TU Darmstadt / ULB / TUbiblio

Don't let data Go astray - A Context-Sensitive Taint Analysis for Concurrent Programs in Go

Pun, Ka I. ; Steffen, Martin ; Stolz, Volker ; Wickert, Anna-Katharina ; Bodden, Eric ; Eichberg, Michael
Hrsg.: Larsen, Kim G. ; Srba, Jiří (2016)
Don't let data Go astray - A Context-Sensitive Taint Analysis for Concurrent Programs in Go.
Nordic Workshop on Programming Theory (NWPT'16).
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Taint analysis is a form of data flow analysis aiming at secure information flow. For example, unchecked user input is considered typically as “tainted”, i.e., as untrusted and potentially dangerous. Untrusted data may lead to corrupt memory, undermine the correct functioning or privacy concerns of the software otherwise, if it reaches program points it is not supposed to. Many common attack vectors exploit vulnerabilities based on unchecked data and the programmer’s negligence of foreseeing all possible user inputs (including malicious ones) and the resulting information flows through the program. We present a static taint analysis for Go, a modern, statically typed programming language. Go in particular features concurrent programming, supporting light-weight threads dubbed “goroutines”, and message-based communication. Beside a classical context-sensitive taint analysis, the paper presents a solution for analyzing channel communication in Go. A longer version of the material will appear in [2].

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2016
Herausgeber: Larsen, Kim G. ; Srba, Jiří
Autor(en): Pun, Ka I. ; Steffen, Martin ; Stolz, Volker ; Wickert, Anna-Katharina ; Bodden, Eric ; Eichberg, Michael
Art des Eintrags: Bibliographie
Titel: Don't let data Go astray - A Context-Sensitive Taint Analysis for Concurrent Programs in Go
Sprache: Englisch
Publikationsjahr: 31 Oktober 2016
Ort: Aalborg
Veranstaltungstitel: Nordic Workshop on Programming Theory (NWPT'16)
Kurzbeschreibung (Abstract):

Taint analysis is a form of data flow analysis aiming at secure information flow. For example, unchecked user input is considered typically as “tainted”, i.e., as untrusted and potentially dangerous. Untrusted data may lead to corrupt memory, undermine the correct functioning or privacy concerns of the software otherwise, if it reaches program points it is not supposed to. Many common attack vectors exploit vulnerabilities based on unchecked data and the programmer’s negligence of foreseeing all possible user inputs (including malicious ones) and the resulting information flows through the program. We present a static taint analysis for Go, a modern, statically typed programming language. Go in particular features concurrent programming, supporting light-weight threads dubbed “goroutines”, and message-based communication. Beside a classical context-sensitive taint analysis, the paper presents a solution for analyzing channel communication in Go. A longer version of the material will appear in [2].

Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Softwaretechnik
Hinterlegungsdatum: 19 Apr 2018 13:28
Letzte Änderung: 26 Nov 2021 10:39
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen