参与评论

您输入的评论内容中包含违禁敏感词

我知道了

助您圆梦职场 匹配合适岗位
验证码手机号,获得海同独家IT培训资料
选择就业方向:
人工智能物联网
大数据开发/分析
人工智能Python
Java全栈开发
WEB前端+H5

请输入正确的手机号码

请输入正确的验证码

获取验证码

您今天的短信下发次数太多了,明天再试试吧!

提交

我们会在第一时间安排职业规划师联系您!

您也可以联系我们的职业规划师咨询:

小职老师的微信号:z_zhizuobiao
小职老师的微信号:z_zhizuobiao

版权所有 职坐标-一站式IT培训就业服务领导者 沪ICP备13042190号-4
上海海同信息科技有限公司 Copyright ©2015 www.zhizuobiao.com,All Rights Reserved.
 沪公网安备 31011502005948号    

©2015 www.zhizuobiao.com All Rights Reserved

208小时内训课程