Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025JUST ACCEPTED
LLM-Powered Static Binary Taint Analysis
- Puzhuo Liu,
- Chengnian Sun,
- Yaowen Zheng,
- Xuan Feng,
- Chuan Qin,
- Yuncheng Wang,
- Zhenyang Xu,
- Zhi Li,
- Peng Di,
- Yu Jiang,
- Limin Sun
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3711816This paper proposes LATTE, the first static binary taint analysis that is powered by a large language model (LLM). LATTE is superior to the state of the art (e.g., Emtaint, Arbiter, Karonte) in three aspects. First, LATTE is fully automated while prior ...
- posterDecember 2024
Poster: Whether We Are Good Enough to Detect Server-Side Request Forgeries in PHP-native Applications?
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4928–4930https://doi.org/10.1145/3658644.3691419Server-side request forgeries (SSRFs) are inevitable in PHP web applications. Existing static taint analysis tools for PHP suffer from both high rates of false positives and false negatives in detecting SSRF because they do not incorporate application-...
- research-articleDecember 2024
OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2355–2369https://doi.org/10.1145/3658644.3690307The widespread integration of Internet of Things (IoT) and Industrial IoT (IIoT) devices in respectively home and business environments offers both benefits and perils. While these devices, such as IP cameras and network routers improve operational ...
BinPRE: Enhancing Field Inference in Binary Analysis Based Protocol Reverse Engineering
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3689–3703https://doi.org/10.1145/3658644.3690299Protocol reverse engineering (PRE) aims to infer the specification of network protocols when the source code is not available. Specifically, field inference is one crucial step in PRE to infer the field formats and semantics. To perform field inference, ...
- ArticleNovember 2024
A Formal Tainting-Based Framework for Malware Analysis
AbstractIn this paper, we propose a new approach of combining formal methods and malware analysis for quickly determining if an application has specific malicious capabilities. The proposed solution is a Formal Tainting-Based Framework that uses a ...
-
- ArticleSeptember 2024
Sound Non-interference Analysis for C/C++
- Daniel Kästner,
- Laurent Mauborgne,
- Sebastian Hahn,
- Stephan Wilhelm,
- Jörg Herter,
- Christoph Cullmann,
- Christian Ferdinand
AbstractHomologation of vehicles in markets that are subject to U.S. regulations requires, as a part of the certification documentation, an analysis of all input and output signals that influence the control or diagnosis of any emissions-related component ...
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 46, Pages 1019–1042https://doi.org/10.1145/3643772Timing side-channel attacks exploit secret-dependent execution time to fully or partially recover secrets of cryptographic implementations, posing a severe threat to software security. Constant-time programming discipline is an effective software-based ...
- research-articleApril 2024
Seneca: Taint-Based Call Graph Construction for Java Object Deserialization
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue OOPSLA1Article No.: 134, Pages 1125–1153https://doi.org/10.1145/3649851Object serialization and deserialization are widely used for storing and preserving objects in files, memory, or database as well as for transporting them across machines, enabling remote interaction among processes and many more. This mechanism relies ...
- short-paperMay 2024
IntTracer: Sanitization-aware IO2BO Vulnerability Detection across Codebases
ICSE-Companion '24: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion ProceedingsPages 447–449https://doi.org/10.1145/3639478.3641223Integer Overflow to Buffer Overflow (IO2BO) vulnerability represents a common vulnerability pattern in system software and can be detected by various program analysis methods. Mainstream static approaches apply taint analysis to find source-sink pairs ...
- research-articleFebruary 2024
DocFlow: Extracting Taint Specifications from Software Documentation
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 61, Pages 1–12https://doi.org/10.1145/3597503.3623312Security practitioners routinely use static analysis to detect security problems and privacy violations in Android apps. The soundness of these analyses depends on how the platform is modelled and the list of sensitive methods. Collecting these methods ...
