Check out the new USENIX Web site. next up previous
Next: 3.1 Program Analysis Mode Up: Detecting Format String Vulnerabilities Previous: 2.4 Type Inference


3 User Interface

Figure 5: Screenshot of a run of cqual on the muh application.
\begin{figure*}\epsfig{file=ss.eps,width=\textwidth}\end{figure*}

Thus far, we have presented the theory underlying our tool. For a program analysis to be useful, however, one needs both a sound theoretical foundation and an intuitive, efficient interface for understanding the results.

In the folklore of type inference, it is well known that the more powerful a type inference system is, the harder it is to understand why a program contains a type error. For example, type errors from a C compiler, which performs little inference, are easy to localize. The compiler simply reports the line number where the type error occurred, and this is almost always enough to tell the programmer why the error occurred.

In our type qualifier system, however, type errors occur at the point where the type constraint system becomes unsatisfiable, and that point can be distant from the actual source of the problem. Again, consider Figure 4. In this example, the string unclean is tainted by the call to getenv at Point 0, and ultimately that data is passed to printf at Point 5. Given this input program, our system will warn the user of a potential format string bug at point 5. But program points 1-5 are all involved in the error, and to understand and fix the error a programmer may need to examine all five program points. In general these program points could be spread across multiple files.

Thus reporting line numbers with error messages is no longer enough. In this section, we describe the techniques we use to display the results of our tainting analysis to the user. We emphasize that without the GUI described in this section, performing the experiments described in Section 5 would have been extremely difficult.



Subsections
next up previous
Next: 3.1 Program Analysis Mode Up: Detecting Format String Vulnerabilities Previous: 2.4 Type Inference
Umesh Shankar 2001-05-16