# SaTC
**Repository Path**: anlan/SaTC
## Basic Information
- **Project Name**: SaTC
- **Description**: No description available
- **Primary Language**: Python
- **License**: Not specified
- **Default Branch**: dev-python3
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 1
- **Created**: 2021-11-09
- **Last Updated**: 2021-11-09
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
# SaTC
A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between front-end and back-end to precisely detect security vulnerabilities.
## Overview of SaTC
## Research paper
We present our approach and the findings of this work in the following research paper:
**Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems**
[[PDF]](https://www.usenix.org/system/files/sec21fall-chen-libo.pdf)
## Repository Structure
This project includes two modules:
- satc_front: Front-end hanlder module
- satc_TaintCheck: Taint Engine
### Running Environment
#### satc_front
If you have installed node.js,you can run `npm run start` in directory satc_front/jsparse. Otherwise, can run node.js and parser in docker.
> docker build . -t jsparse
> docker run -itd 3000:3000 jsparse
Description of Commands :
[satc_front/readme.md](satc_front/readme.md)
#### satc_TaintCheck
> docker pull cpegg/satc:1.2.0
Command:
> time python tool/main.py \ \
Example:
> time python tool/main.py test/R7000P-V1.3.0.8/httpd test/R7000P-V1.3.0.8/httpd_ref2sink_bof.result
Description of Commands :
[satc_TaintCheck/readme.md](satc_TaintCheck/readme.md)