Pun, Ka I. ; Steffen, Martin ; Stolz, Volker ; Wickert, Anna-Katharina ; Bodden, Eric ; Eichberg, Michael
Larsen, Kim G. ; Srba, Jiří (eds.) (2016):
Don't let data Go astray - A Context-Sensitive Taint Analysis for Concurrent Programs in Go.
pp. 37-39, Aalborg, Nordic Workshop on Programming Theory (NWPT'16), [Conference or Workshop Item]
Abstract
Taint analysis is a form of data flow analysis aiming at secure information flow. For example, unchecked user input is considered typically as “tainted”, i.e., as untrusted and potentially dangerous. Untrusted data may lead to corrupt memory, undermine the correct functioning or privacy concerns of the software otherwise, if it reaches program points it is not supposed to. Many common attack vectors exploit vulnerabilities based on unchecked data and the programmer’s negligence of foreseeing all possible user inputs (including malicious ones) and the resulting information flows through the program. We present a static taint analysis for Go, a modern, statically typed programming language. Go in particular features concurrent programming, supporting light-weight threads dubbed “goroutines”, and message-based communication. Beside a classical context-sensitive taint analysis, the paper presents a solution for analyzing channel communication in Go. A longer version of the material will appear in [2].
Item Type: | Conference or Workshop Item |
---|---|
Erschienen: | 2016 |
Editors: | Larsen, Kim G. ; Srba, Jiří |
Creators: | Pun, Ka I. ; Steffen, Martin ; Stolz, Volker ; Wickert, Anna-Katharina ; Bodden, Eric ; Eichberg, Michael |
Title: | Don't let data Go astray - A Context-Sensitive Taint Analysis for Concurrent Programs in Go |
Language: | English |
Abstract: | Taint analysis is a form of data flow analysis aiming at secure information flow. For example, unchecked user input is considered typically as “tainted”, i.e., as untrusted and potentially dangerous. Untrusted data may lead to corrupt memory, undermine the correct functioning or privacy concerns of the software otherwise, if it reaches program points it is not supposed to. Many common attack vectors exploit vulnerabilities based on unchecked data and the programmer’s negligence of foreseeing all possible user inputs (including malicious ones) and the resulting information flows through the program. We present a static taint analysis for Go, a modern, statically typed programming language. Go in particular features concurrent programming, supporting light-weight threads dubbed “goroutines”, and message-based communication. Beside a classical context-sensitive taint analysis, the paper presents a solution for analyzing channel communication in Go. A longer version of the material will appear in [2]. |
Place of Publication: | Aalborg |
Divisions: | 20 Department of Computer Science 20 Department of Computer Science > Software Technology |
Event Title: | Nordic Workshop on Programming Theory (NWPT'16) |
Date Deposited: | 19 Apr 2018 13:28 |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
![]() |
Send an inquiry |
Options (only for editors)
![]() |
Show editorial Details |