ASE 2025
Sun 16 - Thu 20 November 2025 Seoul, South Korea

This program is tentative and subject to change.

Wed 19 Nov 2025 14:30 - 14:40 at Grand Hall 5 - Security 4

\textit{Excessive Data Exposure}(EDE), which means APIs return data not utilized by web applications, has emerged as a critical security threat, ranking third among OWASP’s top API vulnerabilities in 2023. Existing detection methods primarily rely on black-box testing, which limits detection accuracy due to the underutilization of available public information, such as client-side source code, and results in high time costs. Moreover, this domain’s lack of standardized datasets hinders systematic comparative evaluations among different detection methods.

To address these challenges, we developed Mockingbird, a hybrid detection framework that integrates dynamic instrumentation and static analysis with enhanced test oracles. Mockingbird leverages the Chrome DevTools Protocol to control browsers, monitor requests, and recursively instrument responses. It then tracks the propagation paths of response values to analyze whether these data are genuinely used, enabling rapid and precise identification of excessively exposed data.

Furthermore, to facilitate advancement in this field, we constructed EDEBench, the first dedicated benchmark dataset for EDE detection, featuring five diverse open-source web projects. On EDEBench, Mockingbird demonstrates superior performance, achieving an average F1-Score of 92.20% (Precision: 93.03%, Recall: 91.39%). This represents a substantial improvement over the baseline black-box tool, particularly in the recall, where Mockingbird surpassed it by over 33 percentage points. Critically, Mockingbird’s detection efficiency is also transformative, with an average detection time of approximately 30 seconds for a significant number of fields, which is about 200 times faster than the baseline. This research contributes a novel grey-box methodology and substantial empirical support for its application in API security testing.

This program is tentative and subject to change.

Wed 19 Nov

Displayed time zone: Seoul change

14:00 - 15:30
14:00
10m
Talk
Advancing Binary Code Similarity Detection via Context-Content Fusion and LLM Verification
Research Papers
Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Jingdong Guo Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Shouguo Yang Zhongguancun Laboratory, Beijing, China, Yi Li Nanyang Technological University, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Xiao Chinese Academy of Sciences, Yongle Chen Taiyuan University of Technology, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:10
10m
Talk
ACTaint: Agent-Based Taint Analysis for Access Control Vulnerabilities in Smart Contracts
Research Papers
Huarui Lin Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Jiachi Chen Sun Yat-sen University, Xiang Chen Nantong University, Xiaohu Yang Zhejiang University, Lingfeng Bao Zhejiang University
14:20
10m
Talk
AMPLE: Fine-grained File Access Policies for Server Applications
Research Papers
Seyedhamed Ghavamnia Bloomberg, Julien Vanegue Imperial College London; Bloomberg
14:30
10m
Talk
Mockingbird: Efficient Excessive Data Exposures Detection via Dynamic Code Instrumentation
Research Papers
Chenxiao Xia Beijing Institute of Technology, Jiazheng Sun Fudan University, Jun Zheng Beijing Institute of Technology, Yu-an Tan Beijing Institute of Technology, Hongyi Su Beijing Institute of Technology
14:40
10m
Talk
DrainCode: Stealthy Energy Consumption Attacks on Retrieval-Augmented Code Generation via Context Poisoning
Research Papers
Jiadong Wu School of Software Engineering, Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Tianyue Jiang Sun Yat-sen University, Mingwei Liu Sun Yat-Sen University, Jiachi Chen Sun Yat-sen University, Chong Wang Nanyang Technological University, Ensheng Shi Huawei, Xilin Liu Huawei Cloud, Yuchi Ma Huawei Cloud Computing Technologies, Hongyu Zhang Chongqing University, Zibin Zheng Sun Yat-sen University
14:50
10m
Talk
Finding Insecure State Dependency in DApps via Multi-Source Tracing and Semantic Enrichment
Research Papers
Jingwen Zhang School of Software Engineering, Sun Yat sen University, Yuhong Nan Sun Yat-sen University, Wei Li School of Software Engineering, Sun Yat sen University, Kaiwen Ning Sun Yat-sen University, Zewei Lin Sun Yat-sen University, Zitong Yao School of Software Engineering, Sun Yat sen University, Yuming Feng Peng Cheng Laboratory, Weizhe Zhang Harbin Institute of Technology, Zibin Zheng Sun Yat-sen University
15:00
10m
Talk
Better Safe than Sorry: Preventing Policy Violations through Predictive Root-Cause-Analysis for IoT Systems
Research Papers
Michael Norris Penn State University, Syed Rafiul Hussain Pennsylvania State University, Gang (Gary) Tan Pennsylvania State University
15:10
10m
Talk
Backdoors in Code Summarizers: How Bad Is It?
Research Papers
Chenyu Wang Singapore Management University, Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Yaniv Harel Tel Aviv University, David Lo Singapore Management University
Pre-print
15:20
10m
Talk
ProfMal: Detecting Malicious NPM Packages by the Synergy between Static and Dynamic Analysis
Research Papers
Yiheng Huang Fudan University, Wen Zheng Fudan University, Susheng Wu Fudan University, Bihuan Chen Fudan University, You Lu Fudan University, Zhuotong Zhou Fudan University, Yiheng Cao Fudan University, Xiaoyu Li Fudan University, Xin Peng Fudan University