# SaTC **Repository Path**: anlan/SaTC ## Basic Information - **Project Name**: SaTC - **Description**: No description available - **Primary Language**: Python - **License**: Not specified - **Default Branch**: dev-python3 - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 1 - **Created**: 2021-11-09 - **Last Updated**: 2021-11-09 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # SaTC A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between front-end and back-end to precisely detect security vulnerabilities. ## Overview of SaTC ## Research paper We present our approach and the findings of this work in the following research paper: **Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems** [[PDF]](https://www.usenix.org/system/files/sec21fall-chen-libo.pdf) ## Repository Structure This project includes two modules: - satc_front: Front-end hanlder module - satc_TaintCheck: Taint Engine ### Running Environment #### satc_front If you have installed node.js,you can run `npm run start` in directory satc_front/jsparse. Otherwise, can run node.js and parser in docker. > docker build . -t jsparse > docker run -itd 3000:3000 jsparse Description of Commands : [satc_front/readme.md](satc_front/readme.md) #### satc_TaintCheck > docker pull cpegg/satc:1.2.0 Command: > time python tool/main.py \ \ Example: > time python tool/main.py test/R7000P-V1.3.0.8/httpd test/R7000P-V1.3.0.8/httpd_ref2sink_bof.result Description of Commands : [satc_TaintCheck/readme.md](satc_TaintCheck/readme.md)