This repository contains CogniCryptSAST, the static analysis component for CogniCrypt. The static analysis CogniCryptSAST takes rules written in the specification language CrySL as input, and performs a static analysis based on the specification of the rules. CrySL is a domain-specific language (DSL) designed to encode usage specifications for cryptographic libaries (e.g., the JCA in particular). More information on CrySL and the static analysis may be found in this paper.
Let's assume we have the following program with some violations:
import java.security.GeneralSecurityException;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import javax.crypto.Cipher;
public class Example {
public static void main(String[] args) throws GeneralSecurityException {
// Constraint Error: "DES" is not allowed
KeyGenerator generator = KeyGenerator.getInstance("DES"); // r0
// Constraint Error: Key size of 64 is not allowed
generator.init(64);
// KeyGenerator is not correctly initialized
// RequiredPredicateEror: Generated key is not secure
SecretKey key = generator.generateKey(); // r1
// Constraint Error: "DES" is not allowed
Cipher cipher = Cipher.getInstance("DES"); // r2
// RequiredPredicateError: "key" is not securely generated
cipher.init(Cipher.ENCRYPT_MODE, key);
// IncompleteOperationError: Cipher object is not used
}
}
Using the JCA rules, we execute the following command on a compiled version of this program:
java -jar HeadlessJavaScanner-x.y.z-jar-with-dependencies.jar --appPath ./Examples.jar --rulesDir ./JCA-CrySL-rules.zip --reportFormat CMD --reportPath ./output/ --visualization
CogniCryptSAST runs the analysis and prints a report to the command line. In total, it reports 3 ConstraintErrors
, 2 RequiredPredicateErrors
and 1 IncompleteOperationError
, and their positions in the original programs. Additionally, since we use --visualization
, it creates the following image visualization.png
in the directory ./output/
:
You can see that two ConstraintErrors
on the object r0
(KeyGenerator) cause a RequiredPredicateError
on the object r1
(SecretKey) which in turn causes a RequiredPredicateError
on the object r2
(Cipher). Additionally, there is another ConstraintError
and IncompleteOperationError
on the Cipher object. Note that the variables and statements correspond to the intermediate representation Jimple. You can match the variables to the command line output that lists all analyzed objects.
We provide the implementation of the static analysis of CogniCrypt in:
CryptoAnalysis
contains the components for the actual analysisCryptoAnalysisTargets
contains various example applications that are also used to test the correctness of CryptoAnalyis
We further provide two SAST tools that allow the analysis of Java and Android applications:
HeadlessJavaScanner
contains the SAST tool that analyzes Java applications (see below)HeadlessAndroidScanner
contains the SAST tool that analyzes Android applications (see below)
You can checkout a pre-compiled version of CogniCryptSAST here. We recommend using the latest version. You can find CogniCryptSAST also on Maven Central.
CogniCryptSAST uses Maven as build tool. You can compile and build this project via
mvn clean package -DskipTests
.
The packaged jar
artifacts including all dependencies can be found in /apps
. Building requires at least Java 17.
CogniCryptSAST can be started in headless mode as CLI tool via the file HeadlessJavaScanner-x.y.z-jar-with-dependencies.jar
. It requires two arguments:
- The path to the directory of the CrySL (source code format) rule files. The source code for the rules which contain specification for the JCA is found here.
- The path of the application to be analyzed (.jar file or the root compilation output folder which contains the .class files in subdirectories)
java -jar HeadlessJavaScanner-x.y.z-jar-with-dependencies.jar
--rulesDir <path-to-crysl-source-code-format-rules>
--appPath <application-path>
For an easy start we prepared a .jar containing classes with crypto misuses. The source code for these misuses is found here.
Other additional arguments that can be used are as follows:
--cg <selection_of_call_graph_for_analysis> (possible values are CHA, SPARK, SPARKLIB)
--sootPath <absolute_path_of_whole_project>
--identifier <identifier_for_labeling_output_files>
--reportPath <directory_location_for_cryptoanalysis_report>
--reportFormat <format of cryptoanalysis_report> (possible values are CMD, TXT, SARIF, CSV, CSV_SUMMARY)
--visualization (Create a visualization of all errors (requires --reportPath option to be set))
--dstats (disables the output of the analysis statistics in the reports)
--ignoreSections (Text file with packages (e.g. `de.example.*`), classes (e.g. `de.example.exmapleClass`) or methods (e.g. `de.example.exampleClass.exampleMethod`), one per line. Those packages, classes and methods are ignored during the analysis)
--timeout <timeout in milliseconds> (Timeout for seeds in milliseconds. If a seed exceeds this value, CryptoAnalysis aborts the typestate and extract parameter analysis and continues with the results computed so far. (default: 10000))
--help (show more information for the CLI arguments)
Note, depending on the analyzed application, the analysis may require a lot of memory and a large stack size. Remember to set the necessary heap size (e.g. -Xmx8g) and stack size (e.g. -Xss60m).
CogniCryptSAST can be used as a GitHub action.
