This is a field sensitive taint analysis client implementation on top of Heros, which uses Boomerang to resolve aliasing.
Following dependencies must be built to run the analysis.
- Heros: https://github.com/Sable/heros
- BoomerangPDS: https://github.com/CodeShield-Security/SPDS
- PathExpressions: execute the
install_dependencies.shin/dependenciesfolder
- Various test cases are listed under
test/target/taint - Run the test cases in
TaintAnalysisTest - sources and sinks are defined as
SootMethodRef's increateAnalysisTransformermethod.
To access the GitHub packages repository, you also need to set up GitHub credentials in your Maven's settings.xml file. Therefore, you need to add a server block with the id github, your username and an access token that has package:read rights to your setting.xml. An in-depth documentation on how to do this can be found here.
<settings xmlns="http://maven.apache.org/SETTINGS/1.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/SETTINGS/1.0.0 http://maven.apache.org/xsd/settings-1.0.0.xsd"> <activeProfiles> <activeProfile>github</activeProfile> </activeProfiles> <profiles> <profile> <id>github</id> <repositories> <repository> <id>central</id> <url>https://repo1.maven.org/maven2</url> </repository> <repository> <id>github</id> <url>https://maven.pkg.github.com/CodeShield-Security/SPDS</url> <snapshots> <enabled>true</enabled> </snapshots> </repository> </repositories> </profile> </profiles> <servers> <server> <id>github</id> <username>USER</username> <password>TOKEN-USER</password> </server> </servers> </settings>