1 / 25

Enhancing Software Assurance with Common Weakness Enumeration (CWE) and Metrics Evaluation

This briefing highlights the importance of using a unified set of software weakness definitions and evaluating the effectiveness of software assurance tools. The Common Weakness Enumeration (CWE) provides a dictionary of software weaknesses, while the Software Assurance Metrics and Tool Evaluation (SAMATE) project measures tool effectiveness. By implementing these standards, the government can improve software assurance evaluation and certification.

vincentk
Download Presentation

Enhancing Software Assurance with Common Weakness Enumeration (CWE) and Metrics Evaluation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 7 May 2008 DHS-DoD-DoC Software AssuranceForum Technology, Tools and Product Evaluation Working Group Status Briefing (Co-)Chair(s) Michael Kass (NIST) Larry Wagoner (NSA)

  2. TT&PE Working Group Goal • To assist in bringing software assurance (SwA) tools and technologies into the government's effort to improve the speed and accuracy of software assurance evaluation and certification of COTS, GOTS and open source software. • Current state of SwA technology and tools is “stovepipe” in nature, making a tool-based argument for software assurance difficult: • Tools use different terminology and definitions for software weaknesses • Software assurance tools vary in their capabilities , tool users need a way to measure and compare them • Standards are needed to bring software assurance tools and technology into one “eco-system” to create a full solution that supports the assurance case • An “attacker’s view” of an application’s security is just as important as a “defender’s view”, and a formalized catalog of attack patterns can aide risk analysis and software assurance evaluations

  3. TT&PE Working Group Actions • Develop a Common Weakness Enumeration (CWE) • Measure and Evaluate SwA Tool Effectiveness (SAMATE) • Support SwA Tool Interoperability, Testing and Integration with the Assurance Case through OMG/ISO Standards • Develop a Common Attack Pattern Enumeration and Classification (CAPEC)

  4. Dictionary of Software Weaknesses (CWE) Getting Tools to Speak a Common Language Analysis Tool (A) Analysis Tool (B) S/W Dev Artifact (source code) 127 127 Tool Report Tool Report Array Bounds Error Buffer Under-read Buffer Under-read Buffer Error

  5. Common Weakness Enumeration (CWE) • A DHS-sponsored, community-developed dictionary of software weakness types that provides a unified, measurable set of software weaknesses that will enable more effective discussion, description, selection, and use of software security tools and services that can find these weaknesses • Available online at http://cwe.mitre.org • Contains ~700 descriptions and associated information for weaknesses introduced anywhere in the software development lifecycle

  6. CWE on the web at http://cwe.mitre.org

  7. CWE Stakeholders • Assessment Vendors • Developers of code scanners, services, and other types of assessment technologies • Assessment Customers • Purchasers and users of assessment technologies and services • Software Developers • Developers, designers, architects, and vendors of software, whether it is commercial or open source • Software Customers • Customers of software, whether it is commercial or open source, customized or widely available • Academic Researchers • Researchers in academia • Applied Vulnerability Researchers • Examiners of software for vulnerabilities, using manual and/or tool-based methods, both static and dynamic. • Refined Vulnerability Information Providers • CVE, vulnerability databases • Educators • Educators or certification programs that teach developers how to develop more secure code, and/or find vulnerabilities • Specialized Communities • SAMATE

  8. CWE Content Scoping & Delimiting Information • Type • Functional Area • Likelihood of Exploit • Common Consequences • Enabling Factors for Exploitation • Common Methods of Exploitation • Applicable Platforms • Time of Introduction Prescribing Information • Potential Mitigations Identifying Information • CWE ID • Name Describing Information • Description • Extended Description • Alternate Terms • Demonstrative Examples • Observed Examples • Context Notes • Source Taxonomy • References • Whitebox Definition • Blackbox Definition • Formal Definition

  9. 124 Buffer Underwrite 124 126 120 Tool Report Tool Report Buffer Overflow 120 127 190 120 120 120 120 120 Not All SwA Tools are Created Equal Common Weakness Enumeration (CWE) S/W Dev Artifact (source code) Analysis Tool (A) Analysis Tool (B) Reference Dataset of Artifacts

  10. Software Assurance Metrics and Tool Evaluation • NIST SAMATE project co-sponsored with DHS to: • Measure of the effectiveness of today’s software assurance tools • Identify gaps in technology and make recommendations to DHS for areas of research • Define metrics for the measurement of software assurance tool effectiveness

  11. SAMATE on the web at http://samate.nist.gov

  12. SAMATE Stakeholders • Assessment Vendors • Developers of code scanners, services, and other types of assessment technologies • Assessment Customers • Purchasers and users of assessment technologies and services • Assurance Vendors • Developers of safer languages, and better software development environments. • Academic Researchers • Researchers in academia • Applied Vulnerability Researchers • Examiners of software for vulnerabilities, using manual and/or tool-based methods, both static and dynamic • Educators • Educators or certification programs that teach developers how to develop more secure code, and/or find vulnerabilities ,and choose good languages and development environments.