- name: Run CogniCrypt
uses: CROSSINGTUD/CryptoAnalysis@version
with:
appPath: "CryptoAnalysisTargets/HelloWorld/HelloWorld.jar"
basePath: "CryptoAnalysisTargets/HelloWorld"
The appPath
needs to be configured to point to a compiled version of your application.
The basePath
is used to relate paths in the analyzed jar and the source tree.
Class com.example
is searched for at basePath/com/example
.
See action.yml
for all input options.
An example of how to use the GitHub action can be found in the CryptoAnalysis-demo repository.
CogniCryptSAST reports misuses when the code is not compliant with the CrySL rules. For each misuse, CogniCryptSAST reports the class and the method the misuse is contained in. There are multiple misuse types:
-
ConstraintError: A constraint of a CrySL rule is violated, e.g., a key is generated with the wrong key size.
-
NeverTypeOfError: Reported when a value was found to be of a certain reference type: For example, a character array containing a password should never be converted from a
String
. (seeKeyStore
rule here). -
ForbiddenMethodError: A method that is forbidden (CrySL block FORBIDDEN) to be called under some circumstances was found.
-
ImpreciseValueExtractionError: The static analysis was not able to extract all information required within the CrySL CONSTRAINT block. For example the key size could be supplied as a value listed in a configuration file. The static analysis does not model the file's content and may not constraint on the value.
-
TypestateError: The ORDER block of CrySL is violated, i.e., the expected method sequence call to be made is incorrect. For example, a
Signature
object expects a call toinitSign(key)
prior toupdate(data)
. -
RequiredPredicateError: An object A expects an object B to have been used correctly (CrySL blocks REQUIRES and ENSURES). For example a
Cipher
object requires aSecretKey
object to be correctly and securely generated. -
IncompleteOperationError: The usage of an object may be incomplete: For example a
Cipher
object may be initialized but never used for en- or decryption, this may render the code dead. This error heavily depends on the computed call graph (CHA by default). -
UncaughtExceptionError: A method may throw an exception, but the exception is not caught in the program. For example, the method call is not surrounded by a try/catch block.
CogniCryptSAST supports different report formats, which can be set by using --reportformat
option. The supported formats are:
CMD
: The report is printed to the command line. The content is equivalent to the format from theTXT
option.TXT
: The report is written to the text fileCryptoAnalysis-Report.txt
. The content is equivalent to the format from theCMD
option. Additionally, the .jimple files of the classes, where misuses were found in, are output. Jimple is an intermediate representation close to the syntax of Java.SARIF
: The report is written to the JSON fileCryptoAnalysis-Report.json
. The content is formatted in the SARIF format.CSV
: The report is written to the CSV fileCryptoAnalysis-Report.csv
. The content is formatted in the CSV format.CSV_SUMMARY
: The report is written to the fileCryptoAnalysis-Report-Summary.csv
and contains a summary of the analysis results. Compared to theCSV
format, this format does not provide concrete information about the errors, it only lists the amount of each misuse type. This option was previously implemented by theCSV
option, which has been changed to provide more detailed information about the errors in the CSV format.GITHUB_ANNOTATION
: Works likeCMD
but also outputs all violations as annotations when running inside as a GitHub Action.
If the --reportformat
option is not specified, CogniCryptSAST defaults to the CMD
option. It also allows the usage of multiple different formats for the same analysis (e.g. --reportformat CMD,TXT,CSV
creates a report, which is printed to the command line and is written to a text and CSV file). If the option --reportPath <directory_location_for_cryptoanalysis_report>
is set, the reports (and the visualization) are created in the specified directory.
CogniCryptSAST can also be run on Android Applications using the Android scanner HeadlessAndroidScanner-x.y.z-jar-with-dependencies.jar
. Its usage does not deviate much from regular CogniCryptSAST's. It requires three arguments:
--apkFile
: The absolute path to the .apk file--platformDirectory
: The absolute path to the android SDK platforms. The platforms are obtainable via Android Studio. Under the Android SDK location you find a folderplatforms
. Supply CogniCryptSAST with the path to this folder.--rulesDir
: The absolute path to the directory of the CrySL rules.
java -jar HeadlessAndroidScanner-x.y.z-jar-with-dependencies.jar
--rulesDir <path-to-crysl-source-code-format-rules>
--platformDirectory <path-to-android-platform>
--appPath <application-path>
Optional parameters are --reportPath
and --reportFormat
. They have the same functionality as the HeadlessJavaScanner-x.y.z-jar-with-dependencies.jar
(see above).
If specified, the analysis generates a report file CogniCrypt-Report.txt
along with the .jimple
output of the classes the analysis found misuses in. The format of the report file follows that described above.
Again, depending on the analyzed application, the analysis may require a lot of memory and a large stack size. Remember to set the necessary heap size (e.g. -Xmx8g) and stack size (e.g. -Xss60m).
We hare happy for every contribution from the community!
- Contributing for details on issues and merge requests.
- Coding Guidles for this project.