TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Security for Open Source Code: Dynamic Analysis Is the Only Way

36 pointsby briandollover 8 years ago

5 comments

morbosoftover 8 years ago
That is not what dynamic analysis means but I appreciate everyone redefining terms to suit their marketing. <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Dynamic_program_analysis" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Dynamic_program_analysis</a>
评论 #12586035 未加载
评论 #12587193 未加载
评论 #12587788 未加载
评论 #12585907 未加载
评论 #12585981 未加载
gasparover 8 years ago
Interesting. So if I understood correctly, you dynamically analyze the build process (and that&#x27;s why you use that term) instead of just parsing the build file, because you don&#x27;t know exactly how the dependencies are going to be resolved from the package manager during the build process. How do you verify that a specific version of a library is used during the build and not some other version (you just do a hash lookup or have a way to generate signatures with small false positives) ? Also, what happens if the package manager is compromised (for example it informs you that she used version 2.0 but instead she used a vulnerable version) ? For the call graphs, do you find the relationships between each procedure for the whole project and if so, isn&#x27;t that literally static analysis ? Sorry if my questions don&#x27;t make sense or are trivial, I am just looking it from a research perspective, because I am working on somehow similar things.
wyldfireover 8 years ago
I agree w&#x2F;all the confusion regarding terminology. It&#x27;s still static if you&#x27;re not executing the code.<p>But, back to the premise: it would be really helpful if you [the author] could illustrate security defects which can be detected using &quot;dynamic analysis&quot; which cannot be detected with &quot;static analysis.&quot; Legitimate, actually exploited&#x2F;able vulnerabilities would be ideal.
dkarapetyanover 8 years ago
I don&#x27;t understand what exactly they&#x27;re saying. Seems to me they&#x27;re comparing apples, oranges, and cherries. I don&#x27;t know if they&#x27;re willingly doing this or if they&#x27;re trying to make the problem sound harder than it is.<p>You only need to perform whatever security analysis is necessary after all your dependencies are resolved. This does not require anything &quot;dynamic&quot;. You just call the packager manager, wait for all the dependencies to be resolved, then verify there are no vulnerable versions, which is just a matter of looking up the relevant pieces in some database somewhere.<p>Which is fine if that&#x27;s what they&#x27;re doing but this article seems to be just smoke and mirrors mostly.
评论 #12586157 未加载
r-wover 8 years ago
Except when the language itself is statically and strongly typed (a la Haskell).
评论 #12585656 未加载
评论 #12585638 未加载