  13. SAMATE Stakeholders • Assessment Vendors • Developers of code scanners, services, and other types of assessment technologies • Assessment Customers • Purchasers and users of assessment technologies and services • Assurance Vendors • Developers of safer languages, and better software development environments. • Academic Researchers • Researchers in academia • Applied Vulnerability Researchers • Examiners of software for vulnerabilities, using manual and/or tool-based methods, both static and dynamic. • Educators • Educators or certification programs that teach developers how to develop more secure code, and/or find vulnerabilities ,and choose good languages and development environments

  14. SAMATE Work to Date • SAMATE products include: • SAMATE Reference Dataset (SRD) of tool tests • An online repository of thousands of discrete tool tests (C, C++ and Java source code to date) • Tests based upon interpretation of current software weakness definitions • Contributed by NIST, academia, tool developers • SwA Tool Functional Specifications (NIST Special Publications 500-268,500-269) for source code analyzers and web application scanner tools respectively • Papers • Building a Test Suite for Web Application Scanners • Software Assurance with SAMATE Reference Dataset, Tool Standards, and Studies • Effect of Static Analysis Tools on Software Security: Preliminary Investigation

  15. SAMATE Work to Date (cont.) • SAMATE products (cont.) • Automated Source Code Analyzer Test Case generation pilot started, using formal CWE definitions to auto-generate source code tests and provide extensive testing coverage • Based on formal white-box definitions of software weaknesses • Generated tests for 3 CWE’s • 26 CWE white-box definitions for “high priority” CWE’s are complete • Long term, automated test case generation will cover as many CWEs as possible • The Static Analysis Tool Exposition (SATE) – “Real-world” source code used to represent the more complex problems facing today’s SwA tools • 9 tool developers participating • Results reported by developers at Static Analysis Workshop (June 2008) • Results made public in December 2008

  16. SAMATE Work to Date (cont.) • SAMATE products (cont.) • Workshops to determine the state of the art/practice in SwA tool technology • Static Analysis Tools Exposition at Static Analysis Workshop, June 2008 • Static Analysis Summit II, November 2007

  17. TT&PE Standards Activity • TT&PE supports the vision of a software assurance “ecosystem” to provide an interoperability framework for automated tool technology in support of the assurance case • TT&PE is involved in the development of OMG Standards (moving toward ISO acceptance) that facilitate: • SwA Tool Interoperability through technical-level formalization • The OMG Knowledge Discovery Metamodel (KDM) specification defines a meta-model for representing information related to existing software assets and their operational environments • This facilitates technical-level formalization of “white-box” definitions of CWEs that can be used to verify the presence or absence of those CWEs in an application • KDM 1.0 is an OMG formal publication of the first release of the specification and is on ISO “fast track”

  18. TT&PE Standards Activity (cont.) • The SwA “ecosystem”, supported by TT&PE working group is based upon a set of OMG Standards (moving toward ISO acceptance) that facilitate: • Contractual formalization of CWEs • The OMG Semantics of Business Vocabulary and Business Rules (SBVR) specification facilitates “contractual level” formalization of CWEs, providing a human-readable representation of white-box CWE and defines the vocabulary and rules for documenting the semantics of vocabularies, facts, and rules of weaknesses • An assurance case metamodel, integrating SwA tool output as evidence • OMG Software Assurance Evidence Metamodel (SAEM) specification RFP was solicited, responses to RFP received, and proposals have been consolidated

  19. TT&PE Standards Activity (cont.) • OMG Specifications are being implemented, evaluated and aligned with other standards through (respectively): • CWE formalization (sponsored by DHS and DoD) • Tool test case generation (through SAMATE) and KDM-enabled tool interoperability demonstrations • Alignment with ISO/IEC 15026 “Systems and Software Assurance”

  20. The Common Attack Pattern Enumeration and Classification (CAPEC) • CAPEC is sponsored by the Department of Homeland Security as part of the Software Assurance strategic initiative of the National Cyber Security Division. The objective of this effort is to provide a publicly available catalog of attack patterns along with a comprehensive schema and classification taxonomy • Stakeholders include: • Software Developers • Software Customers • Academic Researchers • Applied Vulnerability Researchers • Educators

  21. CAPEC on the web at http://capec.mitre.org

  22. Attack Pattern ID Attack Pattern Name Description (newly extended) Related Weaknesses Related Vulnerabilities Methods of Attack Examples-Instances References Solutions and Mitigations Typical Severity Typical Likelihood of Exploit Attack Prerequisites Attacker Skill or Knowledge Required Resources Required Attack Motivation-Consequences Context Description Purpose Confidentiality/Integrity/ Availability Impact Technical Context Keywords Pattern Abstraction Level Source CAPEC Primary Attack Pattern Content

  23. CAPEC Status • Web site contains the initial set of content and will continue to evolve with public participation and contributions • All current authored patterns (101) as well as all potential patterns in the attack taxonomy have been tagged • Attack Pattern multi-level abstraction tagging • Meta • Standard • Detailed

  24. CAPEC – New Developments • Description schema extended significantly to support greater detail with an aim toward test case generation • 25 of the patterns were updated to this new schema standard with detailed descriptions

More Related