- research-articleFebruary 2024
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications
ACM Transactions on Privacy and Security (TOPS), Volume 27, Issue 1Article No.: 8, Pages 1–37https://doi.org/10.1145/3630253JavaScript is often rated as the most popular programming language for the development of both client-side and server-side applications. Because of its popularity, JavaScript has become a frequent target for attackers who exploit vulnerabilities in the ...
- research-articleDecember 2024
DocFuzz: A Directed Fuzzing Method Based on a Feedback Mechanism Mutator
In response to the limitations of traditional fuzzing approaches that rely on static mutators and fail to dynamically adjust their test case mutations for deeper testing, resulting in the inability to generate targeted inputs to trigger vulnerabilities, ...
- research-articleNovember 2023
Compositional Taint Analysis for Enforcing Security Policies at Scale
- Subarno Banerjee,
- Siwei Cui,
- Michael Emmi,
- Antonio Filieri,
- Liana Hadarean,
- Peixuan Li,
- Linghui Luo,
- Goran Piskachev,
- Nicolás Rosner,
- Aritra Sengupta,
- Omer Tripp,
- Jingbo Wang
ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1985–1996https://doi.org/10.1145/3611643.3613889Automated static dataflow analysis is an effective technique for detecting security critical issues like sensitive data leak, and vulnerability to injection attacks. Ensuring high precision and recall requires an analysis that is context, field and ...
- research-articleNovember 2023
MiniTaintDev: Unveiling Mini-App Vulnerabilities through Dynamic Taint Analysis
SaTS '23: Proceedings of the 2023 ACM Workshop on Secure and Trustworthy SuperappsPages 41–45https://doi.org/10.1145/3605762.3624434The security and privacy issues of mini-apps, which are lightweight apps that run inside host apps such as WeChat, have drawn the interest of researchers recently. We propose MiniTaintDev, a dynamic taint analysis tool for mini-app vulnerability ...
- research-articleSeptember 2024
Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows
ASE '23: Proceedings of the 38th IEEE/ACM International Conference on Automated Software EngineeringPages 319–331https://doi.org/10.1109/ASE56229.2023.00027The IFDS-based taint analysis employs two mutually iterative passes: a forward pass that identifies taints and a backward pass that detects aliases. This approach ensures both flow and context sensitivity, leading to remarkable precision. To preserve ...
- research-articleOctober 2023
An Empirical Analysis of Web Storage and Its Applications to Web Tracking
ACM Transactions on the Web (TWEB), Volume 18, Issue 1Article No.: 7, Pages 1–28https://doi.org/10.1145/3623382In this article, we present a large-scale empirical analysis of the use of web storage in the wild.By using dynamic taint tracking at the level of JavaScript and by performing an automated classification of the detected information flows, we shed light on ...
- research-articleJuly 2023
DDLDroid: A Static Analyzer for Automatically Detecting Data Loss Issues in Android Applications
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1471–1474https://doi.org/10.1145/3597926.3604916DDLDroid is a static analyzer for detecting data loss issues in Android apps during activity restart or app relaunch. It is bootstrapped by a saving-restoring bipartite graph which correlates variables that need saving to those that need restoring ...
- research-articleJuly 2023
DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1144–1156https://doi.org/10.1145/3597926.3598124DeFi protocols are programs that manage high-value digital assets on blockchain. The price manipulation vulnerability is one of the common vulnerabilities in DeFi protocols, which allows attackers to gain excessive profits by manipulating token ...
- research-articleSeptember 2023
Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services
ICSE-SEIP '23: Proceedings of the 45th International Conference on Software Engineering: Software Engineering in PracticePages 110–121https://doi.org/10.1109/ICSE-SEIP58684.2023.00015In recent years, there has been an increasing demand for sensitive data tracing for industrial microservices; these include change of governance, data breach detection, to data consistency validation. As an information tracking technique, Taint ...
TaintMini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 932–944https://doi.org/10.1109/ICSE48619.2023.00086Mini-programs, which are programs running inside mobile super apps such as WeChat, often have access to privacy-sensitive information, such as location data and phone numbers, through APIs provided by the super apps. This access poses a risk of ...