Write a Blog >>
Wed 12 Oct 2022 10:00 - 10:20 at Ballroom C East - Technical Session 9 - Security and Privacy Chair(s): Wei Yang

Information leaks in software can unintentionally reveal private data, yet they are hard to detect and fix. Although several methods have been proposed to detect leakage, such as static verification-based approaches, they require specialist knowledge, and are time-consuming. Recently, HyperGI introduced a dynamic, hypertest-based approach that detects and produces potential fixes for information leakage. Its fitness function tries to balance information leakage and program correctness, but as the authors of that work point out, there may be a tradeoff between keeping program semantics and reducing information leakage.

In this work we ask if it is possible to automatically detect and repair information leakage in more realistic programs without requiring specialist knowledge. Our approach, called LeakReducer explicitly encodes the tradeoff between program correctness and information leakage as a multi-objective optimisation problem. We apply LeakReducer to a set of leaky programs including the well known Heartbleed bug. It is comparable with HyperGI on their toy applications. In addition, we demonstrate it can find and reduce leakage in real applications and we see diverse solutions on our Pareto front. Upon investigation we find that having a Pareto front helps with some types of information leakage, but not all.

Wed 12 Oct

Displayed time zone: Eastern Time (US & Canada) change

10:00 - 12:00
Technical Session 9 - Security and Privacy Research Papers / Industry Showcase at Ballroom C East
Chair(s): Wei Yang University of Texas at Dallas
10:00
20m
Research paper
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage
Research Papers
Ibrahim Mesecan Iowa State University, Daniel Blackwell University College London, David Clark University College London, Myra Cohen Iowa State University, Justyna Petke University College London
10:20
20m
Research paper
ThirdEye: Attention Maps for Safe Autonomous Driving Systems
Research Papers
Andrea Stocco Università della Svizzera italiana (USI), Paulo J. Nunes Federal University of Pernambuco, Marcelo d'Amorim Federal University of Pernambuco, Paolo Tonella USI Lugano
DOI Pre-print
10:40
20m
Industry talk
Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilot
Industry Showcase
Meriel von Stein University of Virginia, Sebastian Elbaum University of Virginia
11:00
20m
Research paper
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps
Research Papers
Fuman Xie University of Queensland, Yanjun Zhang University of Queensland, Chuan Yan University of Queensland, Suwan Li Nanjing University, Lei Bu Nanjing University, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Zi Huang University of Queensland, Guangdong Bai University of Queensland
11:20
20m
Research paper
An Empirical Study of Automation in Software Security Patch Management
Research Papers
Nesara Dissanayake University of Adelaide, Asangi Jayatilaka University of Adelaide, Mansooreh Zahedi The Univeristy of Melbourne, Muhammad Ali Babar University of Adelaide
11:40
20m
Research paper
Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
Research Papers
Yuxi Ling National University of Singapore, Kailong Wang National University of Singapore, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology, China, Jin Song Dong National University of Singapore