Conference paper Open Access

Demo: Detecting Third-Party Library Problems with Combined Program Analysis

Grigoris Ntousakis; Sotiris Ioannidis; Nikos Vasilakis


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.5713403</identifier>
  <creators>
    <creator>
      <creatorName>Grigoris Ntousakis</creatorName>
      <affiliation>TU Crete</affiliation>
    </creator>
    <creator>
      <creatorName>Sotiris Ioannidis</creatorName>
      <affiliation>TU Crete</affiliation>
    </creator>
    <creator>
      <creatorName>Nikos Vasilakis</creatorName>
      <affiliation>CSAIL, MIT</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Demo: Detecting Third-Party Library Problems with Combined Program Analysis</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2021</publicationYear>
  <subjects>
    <subject>third-party librabies, bugs, vulnerabilities, attacks, program analysis, RWX permission system, snyk test, npm audit</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2021-11-19</date>
  </dates>
  <resourceType resourceTypeGeneral="ConferencePaper"/>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/5713403</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.5713402</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/cyreneproject-eu</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;Third-party libraries ease the software development process and thus have become an integral part of modern software engineering. Unfortunately, they are not usually vetted by human developers and thus are often responsible for introducing bugs, vulnerabilities, or attacks to programs that will eventually reach end-users. In this demonstration, we present a combined static and dynamic program analysis for inferring and enforcing third-party library permissions in server-side JavaScript. This analysis is centered around a RWX permission system across library boundaries. We demonstrate that our tools can detect zero-day vulnerabilities injected into popular libraries and often missed by state-of-the-art tools such as snyk test and npm audit.&lt;/p&gt;</description>
  </descriptions>
  <fundingReferences>
    <fundingReference>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/100010661</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/Horizon 2020 Framework Programme - Research and Innovation action/952690/">952690</awardNumber>
      <awardTitle>Certifying the Security and Resilience of Supply Chain Services</awardTitle>
    </fundingReference>
  </fundingReferences>
</resource>
117
99
views
downloads
All versions This version
Views 117117
Downloads 9999
Data volume 49.9 MB49.9 MB
Unique views 109109
Unique downloads 9494

Share

Cite as