Award Abstract # 2247141
Collaborative Research: SaTC: TTP: Small: eSLIC: Enhanced Security Static Analysis for Detecting Insecure Configuration Scripts

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: AUBURN UNIVERSITY
Initial Amendment Date: November 4, 2022
Latest Amendment Date: March 27, 2024
Award Number: 2247141
Award Instrument: Standard Grant
Program Manager: Daniel F. Massey
dmassey@nsf.gov
 (703)292-5147
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: October 1, 2022
End Date: September 30, 2025 (Estimated)
Total Intended Award Amount: $244,742.00
Total Awarded Amount to Date: $204,395.00
Funds Obligated to Date: FY 2020 = $177,995.00
FY 2023 = $12,000.00

FY 2024 = $14,400.00
History of Investigator:
  • Akond Ashfaque Rahman (Principal Investigator)
    akond.rahman.buet@gmail.com
Recipient Sponsored Research Office: Auburn University
321-A INGRAM HALL
AUBURN
AL  US  36849
(334)844-4438
Sponsor Congressional District: 03
Primary Place of Performance: Auburn University
107 SAMFORD HALL
AUBURN
AL  US  36849-0001
Primary Place of Performance
Congressional District:
03
Unique Entity Identifier (UEI): DMQNDJDHTDG4
Parent UEI: DMQNDJDHTDG4
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01002425DB NSF RESEARCH & RELATED ACTIVIT
01002324DB NSF RESEARCH & RELATED ACTIVIT

01002021DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 9150, 7923, 9251, 9178
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Information technology (IT) organizations manage infrastructure using configuration scripts. Configuration scripts help practitioners to accomplish a wide range of jobs, including cloud computing, scientific research, and large-scale data analytics. Even though configuration scripts enable scalable and rapid delivery of software, security weaknesses in configuration scripts, such as hard-coded passwords, can result in security and privacy problems such as data breaches. Current research of configuration script security is limited in finding types of problems that can be detected, preventing false positives, and enabling actionability?all of which prohibits practitioners to take actions on the identified security weaknesses, potentially leaving computing systems open to security attacks. The project aims to address these limitations. The project?s novelties are development of techniques and tools that will automatically detect security weaknesses in configuration scripts developed using a wide range of languages, heavily used in industry. The project's impacts are related to securing the national cyber infrastructure, educating the next generation IT workforce on cybersecurity, and broadening of participation through recruitment of underrepresented communities.

The project will focus on the development of techniques and tools that will automatically detect security weaknesses in configuration scripts developed using a wide range of languages heavily used in industry. Three main tasks will be investigated for this project. First, qualitative analysis is applied in order to determine a comprehensive list of security weaknesses for multiple configuration script languages, and devise static analysis techniques for automatically identifying each category of security weakness. Next, grammar-based parsing and machine learning techniques are applied, evaluated, and integrated into the derived static analysis so that false positives are reduced. Finally, the development context of practitioners from the open source and proprietary domain will be systematically mined to generate actionable alerts and suggestions, which will enable practitioners to fix security weaknesses. Along with the three technical tasks, industry panels will be organized, where practitioners from industry will give feedback on the developed techniques and tools. Findings from the project will be disseminated to government, industry and open source practitioners, as well as to students who are learning about configuration management in graduate and undergraduate level courses related to cybersecurity. The project is expected to generate best practices for security code review, automated tools, and education materials essential to secure configuration script development. As a transition to practice (TTP) project, it will facilitate collaboration with industry practitioners, so that a comprehensive, holistic, practitioner-friendly security static analysis is achieved to secure configuration script development and management.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 13)
Akond Rahman, Dibyendu Brinto "Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs" Empirical software engineering , 2023 Citation Details
Bhuiyan, Farzana Ahamed and Rahman, Akond "Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects" ACM Transactions on Privacy and Security , v.26 , 2023 https://doi.org/10.1145/3568020 Citation Details
Hassan, Md Mahadi and Salvador, John and Santu, Shubhra_Kanti Karmaker and Rahman, Akond "State Reconciliation Defects in Infrastructure as Code" Proceedings of the ACM on Software Engineering , v.1 , 2024 https://doi.org/10.1145/3660790 Citation Details
Hu, Hanyang and Bu, Yani and Wong, Kristen and Sood, Gaurav and Smiley, Karen and Rahman, Akond "Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report" , 2023 https://doi.org/10.1109/SecDev56634.2023.00014 Citation Details
Mendis, Pemsith and Reeves, Wilson and Babar, Muhammad Ali and Zhang, Yue and Rahman, Akond "Evaluating the Quality of Open Source Ansible Playbooks: An Executability Perspective" , 2024 https://doi.org/10.1145/3663530.3665019 Citation Details
Rahman, Akond and Bose, Dibyendu Brinto and Barsha, Farhat Lamia and Pandita, Rahul "Defect Categorization in Compilers: A Multi-vocal Literature Review" ACM Computing Surveys , v.56 , 2024 https://doi.org/10.1145/3626313 Citation Details
Rahman, Akond and Bose, Dibyendu Brinto and Zhang, Yue and Pandita, Rahul "An empirical study of task infections in Ansible scripts" Empirical Software Engineering , v.29 , 2024 https://doi.org/10.1007/s10664-023-10432-6 Citation Details
Rahman, Akond and Parnin, Chris "Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management" IEEE Transactions on Software Engineering , v.49 , 2023 https://doi.org/10.1109/TSE.2023.3265962 Citation Details
Rahman, Akond and Shamim, Shazibul Islam and Bose, Dibyendu Brinto and Pandita, Rahul "Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study" ACM Transactions on Software Engineering and Methodology , 2023 https://doi.org/10.1145/3579639 Citation Details
Rahman, Akond and Zhang, Yue and Wu, Fan and Shahriar, Hossain "Student Perceptions of Authentic Learning to Learn White-box Testing" Proceedings of the 55th ACM Technical Symposium on Computer Science Education , 2024 https://doi.org/10.1145/3626253.3635584 Citation Details
Zhang, Yue and Meredith, Rachel and Reeves, Wilson and Coriolano, Júlia and Babar, Muhammad Ali and Rahman, Akond "Does Generative AI Generate Smells Related to Container Orchestration?: An Exploratory Study with Kubernetes Manifests" , 2024 https://doi.org/10.1145/3643991.3645079 Citation Details
(Showing: 1 - 10 of 13)

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page