HP Fortifies Static Code Analysis

 
 
By Sean Michael Kerner  |  Posted 2013-08-28 Email Print this article Print
 
 
 
 
 
 
 
code analysis

Hewlett-Packard's Fortify Source Code Analyzer 4.0 release is designed to deliver faster and more accurate analysis of software code.

Hewlett-Packard is updating its Fortify Static Code Analyzer (SCA) to version 4.0, boosting both the performance, accuracy and feature set of the security and code quality tool.

Static Analysis refers to the examination of code at rest that is not actually running. Such an analysis can often find programmatic code errors that can impact code execution as well as security.

The SCA 4.0 version is 10 times faster at code analysis than prior releases, Mike Armistead, vice president and general manager, Enterprise Security Products for HP's Fortify division, told eWEEK. Armistead is a co-founder of Fortify, a company that HP acquired in 2010 for its source-code analysis capabilities.

SCA 4.0 is able to scan source code in 21 different programming languages as well as their associated programming frameworks.

"SCA is all about stitching together an application and giving you an idea of how data may flow through and how functions are used," Armistead explained.

With the 4.0 release, in addition to the speed boost, there has also been a 20 percent accuracy improvement in code analysis, which means that there will now be fewer false positives for code defects, he said.

In the early days of static analysis, one of the primary defects that was caught is a coding flaw known as a "null pointer." A null pointer is a code element where a program is trying to access a memory location that doesn't exist. That flaw can lead to stability and security problems.

While SCA 4.0 will detect null pointers, Armistead noted that those types of errors are more common in the C and C++ programming language than in other languages. As Java and .NET language use has proliferated, there are fewer null pointer defects due to features in those languages that mitigate the risks of the same kinds of memory issues.

"The adversary has now also moved on," Armistead said. "They have moved on to Cross Site Scripting and Cross Site Request Forgery as well as other categories of flaws that have not been as easily recognized by developers."

SCA 4.0 has its own built-in analysis engine and it also benefits from a quarterly update from HP that delivers intelligence on secure coding rules, Armistead said. HP's security intelligence has insight into how new forms of attack are taking place and is able to pass along that information to help developers write more secure code.

In the modern development world, a key area of focus for SCA 4.0 is on mobile development, including both Apple iOS and Google Android.

"There are vulnerabilities that are unique to mobile apps," Armistead said. 

The reality is also that even though mobile development and new programming frameworks have emerged over the years, many of the coding mistakes that static analysis can find are the same year-after-year.

"I wish it were sexier than this, but development organizations keep making the same mistakes," Armistead said.

Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

 

 
 
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...

 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel